summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* Fix 9 memory leaks.logan2014-06-281-1/+10
* Fix 2 memory leaks.logan2014-06-282-2/+6
* Use strtonum() instead of atoi(), and then impose what are we thinkderaadt2014-06-2813-102/+211
* When building a BN on the stack in BN_div(), make sure to initialize all itsmiod2014-06-271-1/+2
* save_errno botch; spotted by miodderaadt2014-06-271-2/+2
* hand-KNF macro the do { } while loopsderaadt2014-06-274-40/+49
* hand-KNF the remaining bitsderaadt2014-06-271-98/+106
* Remove M_ASN1_New* macros which are only used in X509_PKEY_new() are obfuscatemiod2014-06-272-22/+16
* save errno in ERR_put_error(), so that SYSerr doesn't have any accidentalderaadt2014-06-261-1/+3
* Unifdef -UNO_SYS_TYPES_Hmiod2014-06-245-20/+9
* Remove previously commented out wrong code, as well as the comment saying thismiod2014-06-241-3/+1
* Remove ancient workaround for previous century's compilers in the declarationmiod2014-06-241-2/+1
* Remove BIO_f_reliable(), guilty of playing with EVP_MD_CTX internals itmiod2014-06-242-627/+1
* If a chacha operation does not consume all of the generated key stream,jsing2014-06-243-7/+46
* Some KNF.jsing2014-06-241-6/+12
* Replace 48 lines of code with a single inet_pton() call. The previousjsing2014-06-241-48/+3
* Actually make BIO_set_tcp_ndelay() work - TCP_NODELAY will not magicallyjsing2014-06-241-16/+3
* Fix memory leak.logan2014-06-241-2/+4
* Since this is a library, place issetugid() before every getenv()deraadt2014-06-235-13/+24
* KNF, particularly wrapped lines of calls to PEM_read_bio_FOO() andguenther2014-06-222-48/+88
* BIO_sock_init() no longer does anything, so stop calling it.jsing2014-06-221-10/+1
* Just use SOMAXCONN and IPPROTO_TCP, since we know we have them.jsing2014-06-221-14/+4
* In BIO_get_port(), use strol() with appropriate range checks rather thanjsing2014-06-223-34/+50
* nuke unused test programs; ok jsingderaadt2014-06-222-46/+2
* More KNF.jsing2014-06-221-5/+5
* KNF.jsing2014-06-223-208/+203
* KNF.jsing2014-06-226-961/+1081
* More KNF.jsing2014-06-223-9/+9
* always compare memcmp against 0, for clarity.tedu2014-06-216-14/+14
* Pull the code that builds a DTLS sequence number out into its own functionjsing2014-06-216-46/+58
* Specify the correct strength bits for 3DES cipher suites.jsing2014-06-212-30/+26
* Switch to the ISC licensed versions of these files, which Google has madejsing2014-06-212-101/+26
* Pull out the sequence number selection and handle this up front. Also, thejsing2014-06-212-18/+12
* More KNF and clean up.jsing2014-06-212-26/+18
* More KNF.jsing2014-06-218-61/+56
* KNFmiod2014-06-213-124/+137
* KNFmiod2014-06-213-178/+186
* Fix memory leak in error path.logan2014-06-212-4/+4
* Remove the OPENSSL_*cap getenv's. A program should not be able toderaadt2014-06-203-25/+5
* wrap getenv OPENSSL_ALLOW_PROXY_CERTS in an issetugid check, to protectderaadt2014-06-201-2/+2
* Remove OPENSSL_instrument_halt and OPENSSL_far_spin, which both mightmiod2014-06-201-70/+0
* Fix incorrect bounds check in amd64 assembly version of bn_mul_mont();miod2014-06-202-4/+4
* convert CRYPTO_memcmp to timingsafe_memcmp based on current policy favoringtedu2014-06-1918-44/+44
* check stack push return and make some effort to clean up. ok beck miodtedu2014-06-191-2/+6
* improve error checking. set error code on error, and check malloc return.tedu2014-06-191-2/+13
* In ssl3_send_newsession_ticket(), fix a memory leak in an error path.miod2014-06-182-4/+8
* Missinc calloc() return value check; ok deraadt@miod2014-06-181-1/+5
* Make sure to always invoke EVP_CIPHER_CTX_cleanup() before returning in themiod2014-06-182-8/+20
* Use asprintf() instead of a fixed 128-byte size in SSL_CIPHER_description()miod2014-06-182-22/+22
* In SSL_COMP_add_compression_method(), make sure error cases actually returnmiod2014-06-182-4/+4