summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Expand)AuthorAgeFilesLines
* don't go into an unbreakable infinite loop during operations suchtedu2016-04-281-1/+2
* Rename EVP_aead_chacha20_poly1305() to EVP_aead_chacha20_poly1305_old()jsing2016-04-282-13/+13
* fix typo in comment; ok becktj2016-04-192-4/+4
* Use the correct iv and counter when decrypting the ciphertext forjsing2016-04-131-4/+4
* for some time now mandoc has not required MLINKS to functionjmc2016-03-301-903/+1
* fix the last bunch of NAME sections that were overlooked earlierschwarze2016-03-261-2/+9
* Return zero from two functions on allocation failure instead of alwaysmmcc2016-03-212-4/+4
* " the the " -> " the ", or in a couple of cases replace the superfluouskrw2016-03-202-3/+3
* explicit_bzero for asn1 objects on free. Too often these contain sensitive in...beck2016-03-171-24/+27
* 'accomodate' -> 'accommodate' in comments.krw2016-03-155-9/+9
* Fix examples for EVP_PKEY_CTX_set_rsa_padding.bcook2016-03-132-2/+2
* Add error handling to the remaining calls to bn_wexpand().bcook2016-03-122-16/+23
* Remove sentences in RETURN VALUES sections saying that functions withmmcc2016-03-1213-31/+4
* Bump for LibreSSL 2.4.0bcook2016-03-121-3/+3
* X509_free(3) is NULL-safe, so remove NULL checks before its calls.mmcc2016-03-118-29/+19
* http -> https for a few more IETF URLs in comments or man pagesmmcc2016-03-101-2/+2
* explict_bzero for some asn1 free's - ok miod@beck2016-03-062-3/+9
* graduate bn_expand() to a real function. the openssl version of thisderaadt2016-03-042-4/+16
* Revert bn_expand until there's consensus on a fix.doug2016-03-041-14/+3
* fix the rest of the read_ledword() calls used as lengths to be bounded.beck2016-03-021-1/+5
* Add bounds checking for BN_hex2bn/BN_dec2bn.doug2016-03-022-10/+26
* bound lengths coming out of a pem file to something like realitybeck2016-03-021-3/+7
* Remove support for ancient, broken DSA implementations.doug2016-03-011-60/+20
* Sync some root certificates with Mozilla's cert store. ok bcook@sthen2016-02-171-84/+1016
* Sort cert.pem alphabetically, first by organisation, then by CA namesthen2016-02-011-1604/+1584
* Revamp cert.pem certificate information formatting. Skip headers whichsthen2016-01-311-2459/+184
* Calling clone(2) with CLONE_NEWPID yields multiple processes with pid=1.bcook2016-01-042-4/+6
* More adress -> addressmmcc2015-12-242-2/+2
* remove NULL-checks before free()mmcc2015-12-233-19/+11
* assign pointer NULL rather than 0mmcc2015-12-231-2/+2
* assign pointer to NULL rather than 0mmcc2015-12-231-2/+2
* initialize a pointer to NULL rather than 0mmcc2015-12-221-2/+2
* Remove "C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certificationsthen2015-12-151-49/+0
* initialize ext_len to 0.beck2015-12-141-2/+6
* initialize ok to 0beck2015-12-141-2/+2
* initialize md_len to 0 for readability to quell warnings.beck2015-12-141-3/+3
* move initialization of buf up to quell warnings and make it obvious the err c...beck2015-12-121-4/+5
* prevent possibly use of uninitialized variablebeck2015-12-121-2/+2
* make the counter a size_t as well, which quells a warning on visual studio 2015beck2015-12-121-2/+3
* bump the major for libcrypto/ssl/tls for a CRYPTO_chacha_20 ABI changebcook2015-12-092-4/+4
* Change the counter argument for CRYPTO_chacha_20 to be 64-bits on all platforms.bcook2015-12-092-5/+6
* Add root certificate for COMODO RSA Certification Authority, ok beck@sthen2015-12-071-0/+122
* Remove SHA0 check, as we did in v1.21 of sha.h.bcook2015-12-071-2/+2
* Fix for OpenSSL CVE-2015-3195beck2015-12-041-3/+8
* Fix for OpenSSL CVE-2015-3194beck2015-12-031-2/+2
* Correct file name, no text change (no history yet, but sorry for the churn).schwarze2015-11-242-26/+26
* Partial revert of revision 1.26:schwarze2015-11-211-18/+18
* add QuoVadis root certificates, present in Mozilla/Chrome/Apple/Windows/etcsthen2015-11-161-0/+722
* ui_new -> UI_new;jmc2015-11-151-2/+2
* mutli -> multimiod2015-11-141-1/+1