summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Expand)AuthorAgeFilesLines
* Put explicit braces around assignment used in a conditional.miod2015-07-191-2/+2
* Remove the logic responsible for outputting most AES-NI instructions asmiod2015-07-193-107/+0
* Replace `.byte 0x48,0x83,0xEC,0x08' with `sub \$8,%rsp' which is exactly themiod2015-07-191-2/+2
* Simplify X509_STORE_CTX_init and make it safe with stack variables.doug2015-07-191-58/+55
* Remove case that can never happen.doug2015-07-191-5/+1
* Fix Coverity 72742 - ret is overwritten immediately after this.beck2015-07-191-2/+1
* abort when ENGINE_remove fails, fix Coverity 21656bcook2015-07-191-5/+2
* rand_err doesn't exist anymore, coverity 78808beck2015-07-181-3/+3
* Coverity 21651beck2015-07-181-3/+7
* Dead code, Coverity 78798beck2015-07-181-3/+1
* Coverity ID 78910 - Yet another stupid API designed to not show failures. do thebeck2015-07-181-6/+8
* Check the return value of ASN1_STRING_set(), for it may fail to allocatemiod2015-07-182-6/+14
* Fix leak found by coverity, issue 78897 - which also brough tobeck2015-07-183-25/+33
* delete doubled words;schwarze2015-07-174-4/+4
* extenstion -> extensionmiod2015-07-171-1/+1
* Bump LIBRESSL_VERSION defines.bcook2015-07-161-3/+7
* Enforce V_ASN1_OCTET_STRING type before accessing the object as octet string;miod2015-07-161-2/+4
* After reading a password with terminal echo off, restore the terminal toguenther2015-07-161-6/+5
* Explicitely cast a char into unsigned long before shifting it left by 24, formiod2015-07-161-2/+2
* Check return value of all used functions in OCSP_REQUEST_print(); coversmiod2015-07-161-5/+9
* Make sure the `reject negative sizes' logic introduced in 1.34 is actuallymiod2015-07-161-3/+4
* Fix inverted test in previous. Commit message told what we intended, butmiod2015-07-151-2/+2
* Remove dead code. Coverity CID 21688miod2015-07-151-4/+1
* Fix two theoretical NULL pointer dereferences which can only happen if youmiod2015-07-151-4/+9
* Fix possible 32 byte buffer overrun, found by coverity, CID 78869beck2015-07-151-2/+2
* Memory leak; Coverity CID 78836miod2015-07-151-6/+8
* Unchecked allocations, and make sure we do not leak upon error. Fixesmiod2015-07-151-21/+36
* Avoid leaking objects upon error; tweaks & ok doug@miod2015-07-151-18/+18
* Do not allow TS_check_signer_name() with signer == NULL frommiod2015-07-151-1/+4
* Previous fix for Coverity CID 21785 did not cope correctly with seed_len != 0,miod2015-07-151-1/+3
* fix the build on arm after the recent addition of -Wundefjsg2015-06-291-2/+2
* Fix pointer to unsigned long conversion.doug2015-06-272-5/+7
* Put BUF_memdup() and BUF_reverse() under #ifndef LIBRESSL_INTERNAL.jsing2015-06-241-3/+2
* Handle NIST curve names.jsing2015-06-201-2/+4
* Have ECPKParameters_print() include the NIST curve name, if known.jsing2015-06-201-1/+10
* Provide EC_curve_nid2nist() and EC_curve_nist2nid().jsing2015-06-202-2/+57
* Put CRYPTO_memcmp() under #ifndef LIBRESSL_INTERNAL.jsing2015-06-201-1/+3
* Replace remaining CRYPTO_memcmp() calls with timingsafe_memcmp().jsing2015-06-203-6/+6
* Fix warning on vax due to old gcc.doug2015-06-201-4/+4
* Crank major for libcrypto, ssl and tls due to MDC-2DES removal.doug2015-06-202-2/+2
* Remove obsolete MDC-2DES from libcrypto.doug2015-06-2016-528/+19
* Return the failing engine ID in the error stack.bcook2015-06-191-2/+4
* Disable ENGINE_load_dynamic (dynamic engine support).bcook2015-06-1930-543/+11
* add DST Root CA X3 certificate, already present in most browser cert stores.sthen2015-06-171-0/+77
* Fix bad indenting in LibreSSL.doug2015-06-132-6/+6
* Remove unneeded sys/sysctl.h on linux.bcook2015-06-132-4/+2
* Avoid an infinite loop that can occur when verifying a message with anlibressl-v2.2.0jsing2015-06-111-2/+2
* Avoid a potential out-of-bounds read in X509_cmp_time(), due to missingjsing2015-06-111-4/+27
* Avoid an infinite loop that can be triggered by parsing an ASN.1jsing2015-06-111-3/+8
* Add OPENSSL_NO_EGD to opensslfeatures.h.bcook2015-05-261-0/+1