summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Expand)AuthorAgeFilesLines
* Maximilian dot Fillinger at uni-duesseldorf dot deschwarze2015-05-242-2/+109
* bump to version 2.2bcook2015-05-231-2/+2
* No need to check the return value of memcpy() if you actually checked thismiod2015-05-201-3/+2
* Record inter-library dependencies between libcrypto, libssl and libtlskettenis2015-05-172-0/+2
* Fix return paths with missing EVP_CIPHER_CTX_cleanup() calls.jsg2015-05-153-13/+12
* Add SwissSign CA root certificates. Requested by robert@, ok dcoppa@ aja@ miod@sthen2015-05-041-0/+381
* use strdup() to init stringderaadt2015-04-301-3/+2
* Add missing BN_CTX_end() calls.doug2015-04-294-18/+18
* Not all Linux libc's include linux/sysctl.h in sys/sysctl.h.bcook2015-04-272-4/+6
* Support AIX versions without WPAR support.bcook2015-04-272-2/+10
* Don't ignore the reference count in X509_STORE_free.doug2015-04-251-1/+5
* Do not need to buf[0] = 0 before strlcpy(buf, ...deraadt2015-04-231-2/+1
* Remove d2i_X509_PKEY and i2d_X509_PKEY from the SSLeay days.doug2015-04-122-44/+2
* Send OPENSSL_issetugid() straight to hell, no final cigarette.deraadt2015-04-115-19/+5
* Remove all getenv() calls, especially those wrapped by issetugid().deraadt2015-04-116-55/+14
* add initial AIX getentropy/arc4random files. Thanks to Michael Felt.bcook2015-03-304-0/+1002
* sys/sysctl.h includes linux/sysctl.h, remove the extra unchecked includebcook2015-03-222-4/+2
* Fix indentation that incorrectly implies a different control flow.doug2015-03-213-8/+11
* Fix a memory leak in an error path.doug2015-03-201-1/+3
* Fix several crash causing defects from OpenSSL.tedu2015-03-1911-62/+158
* In the neverending saga of enabling and disabling assembler code for shamiod2015-03-182-10/+2
* Avoid a NULL pointer deref when X509_get_pubkey() returns NULL.doug2015-03-151-2/+4
* Do not use sha512-parisc for now, as it is subtly bugged - passes the shamiod2015-03-052-2/+6
* Fix CVE-2014-3570: properly calculate the square of a BIGNUM value.bcook2015-02-253-654/+303
* fourth batch of perlpod(1) to mdoc(7) conversionschwarze2015-02-2319-3/+2521
* Bump libcrypto and libssl majors, due to various recent churn.jsing2015-02-222-2/+2
* Remove IMPLEMENT_STACK_OF noops.jsing2015-02-221-2/+1
* If BN_rand() or BN_pseudo_rand() are called with a NULL rnd argument,jsing2015-02-191-3/+8
* Memory leak in error path. Coverity CID 78822.miod2015-02-171-8/+9
* third batch of perlpod(1) to mdoc(7) conversionschwarze2015-02-1613-3/+2121
* Avoid calling BN_CTX_end() on a context that wasn't started.doug2015-02-151-4/+4
* Regenmiod2015-02-153-264/+282
* If we decide to discard the provided seed buffer because its size is notmiod2015-02-151-8/+6
* Check ASN1_OCTET_STRING_new() for failure. Coverity CID 78904miod2015-02-151-6/+8
* In ec_wNAF_mul(), move the declaration of tmp_wNAF higher in scope, so thatmiod2015-02-151-6/+5
* Remove asn1_ex_i2c() prototype, now that this function has been made static;miod2015-02-141-2/+1
* Words read better when they are separated by spaces.miod2015-02-141-1/+1
* 1.18 would introduce a possible out-of-bounds access in the error path;miod2015-02-141-7/+5
* Remove DEBUG_PKCS5V2 code.miod2015-02-141-25/+1
* Unchecked allocations in x509_name_canon().miod2015-02-141-1/+5
* Memory leak upon error in X509_add1_{trust,reject}_object.miod2015-02-141-7/+23
* Manually expand IMPLEMENT_EXTERN_ASN1 macro (the only occurence in crypto).jsing2015-02-141-3/+10
* Remove IMPLEMENT_COMPAT_ASN1() and related support code. Nothing uses it inmiod2015-02-145-141/+7
* Make asn1_ex_i2c() static. ok jsing@miod2015-02-141-2/+4
* Memory leak in `should not happen' condition; Coverity CID 78889.miod2015-02-141-4/+4
* Memory leak upon error; Coverity CID 78857miod2015-02-141-1/+4
* Check i2d_name_canon() for failure (negative return). Coverity CID 78888.miod2015-02-141-6/+8
* Possible NULL pointer dereferences. Coverity CID 21719, 21732.miod2015-02-142-3/+7
* Potential NULL dereference in the error path; Coverity CID 21720miod2015-02-141-2/+2
* Coverity CID 21733 (unchecked allocation), 78823 (leak on error).miod2015-02-141-1/+6