summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Fix from kinichiro.inoguchi@gmail.com to ensure that OCSP usesbeck2016-06-251-2/+2
* Fix the ocsp code to actually check for errors when comparing time valuesbeck2016-06-251-7/+31
* Disable DSA_FLAG_NO_EXP_CONSTTIME, always enable constant-time behavior.bcook2016-06-213-88/+46
* Set BN_FLG_CONSTTIME on the correct variable. beck committed wrong fix.libressl-v2.4.1tedu2016-06-061-2/+2
* Correct a problem that prevents the DSA signing algorithm from runningbeck2016-06-061-4/+6
* LibreSSL 2.4.1bcook2016-06-061-3/+3
* deprecate internal use of EVP_[Cipher|Encrypt|Decrypt]_Final.beck2016-05-302-8/+16
* use -nameopt esc_msb so "NetLock Kft" cert has the non-asciijsg2016-05-251-2/+2
* Fix a short-read bug in the previous version of asn1_d2i_read_biobcook2016-05-201-26/+28
* remove hppa64 port, which we never got going beyond broken single users.deraadt2016-05-112-314/+0
* fix for integer overflow in encode and encrypt update functions.tedu2016-05-042-6/+11
* fix a padding oracle in aesni cbc mac check. there must be enough datatedu2016-05-041-1/+4
* internal only negative types should not be handled here.tedu2016-05-043-9/+3
* be careful about consuming excessive memory by reading in chunks.tedu2016-05-041-14/+37
* revert the big change from yesterday to prepare for smaller commits.tedu2016-05-047-55/+30
* prefer limits.h over sys/limits.hbcook2016-05-031-2/+2
* patch from openssl for multiple issues:tedu2016-05-038-30/+265
* Crank majors for lib{crypto,ssl,tls} due to symbol removals, symboljsing2016-04-282-2/+2
* don't go into an unbreakable infinite loop during operations suchtedu2016-04-281-1/+2
* Rename EVP_aead_chacha20_poly1305() to EVP_aead_chacha20_poly1305_old()jsing2016-04-282-13/+13
* fix typo in comment; ok becktj2016-04-192-4/+4
* Use the correct iv and counter when decrypting the ciphertext forjsing2016-04-131-4/+4
* for some time now mandoc has not required MLINKS to functionjmc2016-03-301-903/+1
* fix the last bunch of NAME sections that were overlooked earlierschwarze2016-03-261-2/+9
* Return zero from two functions on allocation failure instead of alwaysmmcc2016-03-212-4/+4
* " the the " -> " the ", or in a couple of cases replace the superfluouskrw2016-03-202-3/+3
* explicit_bzero for asn1 objects on free. Too often these contain sensitive in...beck2016-03-171-24/+27
* 'accomodate' -> 'accommodate' in comments.krw2016-03-155-9/+9
* Fix examples for EVP_PKEY_CTX_set_rsa_padding.bcook2016-03-132-2/+2
* Add error handling to the remaining calls to bn_wexpand().bcook2016-03-122-16/+23
* Remove sentences in RETURN VALUES sections saying that functions withmmcc2016-03-1213-31/+4
* Bump for LibreSSL 2.4.0bcook2016-03-121-3/+3
* X509_free(3) is NULL-safe, so remove NULL checks before its calls.mmcc2016-03-118-29/+19
* http -> https for a few more IETF URLs in comments or man pagesmmcc2016-03-101-2/+2
* explict_bzero for some asn1 free's - ok miod@beck2016-03-062-3/+9
* graduate bn_expand() to a real function. the openssl version of thisderaadt2016-03-042-4/+16
* Revert bn_expand until there's consensus on a fix.doug2016-03-041-14/+3
* fix the rest of the read_ledword() calls used as lengths to be bounded.beck2016-03-021-1/+5
* Add bounds checking for BN_hex2bn/BN_dec2bn.doug2016-03-022-10/+26
* bound lengths coming out of a pem file to something like realitybeck2016-03-021-3/+7
* Remove support for ancient, broken DSA implementations.doug2016-03-011-60/+20
* Sync some root certificates with Mozilla's cert store. ok bcook@sthen2016-02-171-84/+1016
* Sort cert.pem alphabetically, first by organisation, then by CA namesthen2016-02-011-1604/+1584
* Revamp cert.pem certificate information formatting. Skip headers whichsthen2016-01-311-2459/+184
* Calling clone(2) with CLONE_NEWPID yields multiple processes with pid=1.bcook2016-01-042-4/+6
* More adress -> addressmmcc2015-12-242-2/+2
* remove NULL-checks before free()mmcc2015-12-233-19/+11
* assign pointer NULL rather than 0mmcc2015-12-231-2/+2
* assign pointer to NULL rather than 0mmcc2015-12-231-2/+2
* initialize a pointer to NULL rather than 0mmcc2015-12-221-2/+2