summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Simplify initialization of asn1_cb; use correct spelling of NULL.tb2018-09-171-4/+2
* sync with mozilla-release (one removal, TURKTRUST, more details atsthen2018-09-121-48/+1
* tweak previous;jmc2018-09-122-4/+4
* Add some accessor functions:djm2018-09-128-17/+138
* ASN1_OBJECTs should be freed with ASN1_OBJECT_free(3), not with free(3).tb2018-09-081-2/+2
* indent labelstb2018-09-082-8/+8
* missing word & a couple of typostb2018-09-081-3/+3
* use timing-safe compares for checking results in signature verificationdjm2018-09-054-9/+10
* Elliptic curve arithmetic only makes sense between points that belong totb2018-09-021-1/+5
* Tweak comment.tb2018-09-011-5/+2
* Remove extra "and" in "These functions and have been available"tb2018-08-281-3/+3
* fix the same "an non" issue found by tb in EVP_EncryptInit.3;jmc2018-08-261-3/+3
* Some of the functions in this manual need <openssl/dsa.h>, otherstb2018-08-261-3/+45
* typo: an nonce -> a noncetb2018-08-261-3/+3
* crank majors after symbol addition/modification/removaltb2018-08-241-2/+2
* Add const to EVP_PKCS82PKEY().tb2018-08-242-4/+4
* Add consts to EVP_PKEY_asn1_set_private()tb2018-08-248-16/+16
* After removing support for broken PKCS#8 formats (it was high time),tb2018-08-247-22/+19
* Remove EVP_PKEY2PKCS8_broken() and PKCS8_set_broken()tb2018-08-245-98/+46
* Document const change for OCSP_cert_to_id()tb2018-08-241-4/+4
* Add const to two arguments of OCSP_cert_to_id()tb2018-08-242-6/+7
* Provide X509_get0_serialNumber()tb2018-08-243-2/+10
* Turn a number of #defines into proper functions with prototypes matchingtb2018-08-245-18/+80
* Change PEM_Sign{Init,Update}() to return an int.tb2018-08-242-8/+8
* Check return value of EVP_EncodeUpdate() in PEM_write_bio().tb2018-08-241-2/+3
* Check return value of EVP_EncodeUpdate() in b64_write().tb2018-08-241-3/+4
* Convert EVP_EncodeUpdate() to return an int to allow for errortb2018-08-242-8/+10
* Provide EVP_CIPHER_CTX_encrypting().tb2018-08-243-2/+10
* Document prototype change and return values for BIO_set_cipher()tb2018-08-241-3/+5
* Return an int in BIO_set_cipher() to be able to report errors.tb2018-08-242-13/+22
* In DSO_up_ref(), check return value of CRYPTO_add() and reporttb2018-08-241-3/+5
* In ENGINE_up_ref(), check return value of CRYPTO_add() and reporttb2018-08-241-3/+5
* Document new prototype and return values of X509_OBJECT_up_ref_count()tb2018-08-241-3/+6
* Make X509_OBJECT_up_ref_count return an int.tb2018-08-242-9/+7
* Update documentation of CRYPTO_mem_leaks*.tb2018-08-241-6/+12
* Let CRYPTO_mem_leaks{,_fp,_cb}() return -1.tb2018-08-242-12/+12
* Don't leak sktmp in X509_verify_cert().tb2018-08-191-5/+5
* whitespace fixtb2018-08-191-2/+2
* Don't leak db on error in RSA_padding_check_PKCS1_OAEP().tb2018-08-191-7/+7
* Add a comment that explains what the check is doing and why len >= 1.tb2018-08-141-1/+2
* The UI_add_{input,verify}_string() functions want a length not includingtb2018-08-141-5/+8
* Add glue to EVP_md5_sha1() so that it can be used with EVP_Sign* andjsing2018-08-101-1/+12
* Add missing include to X25519 synopsis.jsing2018-08-101-2/+3
* typo: macro-generates wrappers -> macro-generated wrapperstb2018-08-081-3/+3
* Remove unnecessary NULL check from get_cert_by_subject sincelibressl-v2.8.0bcook2018-08-051-3/+3
* Fix a memory leak in i2d_RSA_NET on failure of ASN1_STRING_set.bcook2018-08-051-2/+2
* In RSA_padding_add_PKCS1_OAEP, dbmask needs to be freed on failure.bcook2018-08-051-3/+7
* Fix memory leak in i2b_PVK in error handling.bcook2018-08-051-14/+10
* Document that X509_{NAME,REQ,REQ_INFO}_free() are all NULL safe.tb2018-07-292-4/+19
* add c++ symbol annotationsbcook2018-07-241-1/+9