summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Expand)AuthorAgeFilesLines
* correct the failure case for getentropy on win32bcook2014-11-112-6/+6
* Don't free garbage in ec_wNAF_mul() if wNAF could be allocated butguenther2014-11-111-5/+11
* KNF (when not conflicting with other cleanup changes in progress)miod2014-11-0914-373/+507
* Remove DEBUG_SIGN code. Make sure gost_key_unwrap_crypto_pro() returns failuremiod2014-11-092-19/+4
* Rename internal yet public key_{un,}wrap_crypto_pro symbols by prepending amiod2014-11-093-30/+32
* Replace RAND_bytes() usage with arc4random_buf().miod2014-11-093-10/+3
* GOST crypto algorithms (well, most of them), ported from the removed GOSTmiod2014-11-0938-16/+6560
* Introduce EVP_MD_CTX_ctrl(), to allow for fine control of a given digest.miod2014-11-093-3/+27
* Allow digest routines to provide their own HASH_FINAL routine; will bemiod2014-11-091-3/+5
* minor cleanup of zlib code. DSO is gone. ok jsing.tedu2014-11-035-217/+7
* Add hooks to override native arc4random_buf on FreeBSD.bcook2014-11-034-0/+298
* deregister; no binary changejsg2014-10-2850-230/+230
* Check the result of sk_*_push() operations for failure.miod2014-10-289-44/+85
* In PKCS12_setup_mac(), do not assign p12->mac->salt->length until the allocationmiod2014-10-221-8/+9
* Place most of the RAND_* functions under #ifndef LIBRESSL_INTERNAL (somejsing2014-10-221-1/+4
* Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes().jsing2014-10-2227-130/+101
* digests: *_LONG_LOG2 is not used, stop talking about it.bcook2014-10-207-28/+11
* None of these need to include <openssl/rand.h>jsing2014-10-1831-64/+31
* Sort/group includes.jsing2014-10-181-25/+26
* Get rid of the last remaining BUF_strdup and BUF_strlcpy and friends, usebeck2014-10-163-6/+10
* Bump libressl version string to 2.1.bcook2014-10-141-2/+2
* The return value on success of fcntl(F_SETFL) is not actually specified,bcook2014-10-131-3/+3
* Use O_NONBLOCK over FIONBIO.bcook2014-10-131-2/+8
* Remove useless comments in DES_is_weak_key(). Do we really care that thismiod2014-10-121-14/+10
* Paranoia: in ASN1_mbstring_ncopy(), check for len < 0 instead of len == -1,miod2014-10-121-2/+2
* include header needed by older linux kernelsbcook2014-10-112-2/+4
* Use strdup() instead of malloc() + memcpy().miod2014-10-071-8/+3
* EC_KEY_set_group() does an EC_GROUP_dup() of its argument, so we don'tmiod2014-10-071-8/+2
* The fixes to X509_PURPOSE_add() in r1.18 actually could cause a globalmiod2014-10-051-27/+29
* Be sure to check the stack push operation for success in v2i_POLICY_MAPPINGS();miod2014-10-051-17/+19
* In v2i_AUTHORITY_INFO_ACCESS(), separate object allocation from object pushmiod2014-10-051-3/+8
* Memory leak upon error in set_dist_point_name().miod2014-10-051-1/+2
* Be sure to check object allocation for success before using them.miod2014-10-051-5/+10
* Missing deallocation upon error.miod2014-10-051-2/+3
* Fix memory leak in the error path of v2i_AUTHORITY_KEYID().miod2014-10-051-3/+6
* compile with c89 (code / decl ordering); from Joakim.Tjernlund@transmode.sederaadt2014-10-051-2/+3
* Use string literals in printf style calls so gcc's -Wformat works.doug2014-10-033-17/+16
* openssl.cnf tweaks following recent changes to usr.bin/openssl:sthen2014-10-011-44/+3
* Previous fix (1.12) would cause a NULL pointer dereference in the error pathmiod2014-09-291-4/+3
* check_cert(): be sure to reset ctx->current_crl to NULL before freeing it.miod2014-09-291-10/+5
* X509_NAME_get_text_by_OBJ(): make sure we do not pass a negative size tomiod2014-09-291-3/+5
* X509_VERIFY_PARAM_set1_name(): if invoked with NULL as the secondmiod2014-09-291-1/+2
* X509v3_add_ext(): do not free stuff we did not allocate in the error path.miod2014-09-281-2/+2
* X509_TRUST_add(): check X509_TRUST_get0() return value before dereferencing it,miod2014-09-281-15/+23
* Someone (TM) thought it was smart to save memory by using malloc(1) andmiod2014-09-281-5/+4
* Revert r1.5 and reenable assembler version of ghash now that it has beenmiod2014-09-272-6/+6
* Doh, rev 1.4 had left out one routine with both 32-bit and 64-bit code, wheremiod2014-09-271-0/+2
* Disable assembler code for ghash on hppa, causes wrong computations in somemiod2014-09-274-8/+8
* X509_STORE_new(): do not leak memory upon error.miod2014-09-261-14/+17
* X509_issuer_and_serial_hash(): do not leak memory if an error occurs duringmiod2014-09-261-1/+3