aboutsummaryrefslogtreecommitdiffstats
path: root/ssl
Commit message (Expand)AuthorAgeFilesLines
* tls1_heartbeat: check for NULL after allocating bufJonas Maebe2014-12-101-0/+5
* tls1_process_heartbeat: check for NULL after allocating bufferJonas Maebe2014-12-103-0/+7
* SSL_set_session: check for NULL after allocating s->kssl_ctx->client_princJonas Maebe2014-12-101-0/+5
* serverinfo_process_buffer: check result of realloc(ctx->cert->key->serverinfo...Jonas Maebe2014-12-101-2/+5
* ssl3_digest_cached_records: check for NULL after allocating s->s3->handshake_...Jonas Maebe2014-12-101-0/+5
* ssl3_get_certificate_request: check for NULL after allocating s->cert->ctypesJonas Maebe2014-12-101-0/+5
* SSL_COMP_add_compression_method: exit if allocating the new compression metho...Jonas Maebe2014-12-101-0/+7
* Include <openssl/foo.h> instead of "foo.h"Geoff Thorpe2014-12-081-1/+0
* Fixed memory leak in the event of a failure of BUF_MEM_growMatt Caswell2014-12-081-0/+1
* Fix memory leak in SSL_new if errors occur.Matt Caswell2014-12-081-7/+1
* Remove some unnecessary OPENSSL_FIPS referencesDr. Stephen Henson2014-12-089-33/+0
* Clarify the return values for SSL_get_shared_curve.Emilia Kasper2014-12-051-7/+10
* Add extra checks for odd-length EC curve lists.Emilia Kasper2014-12-053-74/+111
* Reject elliptic curve lists of odd lengths.Emilia Kasper2014-12-051-1/+3
* ssl_create_cipher_list: check whether push onto cipherstack succeedsJonas Maebe2014-12-041-1/+6
* ssl_cert_dup: Fix memory leakJonas Maebe2014-12-041-22/+2
* dtls1_new: free s on error pathKurt Roeckx2014-12-041-4/+9
* dtls1_heartbeat: check for NULL after allocating s->cert->ctypesJonas Maebe2014-12-041-0/+5
* dtls1_process_heartbeat: check for NULL after allocating bufferJonas Maebe2014-12-041-0/+2
* Remove incorrect code inadvertently introduced through commit 59669b6ab.Matt Caswell2014-12-041-4/+0
* Remove SSLv2 supportKurt Roeckx2014-12-0430-5081/+129
* Remove "#if 0" codeMatt Caswell2014-12-031-22/+0
* Only use the fallback mtu after 2 unsuccessful retransmissions if it is lessMatt Caswell2014-12-031-1/+5
* If we really get a situation where the underlying mtu is less than the minimumMatt Caswell2014-12-031-1/+4
* Fix dtls_query_mtu so that it will always either complete with an mtu that isMatt Caswell2014-12-031-37/+24
* Remove instances in libssl of the constant 28 (for size of IPv4 header + UDP)Matt Caswell2014-12-036-30/+74
* The first call to query the mtu in dtls1_do_write correctly checks that theMatt Caswell2014-12-031-9/+13
* The SSL_OP_NO_QUERY_MTU option is supposed to stop the mtu from beingMatt Caswell2014-12-032-3/+11
* Verify that we have a sensible message len and fail if notMatt Caswell2014-12-031-2/+8
* Remove all .cvsignore filesRich Salz2014-11-281-4/+0
* [PR3597] Advance to the next state variant when reusing messages.Richard Levitte2014-11-281-0/+1
* Fix warning in ssl2_encMatt Caswell2014-11-271-1/+1
* Remove more references to dtls1_encMatt Caswell2014-11-272-2/+0
* Check EVP_Cipher return values for SSL2Matt Caswell2014-11-273-6/+15
* Delete unused fileMatt Caswell2014-11-272-283/+2
* Add checks to the return value of EVP_Cipher to prevent silent encryption fai...Matt Caswell2014-11-273-4/+4
* Remove redundant checks in ssl_cert_dup. This was causing spurious error mess...Matt Caswell2014-11-271-29/+0
* Add include of ssl.h which is required by srtp.hMatt Caswell2014-11-271-1/+3
* Fixed memory leak due to incorrect freeing of DTLS reassembly bit maskMatt Caswell2014-11-263-6/+4
* Corrected comments in ssl.h about SSLv23_method and friendsMatt Caswell2014-11-251-3/+3
* Fix SuiteB chain checking logic.Dr. Stephen Henson2014-11-201-7/+4
* Do not resume a session if the negotiated protocol version does not matchDavid Benjamin2014-11-201-1/+10
* Ensure SSL3_FLAGS_CCS_OK (or d1->change_cipher_spec_ok for DTLS) is resetEmilia Kasper2014-11-207-20/+80
* Always require an advertised NewSessionTicket message.Emilia Kasper2014-11-201-12/+1
* Remove ssl3_check_finished.Emilia Kasper2014-11-203-60/+0
* Set s->hit when resuming from external pre-shared secret.Emilia Kasper2014-11-201-4/+7
* Reset s->tlsext_ticket_expected in ssl_scan_serverhello_tlsext.Emilia Kasper2014-11-202-8/+1
* New option no-ssl3-method which removes SSLv3_*methodDr. Stephen Henson2014-11-195-11/+15
* Only handle RI extension for SSLv3Dr. Stephen Henson2014-11-191-71/+70
* Process signature algorithms before deciding on certificate.Dr. Stephen Henson2014-11-195-40/+52