summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* Do not *printf %s NULLderaadt2016-08-051-2/+3
* bump for LibreSSL 2.5.xbcook2016-07-311-3/+3
* don't mix code and decls, ok tedu@bcook2016-07-181-2/+3
* use memset to initialize the unionbcook2016-07-171-2/+4
* remove unused OPENSSL_NO_OBJECT casebcook2016-07-171-14/+1
* Initialize buffers before use, noted by Kinichiro Inoguchi.bcook2016-07-171-7/+7
* Clean up OCSP_check_validity() a bit more.beck2016-07-161-11/+10
* Limit the support of the "backward compatible" ssl2 handshake to only bebeck2016-07-162-2/+18
* zero the read buffer after copying data to user so it doesn't linger.tedu2016-07-102-2/+4
* call BN_init on temporaries to avoid use-before-set warningsbcook2016-07-073-3/+14
* remove unneeded duplicate call - spotted by jsing@beck2016-07-051-3/+1
* On systems where we do not have BN_ULLONG defined (most 64-bit systems),bcook2016-07-053-10/+42
* Add several fixes from OpenSSL to make OCSP work with intermediatebeck2016-07-051-10/+24
* bump to 2.4.2bcook2016-06-301-3/+3
* Remove flags for disabling constant-time operations.bcook2016-06-308-177/+87
* Fix from kinichiro.inoguchi@gmail.com to ensure that OCSP usesbeck2016-06-251-2/+2
* Fix the ocsp code to actually check for errors when comparing time valuesbeck2016-06-251-7/+31
* Disable DSA_FLAG_NO_EXP_CONSTTIME, always enable constant-time behavior.bcook2016-06-213-88/+46
* Set BN_FLG_CONSTTIME on the correct variable. beck committed wrong fix.libressl-v2.4.1tedu2016-06-061-2/+2
* Correct a problem that prevents the DSA signing algorithm from runningbeck2016-06-061-4/+6
* LibreSSL 2.4.1bcook2016-06-061-3/+3
* deprecate internal use of EVP_[Cipher|Encrypt|Decrypt]_Final.beck2016-05-306-16/+24
* Fix a short-read bug in the previous version of asn1_d2i_read_biobcook2016-05-201-26/+28
* fix for integer overflow in encode and encrypt update functions.tedu2016-05-042-6/+11
* fix a padding oracle in aesni cbc mac check. there must be enough datatedu2016-05-041-1/+4
* internal only negative types should not be handled here.tedu2016-05-043-9/+3
* be careful about consuming excessive memory by reading in chunks.tedu2016-05-041-14/+37
* revert the big change from yesterday to prepare for smaller commits.tedu2016-05-047-55/+30
* prefer limits.h over sys/limits.hbcook2016-05-031-2/+2
* patch from openssl for multiple issues:tedu2016-05-038-30/+265
* Crank majors for lib{crypto,ssl,tls} due to symbol removals, symboljsing2016-04-282-2/+2
* don't go into an unbreakable infinite loop during operations suchtedu2016-04-281-1/+2
* Implement the IETF ChaCha20-Poly1305 cipher suites.jsing2016-04-2810-92/+336
* Rename EVP_aead_chacha20_poly1305() to EVP_aead_chacha20_poly1305_old()jsing2016-04-284-17/+17
* Use the correct iv and counter when decrypting the ciphertext forjsing2016-04-131-4/+4
* for some time now mandoc has not required MLINKS to functionjmc2016-03-301-166/+1
* Merge a memleak fix from BoringSSL 6b6e0b2:mmcc2016-03-272-2/+6
* Return zero from two functions on allocation failure instead of alwaysmmcc2016-03-212-4/+4
* " the the " -> " the ", or in a couple of cases replace the superfluouskrw2016-03-207-10/+10
* explicit_bzero for asn1 objects on free. Too often these contain sensitive in...beck2016-03-171-24/+27
* 'accomodate' -> 'accommodate' in comments.krw2016-03-155-9/+9
* Fix examples for EVP_PKEY_CTX_set_rsa_padding.bcook2016-03-132-2/+2
* Add error handling to the remaining calls to bn_wexpand().bcook2016-03-122-16/+23
* Remove sentences in RETURN VALUES sections saying that functions withmmcc2016-03-1211-23/+2
* Bump for LibreSSL 2.4.0bcook2016-03-121-3/+3
* X509_free(3) is NULL-safe, so remove NULL checks before its calls.mmcc2016-03-1122-119/+73
* http -> https for a few more IETF URLs in comments or man pagesmmcc2016-03-105-12/+12
* http -> https for IETF/IANA URLs in commentsmmcc2016-03-072-8/+8
* explict_bzero for some asn1 free's - ok miod@beck2016-03-062-3/+9
* Make sure stdio functions don't end up in the library, from miod@beck2016-03-067-15/+39