summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Remove remnants from RC2 and SEED - there are no longer any cipher suitesjsing2014-11-024-106/+46
* Remove an outdated comment re EDH vs DHE - DHE is now used consistently andjsing2014-10-312-16/+2
* Update comments for TLS ExtensionType values - many of the referencedjsing2014-10-312-76/+92
* Crank libssl major due to recent additions, removals and changes.jsing2014-10-312-4/+4
* Remove now unused remnants from public structs.jsing2014-10-314-14/+4
* Add support for automatic DH ephemeral keys.jsing2014-10-3112-44/+194
* Remove support for ephemeral/temporary RSA private keys.jsing2014-10-3114-474/+88
* deregister; no binary changejsg2014-10-2850-230/+230
* Check the result of sk_*_push() operations for failure.miod2014-10-289-44/+85
* In PKCS12_setup_mac(), do not assign p12->mac->salt->length until the allocationmiod2014-10-221-8/+9
* Avoid a NULL pointer dereference that can be triggered byjsing2014-10-222-4/+4
* Place most of the RAND_* functions under #ifndef LIBRESSL_INTERNAL (somejsing2014-10-221-1/+4
* Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes().jsing2014-10-2227-130/+101
* digests: *_LONG_LOG2 is not used, stop talking about it.bcook2014-10-207-28/+11
* SSL: Fix memory leak in d2i_SSL_SESSION.bcook2014-10-202-2/+4
* None of these need to include <openssl/rand.h>jsing2014-10-1831-64/+31
* Sort/group includes.jsing2014-10-181-25/+26
* Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes().jsing2014-10-1834-130/+76
* Typical malloc() with size multiplication to reallocarray().doug2014-10-183-12/+12
* Get rid of the last remaining BUF_strdup and BUF_strlcpy and friends, usebeck2014-10-165-10/+14
* Disable SSLv3 by default.jsing2014-10-152-2/+8
* Only require an EC public key in tls1_set_ec_id(), if we need to providejsing2014-10-152-8/+8
* Add cipher aliases for DHE (the correct name for EDH) and ECDHE (thejsing2014-10-154-8/+32
* Bump libressl version string to 2.1.bcook2014-10-141-2/+2
* The return value on success of fcntl(F_SETFL) is not actually specified,bcook2014-10-131-3/+3
* Use O_NONBLOCK over FIONBIO.bcook2014-10-131-2/+8
* Remove useless comments in DES_is_weak_key(). Do we really care that thismiod2014-10-121-14/+10
* Paranoia: in ASN1_mbstring_ncopy(), check for len < 0 instead of len == -1,miod2014-10-121-2/+2
* Convert libssl manpages from pod to mdoc(7).bentley2014-10-12249-7737/+19938
* Use strdup() instead of malloc() + memcpy().miod2014-10-071-8/+3
* EC_KEY_set_group() does an EC_GROUP_dup() of its argument, so we don'tmiod2014-10-071-8/+2
* The fixes to X509_PURPOSE_add() in r1.18 actually could cause a globalmiod2014-10-051-27/+29
* Be sure to check the stack push operation for success in v2i_POLICY_MAPPINGS();miod2014-10-051-17/+19
* In v2i_AUTHORITY_INFO_ACCESS(), separate object allocation from object pushmiod2014-10-051-3/+8
* Memory leak upon error in set_dist_point_name().miod2014-10-051-1/+2
* Be sure to check object allocation for success before using them.miod2014-10-051-5/+10
* Missing deallocation upon error.miod2014-10-051-2/+3
* Fix memory leak in the error path of v2i_AUTHORITY_KEYID().miod2014-10-051-3/+6
* compile with c89 (code / decl ordering); from Joakim.Tjernlund@transmode.sederaadt2014-10-051-2/+3
* Use more specific curves/formats naming for local variables injsing2014-10-052-60/+56
* Use tls1_get_curvelist() in ssl_add_clienthello_tlsext(), rather thanjsing2014-10-052-22/+4
* Make tls1_get_formatlist() behave the same as tls1_get_curvelist() andjsing2014-10-052-42/+58
* Bump minor version for ECDH auto.jsing2014-10-032-2/+2
* Add support for automatic ephemeral EC keys.jsing2014-10-0314-26/+152
* Use string literals in printf style calls so gcc's -Wformat works.doug2014-10-035-23/+22
* Clean up EC cipher handling in ssl3_choose_cipher().jsing2014-09-306-290/+304
* Previous fix (1.12) would cause a NULL pointer dereference in the error pathmiod2014-09-291-4/+3
* check_cert(): be sure to reset ctx->current_crl to NULL before freeing it.miod2014-09-291-10/+5
* X509_NAME_get_text_by_OBJ(): make sure we do not pass a negative size tomiod2014-09-291-3/+5
* X509_VERIFY_PARAM_set1_name(): if invoked with NULL as the secondmiod2014-09-291-1/+2