summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Expand)AuthorAgeFilesLines
* Better fixes from openssl cvs; from markus@miod2002-08-051-3/+4
* typo; from openssl cvsmarkus2002-08-021-1/+1
* sync with http://www.openssl.org/news/patch_20020730_0_9_7.txtmarkus2002-07-302-9/+9
* apply patches from OpenSSL Security Advisory [30 July 2002],markus2002-07-304-6/+12
* remove #define crypt DES_crypt; ok deraadt@markus2002-07-191-4/+0
* correct memset arguments; from Moritz Jodeit <moritz@jodeit.org> via PR/2822.fgsch2002-07-161-2/+2
* enviroment -> environmentjufi2002-07-071-2/+2
* remove support for RC4 via /dev/crypto, suggested by Niels; ok provos@markus2002-06-201-18/+0
* do not syslog from libraries!deraadt2002-06-191-10/+1
* KNF, -Wall, and other cleanups. still does not failover 100% correctlyderaadt2002-06-191-22/+52
* stupid stupid bug ja ja ja jaderaadt2002-06-191-1/+1
* unbreak sshd with privsep: open /dev/crypto, keep fd, and callmarkus2002-06-181-5/+20
* per-evp state is now sizeof(struct dev_crypto_state) instead sizeof(struct se...markus2002-06-181-6/+6
* keep a FD per EVP_init, use a global FD for all asym operations;markus2002-06-131-83/+85
* KNFderaadt2002-06-111-19/+16
* add "dsa_dsa_mod_exp" - This mimics the software dsa_mod_exp funtionbeck2002-06-111-3/+37
* Make DSA work now... at least for things that can do bn_mod_exp.beck2002-06-111-7/+4
* Make asymmetric crypto work in userlandbeck2002-06-111-36/+114
* Pass the right arguments for RSA, DSA, and modexp operations. Fix theangelos2002-06-091-30/+37
* After much horrible and painful slogging through asn1 code,beck2002-06-081-0/+1
* Merge OpenSSL 0.9.7-stable-20020605,beck2002-06-0738-2450/+366
* sig_atomic_t type must also be volatilederaadt2002-06-031-1/+1
* do not assume scripts are executablederaadt2002-05-256-6/+6
* Merge openssl-0.9.7-stable-SNAP-20020519beck2002-05-2111-36/+69
* add aes/bf/cast; ok deraadt@markus2002-05-161-2/+50
* use hw_cryptodevderaadt2002-05-161-24/+24
* Damn my rush to make it build again.beck2002-05-151-2842/+0
* OpenSSL 0.9.7 stable 2002 05 08 mergebeck2002-05-15632-17104/+65035
* fix to match documented behaviour. RAND_file_name must return a pointer tobeck2001-12-201-9/+13
* merge openssl 0.9.6b-enginebeck2001-08-0119-256/+390
* http://www.openssl.org/news/secadv_prng.txt; ok beck@markus2001-08-011-8/+17
* openssl-engine-0.9.6a mergebeck2001-06-22121-443/+958
* typoderaadt2001-06-161-1/+0
* import DSA changes from 0.9.6a (Bleichenbacher attack), ok provos@/deraadt@markus2001-04-233-21/+66
* CRT and DH+SSL fix from 0.9.6a, ok provos@/deraadt@markus2001-04-221-1/+11
* Use correct interpretersniklas2001-01-261-2/+2
* make sure s always has enough from for trailing \0. even though strlcpy willbeck2001-01-121-1/+1
* do not honour environment variables if issetugid, and even more strongly supp...deraadt2001-01-022-18/+19
* fix util script runs to not assume they are executable.beck2000-12-183-3/+3
* openssl-engine0.9.6 mergebeck2000-12-1589-0/+0
* openssl-engine-0.9.6 mergebeck2000-12-15427-12838/+34187
* Fix typo; claudio@core-sdi.com.fgsch2000-10-101-1/+1
* $HOME paranoia: never use getenv("HOME") w/o checking for NULL and non-zeromillert2000-08-021-1/+1
* use %s with fprintfderaadt2000-07-071-1/+1
* RSA goes in tree for next our next release, as it will be afterbeck2000-06-152-33/+322
* Fix strcpy/strcat abuse and fix stupid behaviour of the defaultbeck2000-04-161-7/+24
* Fix randfile so it doesn't attempt to chmod and write entropy back tobeck2000-04-161-1/+14
* link to correct renamed pagesderaadt2000-04-164-10/+10
* Fix this for the case where the file is a device - make sure we don'tbeck2000-04-161-5/+14
* OpenSSL 0.9.5a mergebeck2000-04-15147-18188/+1798