| Commit message (Expand) | Author | Age | Files | Lines |
| * | use strdup() to init string | deraadt | 2015-04-30 | 1 | -3/+2 |
| * | Add missing BN_CTX_end() calls. | doug | 2015-04-29 | 4 | -18/+18 |
| * | Not all Linux libc's include linux/sysctl.h in sys/sysctl.h. | bcook | 2015-04-27 | 2 | -4/+6 |
| * | Support AIX versions without WPAR support. | bcook | 2015-04-27 | 2 | -2/+10 |
| * | Don't ignore the reference count in X509_STORE_free. | doug | 2015-04-25 | 1 | -1/+5 |
| * | Do not need to buf[0] = 0 before strlcpy(buf, ... | deraadt | 2015-04-23 | 1 | -2/+1 |
| * | Remove d2i_X509_PKEY and i2d_X509_PKEY from the SSLeay days. | doug | 2015-04-12 | 2 | -44/+2 |
| * | Send OPENSSL_issetugid() straight to hell, no final cigarette. | deraadt | 2015-04-11 | 5 | -19/+5 |
| * | Remove all getenv() calls, especially those wrapped by issetugid(). | deraadt | 2015-04-11 | 6 | -55/+14 |
| * | add initial AIX getentropy/arc4random files. Thanks to Michael Felt. | bcook | 2015-03-30 | 4 | -0/+1002 |
| * | sys/sysctl.h includes linux/sysctl.h, remove the extra unchecked include | bcook | 2015-03-22 | 2 | -4/+2 |
| * | Fix indentation that incorrectly implies a different control flow. | doug | 2015-03-21 | 3 | -8/+11 |
| * | Fix a memory leak in an error path. | doug | 2015-03-20 | 1 | -1/+3 |
| * | Fix several crash causing defects from OpenSSL. | tedu | 2015-03-19 | 11 | -62/+158 |
| * | In the neverending saga of enabling and disabling assembler code for sha | miod | 2015-03-18 | 2 | -10/+2 |
| * | Avoid a NULL pointer deref when X509_get_pubkey() returns NULL. | doug | 2015-03-15 | 1 | -2/+4 |
| * | Do not use sha512-parisc for now, as it is subtly bugged - passes the sha | miod | 2015-03-05 | 2 | -2/+6 |
| * | Fix CVE-2014-3570: properly calculate the square of a BIGNUM value. | bcook | 2015-02-25 | 3 | -654/+303 |
| * | fourth batch of perlpod(1) to mdoc(7) conversion | schwarze | 2015-02-23 | 19 | -3/+2521 |
| * | Bump libcrypto and libssl majors, due to various recent churn. | jsing | 2015-02-22 | 2 | -2/+2 |
| * | Remove IMPLEMENT_STACK_OF noops. | jsing | 2015-02-22 | 1 | -2/+1 |
| * | If BN_rand() or BN_pseudo_rand() are called with a NULL rnd argument, | jsing | 2015-02-19 | 1 | -3/+8 |
| * | Memory leak in error path. Coverity CID 78822. | miod | 2015-02-17 | 1 | -8/+9 |
| * | third batch of perlpod(1) to mdoc(7) conversion | schwarze | 2015-02-16 | 13 | -3/+2121 |
| * | Avoid calling BN_CTX_end() on a context that wasn't started. | doug | 2015-02-15 | 1 | -4/+4 |
| * | Regen | miod | 2015-02-15 | 3 | -264/+282 |
| * | If we decide to discard the provided seed buffer because its size is not | miod | 2015-02-15 | 1 | -8/+6 |
| * | Check ASN1_OCTET_STRING_new() for failure. Coverity CID 78904 | miod | 2015-02-15 | 1 | -6/+8 |
| * | In ec_wNAF_mul(), move the declaration of tmp_wNAF higher in scope, so that | miod | 2015-02-15 | 1 | -6/+5 |
| * | Remove asn1_ex_i2c() prototype, now that this function has been made static; | miod | 2015-02-14 | 1 | -2/+1 |
| * | Words read better when they are separated by spaces. | miod | 2015-02-14 | 1 | -1/+1 |
| * | 1.18 would introduce a possible out-of-bounds access in the error path; | miod | 2015-02-14 | 1 | -7/+5 |
| * | Remove DEBUG_PKCS5V2 code. | miod | 2015-02-14 | 1 | -25/+1 |
| * | Unchecked allocations in x509_name_canon(). | miod | 2015-02-14 | 1 | -1/+5 |
| * | Memory leak upon error in X509_add1_{trust,reject}_object. | miod | 2015-02-14 | 1 | -7/+23 |
| * | Manually expand IMPLEMENT_EXTERN_ASN1 macro (the only occurence in crypto). | jsing | 2015-02-14 | 1 | -3/+10 |
| * | Remove IMPLEMENT_COMPAT_ASN1() and related support code. Nothing uses it in | miod | 2015-02-14 | 5 | -141/+7 |
| * | Make asn1_ex_i2c() static. ok jsing@ | miod | 2015-02-14 | 1 | -2/+4 |
| * | Memory leak in `should not happen' condition; Coverity CID 78889. | miod | 2015-02-14 | 1 | -4/+4 |
| * | Memory leak upon error; Coverity CID 78857 | miod | 2015-02-14 | 1 | -1/+4 |
| * | Check i2d_name_canon() for failure (negative return). Coverity CID 78888. | miod | 2015-02-14 | 1 | -6/+8 |
| * | Possible NULL pointer dereferences. Coverity CID 21719, 21732. | miod | 2015-02-14 | 2 | -3/+7 |
| * | Potential NULL dereference in the error path; Coverity CID 21720 | miod | 2015-02-14 | 1 | -2/+2 |
| * | Coverity CID 21733 (unchecked allocation), 78823 (leak on error). | miod | 2015-02-14 | 1 | -1/+6 |
| * | Check for allocation error in RSA_eay_mod_exp(). Coverity CID 25217. | miod | 2015-02-14 | 2 | -2/+7 |
| * | Memory leaks upon error. Coverity CID 78874. | miod | 2015-02-14 | 1 | -10/+10 |
| * | Fix tests that got incorrectly inverted with the BN_CTX_get() return check | jsing | 2015-02-14 | 1 | -5/+5 |
| * | Expand ASN1_CHOICE*, ASN1_SEQUENCE* and associated macros, making the | jsing | 2015-02-14 | 3 | -60/+416 |
| * | Expand ASN1_CHOICE*, ASN1_SEQUENCE* and associated macros, making the | jsing | 2015-02-14 | 1 | -9/+53 |
| * | Attempt to correctly free temporary storage upon error. With help from | miod | 2015-02-14 | 1 | -15/+18 |