summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Readability tweaks for comments that explain the blinding.tb2019-06-041-5/+5
* Remove the blinding later to avoid leaking information on the lengthtb2019-06-041-3/+3
* .In openssl/x509_vfy.hschwarze2019-06-041-3/+4
* Add several missing .In linesschwarze2019-06-041-3/+13
* add missing .In linesschwarze2019-06-032-4/+6
* add missing .In lineschwarze2019-06-031-2/+3
* bump to LibreSSL 3.0.0bcook2019-05-231-3/+3
* add stdlib.h for reallocarraybcook2019-05-231-1/+2
* *an* RSA;jmc2019-05-201-3/+3
* Correct missing test to determine if length is in bytes or in bits.beck2019-05-141-1/+3
* Fix signed overflow in X509_CRL_print().tb2019-05-121-1/+4
* Revert the other hunk of r1.36 as well: in the case of CCM, ccm.key istb2019-05-121-1/+11
* Stop the eyebleed in here and just use callocbeck2019-05-121-31/+8
* $OpenBSD$tb2019-05-114-0/+4
* Remove commented out rc5 bitstb2019-05-117-20/+6
* Initialize EC_KEY_METHOD before use.bcook2019-05-101-2/+2
* Revert part of r1.36: in the case of GCM, gcm.key is assigned fromtb2019-05-101-1/+7
* Fix incorrect carry operation in 512 bit addition: in the casetb2019-05-091-6/+8
* initialize safestack pointersbcook2019-05-083-6/+6
* Make sure that the tag buffer size is equal to the tag sizetb2019-05-081-2/+2
* Avoid an undefined shift in ASN1_ENUMERATED_get().tb2019-04-281-4/+9
* Avoid an undefined shift in ASN1_INTEGER_get().tb2019-04-281-4/+8
* Add error checking to i2v_POLICY_MAPPINGS().tb2019-04-221-9/+26
* Add error checking to i2v_POLICY_CONSTRAINTS().tb2019-04-221-5/+19
* Add error checking to i2v_EXTENDED_KEY_USAGE().tb2019-04-221-8/+23
* Add error checking to i2v_ASN1_BIT_STRING().tb2019-04-221-4/+18
* Add error checking to i2v_BASIC_CONSTRAINTS().tb2019-04-221-3/+18
* Add error checking to i2v_AUTHORITY_INFO_ACCESS(). While there, replacetb2019-04-221-19/+27
* Avoid potential double frees in i2v_AUTHORITY_KEYID(), i2v_GENERAL_NAME()tb2019-04-222-6/+22
* Add error checking to i2v_AUTHORITY_KEYID(), i2v_GENERAL_NAME()tb2019-04-212-32/+80
* The noop v2i_PKEY_USAGE_PERIOD() has been commented out since becktb2019-04-211-14/+2
* Fix awful whitespace in OBJ_bsearch_ext()tb2019-04-211-5/+6
* KNF: use proper wrapping of function return type and nametb2019-04-213-9/+9
* fix some style nits to reduce noise in an upcoming difftb2019-04-211-9/+8
* Avoid undefined behaviour that results from negating a signed long withjsing2019-04-201-2/+2
* Allocate md_data with calloc to avoid use of uninitialised memory.jsing2019-04-191-6/+6
* Allocate fixed NIDs for SM3/SM4.jsing2019-04-191-0/+12
* Rewrite & fix X509V3_add_value()tb2019-04-161-17/+24
* indent err: labelstb2019-04-161-7/+7
* wrap an overlong line and kill a space before a tabtb2019-04-161-3/+4
* Move function types to their own lines; rewrap.tb2019-04-161-30/+40
* Avoid signed integer overflow.jsing2019-04-151-2/+2
* Add input validation to BIO_read()/BIO_write().jsing2019-04-141-4/+14
* Some more malloc() to calloc() conversions.jsing2019-04-141-7/+5
* Remove two pointless chunks of code.jsing2019-04-141-16/+1
* Use calloc() when allocating cipher_data.jsing2019-04-141-5/+5
* Annotate a future improvement.jsing2019-04-141-1/+2
* Avoid potential double-frees following EVP_CIPHER_CTX_copy().jsing2019-04-141-4/+17
* Fix previous: I forgot to rename the bn_to_string() prototype.tb2019-04-141-2/+2
* Avoid quadratic behavior of decimal BIGNUM conversiontb2019-04-131-9/+36