summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Nuke OPENSSL_NONPIC_relocated since nothing uses it.jsing2014-07-102-4/+2
* Kill a blatantly outdated (and now wrong) commentmiod2014-07-101-4/+1
* Try and fix the horrible coding style of the example code snippets.miod2014-07-107-178/+201
* Stop including standard headers via cryptlib.h - pull in the headers thatjsing2014-07-10134-210/+453
* Remove empty sections and references to des_modes(7) which we don't have.miod2014-07-1022-73/+4
* Fewer lies, also do not document DES_3cbc_encrypt anymore.miod2014-07-101-22/+6
* Features introduce in OpenSSL 0.9.8 do not deserve their own section.miod2014-07-101-21/+19
* Attempt to (incompletely) document EVP_aes_*().miod2014-07-103-10/+15
* RSA_setup_blinding() gets a BN with BN_CTX_get(), returns `out of memory'miod2014-07-101-6/+1
* make asn1 free safe to call with null pointers of any type.tedu2014-07-101-4/+3
* One sure hopes that OPENSSL_cleanse will:jsing2014-07-101-2/+2
* Remove #if 0 code which dumps your data to stdout.miod2014-07-101-9/+1
* Tweak some comments. We do not really need to know that "New!" flags werejsing2014-07-101-9/+8
* Stop playing with the RSA_FLAG_BLINDING flag. It does nothing.jsing2014-07-101-3/+1
* delete some casts. ok miodtedu2014-07-1012-35/+35
* Missing allocation checks and potential NULL pointer dereference in themiod2014-07-101-7/+15
* Remove RSA_FLAG_NO_EXP_CONSTTIME, which was deprecated 12+ years ago.jsing2014-07-101-13/+1
* Remove DEBUG_KEYGEN and DEBUG_DECRYPT support.miod2014-07-102-49/+2
* replace getservbyname_r with getaddrinfo for portabilitybcook2014-07-101-6/+11
* Remove bogus preprocessor statements trying to pick the largest integermiod2014-07-104-32/+4
* BN_free, BN_clear_free, BN_CTX_free, BN_BLINDING_free and BN_MONT_CTX_freejsing2014-07-106-55/+32
* Use a while loop instead of an ifdowhile loop.jsing2014-07-102-12/+10
* include <limits.h> for LONG_MIN/LONG_MAX.bcook2014-07-091-2/+2
* ASN1_STRING_free can handle NULL, so callers don't need to check. ok miodtedu2014-07-095-27/+17
* reset host, port, path to null after freeing so the caller doesn'ttedu2014-07-091-1/+4
* stale prototypetedu2014-07-091-2/+1
* Make comments readable.jsing2014-07-091-27/+33
* More KNF.jsing2014-07-0919-322/+331
* KNF.jsing2014-07-092-123/+108
* ocsp_check_ids says "If algoritm mismatch let caller deal with it" beforetedu2014-07-091-6/+1
* Update to match the current state of crypto/rand, and remove MLINKS formiod2014-07-095-101/+16
* Remove mention that the PRNG needs to be seeded before invoking somemiod2014-07-0913-35/+4
* Unifdef -UPKCS_TESTVECT - we don't want the random data used in OAEP paddingmiod2014-07-091-6/+1
* {malloc,reallocarray} + memset(,0,) -> callocmiod2014-07-092-7/+5
* Replace memset(a, 0, ...); free(a); by explicit_bzero(a, ...); free(a); inmiod2014-07-091-2/+2
* Remove leading underscore from _BYTE_ORDER and _{LITTLE,BIG}_ENDIAN, to bemiod2014-07-0910-58/+58
* miod@ fixed the "bug" so remove reference to it in the man pod^Wpage.jsing2014-07-091-5/+0
* add <sys/filio.h> header for FIONBIObcook2014-07-091-1/+2
* Simplify error path of DH_check_pub_key()miod2014-07-091-8/+4
* KNFmiod2014-07-099-567/+599
* remove unused variables getentropy for OS Xbcook2014-07-092-6/+6
* cast ASN1_STRING (unsigned char *) to match strlcat's argument (char *)bcook2014-07-091-2/+2
* remove unused, private version strings except SSL_version_strbcook2014-07-0933-162/+32
* Make use of this wonderful modern C construct known as a `switch', instead ofmiod2014-07-091-11/+17
* KNFmiod2014-07-0911-906/+939
* Kill more FIPS tentacles by removing the private_AES_set_{enc,dec}rypt_key()miod2014-07-098-84/+60
* Be more strict in RSA_padding_check_X931(), and thus avoid a possiblemiod2014-07-091-2/+2
* In the old days (not in this century), SSLeay 0.4.5 would create X.509 RSAmiod2014-07-091-14/+3
* Remove RSA_memory_lock(). This undocumented function sort-of serializes yourmiod2014-07-092-51/+2
* remove unused dynamic_cmd_defns_empty structure.bcook2014-07-091-4/+1