summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* check_cert(): be sure to reset ctx->current_crl to NULL before freeing it.miod2014-09-291-10/+5
* X509_NAME_get_text_by_OBJ(): make sure we do not pass a negative size tomiod2014-09-291-3/+5
* X509_VERIFY_PARAM_set1_name(): if invoked with NULL as the secondmiod2014-09-291-1/+2
* X509v3_add_ext(): do not free stuff we did not allocate in the error path.miod2014-09-281-2/+2
* X509_TRUST_add(): check X509_TRUST_get0() return value before dereferencing it,miod2014-09-281-15/+23
* Someone (TM) thought it was smart to save memory by using malloc(1) andmiod2014-09-281-5/+4
* Revert r1.5 and reenable assembler version of ghash now that it has beenmiod2014-09-272-6/+6
* Doh, rev 1.4 had left out one routine with both 32-bit and 64-bit code, wheremiod2014-09-271-0/+2
* Disable assembler code for ghash on hppa, causes wrong computations in somemiod2014-09-274-8/+8
* X509_STORE_new(): do not leak memory upon error.miod2014-09-261-14/+17
* X509_issuer_and_serial_hash(): do not leak memory if an error occurs duringmiod2014-09-261-1/+3
* X509at_add1_attr(): do not free stuff we did not allocate in the error path.miod2014-09-261-3/+3
* Fix regression introduced in revision 1.15 by using strndup() instead ofmiod2014-09-231-6/+6
* a_enum.c used to be a copy of a_int.c with s/INTEGER/ENUMERATED/g , butmiod2014-09-211-4/+9
* Fix a memory leak in the error path in ASN1_mbstring_ncopy().miod2014-09-211-19/+29
* A few more MLINKs.miod2014-09-161-1/+7
* preserve errno value on success.bcook2014-08-282-8/+12
* constify strerror return valuebcook2014-08-241-2/+2
* Include <sys/time.h> to get struct timevalbcook2014-08-241-1/+2
* Three independent typos for `independent' or `independently'.miod2014-08-191-1/+1
* replace more ROTATE macros with plain-old C code.bcook2014-08-182-40/+19
* remove return value from HOST_c2l/l2c macrosbcook2014-08-188-106/+106
* only build the getrandom path if SYS_getrandom is defined.bcook2014-08-162-6/+14
* getrandom(2) support for getentropy_linuxbcook2014-08-162-26/+20
* fixed overrid(d)en typotobias2014-08-142-3/+3
* munmap correct object in (extremely unlikely, and effectively terminal)deraadt2014-08-136-12/+12
* Replace intrinsic ROTATE macros with an inline.bcook2014-08-121-41/+10
* Guard RSA / RC4-5 ASM when NO_ASM is not definedbcook2014-08-114-7/+12
* Fix CVE-2014-3508, pretty printing and OID validation:guenther2014-08-082-12/+28
* Allow B64_EOF to follow a base64 padding character. This restores previousjsing2014-08-061-2/+3
* Correct error checks in EVP_read_pw_string_min(): UI_add_input_string()guenther2014-08-061-3/+3
* In chacha_init(), allow for a NULL iv. Reported by znz on github.miod2014-08-041-2/+3
* Remove SRP code. It contains a bug (this should not surprise anyone), buttedu2014-07-286-1819/+1
* Add missing year to copyright.jsing2014-07-252-4/+4
* BIO_free() returns immediately when the sole input is NULL.doug2014-07-257-25/+16
* level_add_node(): if a memory allocation failure causes us to attempt to cleanmiod2014-07-231-4/+7
* Make sure PEM_def_callback() correctly handles negative buffer sizes; all usesmiod2014-07-231-10/+17
* Check the return value of the UI functions (including UI_new() which returnmiod2014-07-231-6/+11
* Now that DES_random_key() can be trusted, use it to generate DES keys in themiod2014-07-222-12/+10
* In DES_random_key(), force the generated key to the odd parity before checkingmiod2014-07-221-8/+8
* Kill a bunch more BUF_strdup's - these are converted to have a check forbeck2014-07-226-15/+20
* better match proposed syscall apibcook2014-07-222-16/+4
* protect sysctl path with SYS__sysctl instead; from enh@google, ok bcookderaadt2014-07-212-12/+12
* Use explicit_bzero() instead of memset() on buffers going out of scope.guenther2014-07-216-12/+18
* cast from void * before math; enh@googlederaadt2014-07-212-4/+4
* Move more OS-specific functionality to arc4random.h headers.bcook2014-07-208-8/+74
* initial win32 ARC4_LOCK/UNLOCK implementation.bcook2014-07-202-2/+42
* Demonstrate how new linux getrandom() will be called, at least untilderaadt2014-07-202-2/+74
* Mark the format string argument to BIO_*printf as not being allowed to be NULLguenther2014-07-201-5/+7
* remove disabled main hook; we use phdr now; ok bcookderaadt2014-07-196-42/+6