summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* If you need to allocate `a + b' bytes of memory, then don't allocate `a + b*2',miod2014-05-183-6/+6
* Make sure UTF8_getc() is invoked with the proper buffer size.miod2014-05-181-2/+2
* Out of all the openssl apps, just one of them has code to mess around withjsing2014-05-181-12/+0
* W_OK comes via unistd.h - nuke several #ifndef W_OK that attempt to handlejsing2014-05-181-13/+2
* Remove unused include.jsing2014-05-183-3/+0
* Group and sort includes.jsing2014-05-1850-214/+308
* Plug memory leaks upon error in OCSP_url_svcloc_new().miod2014-05-181-6/+9
* In OCSP_sendreq_bio(), cope with OCSP_sendreq_new() returning NULL.miod2014-05-181-4/+6
* In dtls1_reassemble_fragment() and dtls1_process_out_of_seq_message(), in casemiod2014-05-182-14/+6
* In ssl3_send_certificate_request(), when adding the extra payload ifmiod2014-05-182-2/+12
* Make sure ssl3_setup_buffers() does not return upon error with a freedmiod2014-05-182-14/+14
* bio_err is initialised in main, hence there is no need to initialise itjsing2014-05-1846-168/+16
* More KNF.jsing2014-05-1810-193/+208
* Omit -Werror if building with gcc3, for it triggers "redefinition of `pqueue'"miod2014-05-181-2/+6
* No need to check for NULL before invoking free(); use calloc() whenmiod2014-05-182-60/+14
* does sunos not have memmove? sorry, i guess sunos will not have libressl.tedu2014-05-171-21/+3
* unchecked malloc() return value in OCSP_sendreq_new().miod2014-05-171-0/+2
* KNFmiod2014-05-178-1274/+1332
* add missing header needed for mem{cpy,cmp}()chl2014-05-171-0/+1
* simple reallocarray to check multiplies. ok guenthertedu2014-05-171-6/+4
* no no md2tedu2014-05-176-48/+0
* no no seedtedu2014-05-172-17/+0
* deleted seed some time agotedu2014-05-1713-295/+0
* switch RSA key generation default to 2048 bits (matching ssh); ok miod@sthen2014-05-174-4/+4
* When OPENSSL_LOAD_CONF was added it ended up with more #if 0 code,jsing2014-05-163-94/+14
* Fix memory leaks upon failure.miod2014-05-152-27/+39
* Replace ASN1_GENERALIZEDTIME_adj(), ASN1_UTCTIME_adj() andmiod2014-05-153-25/+73
* No longer make pqueue.h a public (and installed) header file. Replace itsmiod2014-05-157-6/+12
* More KNF.jsing2014-05-154-7/+7
* Use C99 initialisers for the AEAD struct.jsing2014-05-151-9/+9
* KNF.jsing2014-05-151-70/+67
* Add a ChaCha20-Poly1305 AEAD EVP implementation to libcrypto, from Adamjsing2014-05-153-0/+272
* KNF.jsing2014-05-155-283/+343
* Add an AEAD EVP interface to libcrypto, along with AES-GCM AEADjsing2014-05-155-33/+549
* Stop being a dummy... presumably these are left overs from pedantic modejsing2014-05-159-22/+2
* Add poly1305 to libcrypto utilising Andrew Moon's public domainjsing2014-05-143-0/+348
* Remove AES_bi_ige_encrypt() from libcrypto. This routine is supposed to usemiod2014-05-122-116/+0
* Bring back ASN1_seq_pack(), ASN1_seq_unpack(), ASN1_pack_string() andmiod2014-05-123-0/+215
* Move the `pqueue' part of libcrypto, which is a glorified sorted linked listmiod2014-05-127-24/+323
* More KNF.jsing2014-05-115-16/+27
* KNF.jsing2014-05-112-322/+287
* __bounded => __attribute__((__bounded__djm2014-05-101-5/+5
* Typo in C99 field initializer introduced in r1.3;miod2014-05-091-1/+1
* Replace Apache v2 license with ISC license.matthew2014-05-094-50/+50
* Replace hand-crafted STRICT_ALIGNMENT with system provided __STRICT_ALIGNMENT.miod2014-05-081-17/+7
* More KNF.jsing2014-05-0811-45/+94
* KNF.jsing2014-05-0812-308/+383
* Remove KSSL debug code.jsing2014-05-081-21/+0
* KNF.jsing2014-05-087-912/+917
* Nuke OPENSSL_FIPS - having #ifdefs inside a #ifndef for the same thingjsing2014-05-082-18/+0