summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* Use the correct iv and counter when decrypting the ciphertext forjsing2016-04-131-4/+4
* for some time now mandoc has not required MLINKS to functionjmc2016-03-301-166/+1
* Merge a memleak fix from BoringSSL 6b6e0b2:mmcc2016-03-272-2/+6
* Return zero from two functions on allocation failure instead of alwaysmmcc2016-03-212-4/+4
* " the the " -> " the ", or in a couple of cases replace the superfluouskrw2016-03-207-10/+10
* explicit_bzero for asn1 objects on free. Too often these contain sensitive in...beck2016-03-171-24/+27
* 'accomodate' -> 'accommodate' in comments.krw2016-03-155-9/+9
* Fix examples for EVP_PKEY_CTX_set_rsa_padding.bcook2016-03-132-2/+2
* Add error handling to the remaining calls to bn_wexpand().bcook2016-03-122-16/+23
* Remove sentences in RETURN VALUES sections saying that functions withmmcc2016-03-1211-23/+2
* Bump for LibreSSL 2.4.0bcook2016-03-121-3/+3
* X509_free(3) is NULL-safe, so remove NULL checks before its calls.mmcc2016-03-1122-119/+73
* http -> https for a few more IETF URLs in comments or man pagesmmcc2016-03-105-12/+12
* http -> https for IETF/IANA URLs in commentsmmcc2016-03-072-8/+8
* explict_bzero for some asn1 free's - ok miod@beck2016-03-062-3/+9
* Make sure stdio functions don't end up in the library, from miod@beck2016-03-067-15/+39
* graduate bn_expand() to a real function. the openssl version of thisderaadt2016-03-042-4/+16
* Revert bn_expand until there's consensus on a fix.doug2016-03-041-14/+3
* fix the rest of the read_ledword() calls used as lengths to be bounded.beck2016-03-021-1/+5
* Add bounds checking for BN_hex2bn/BN_dec2bn.doug2016-03-022-10/+26
* bound lengths coming out of a pem file to something like realitybeck2016-03-021-3/+7
* Remove support for ancient, broken DSA implementations.doug2016-03-011-60/+20
* remove NULL checks for pqueue_free()mmcc2016-02-292-22/+12
* Therefor -> Therefore (where appropriate)tb2016-01-292-2/+2
* deprecate SSL_OP_SINGLE_DH_USElibressl-v2.3.2beck2016-01-274-74/+12
* Document that the ssl free() functions are NULL safe. OK mmcc@millert2015-12-306-12/+42
* More adress -> addressmmcc2015-12-242-2/+2
* remove NULL-checks before free()mmcc2015-12-233-19/+11
* assign pointer NULL rather than 0mmcc2015-12-231-2/+2
* assign pointer to NULL rather than 0mmcc2015-12-231-2/+2
* initialize a pointer to NULL rather than 0mmcc2015-12-221-2/+2
* initialize ext_len to 0.beck2015-12-141-2/+6
* initialize ok to 0beck2015-12-141-2/+2
* initialize md_len to 0 for readability to quell warnings.beck2015-12-141-3/+3
* decipher comment. ok bcook@mmcc2015-12-122-4/+4
* move initialization of buf up to quell warnings and make it obvious the err c...beck2015-12-121-4/+5
* prevent possibly use of uninitialized variablebeck2015-12-121-2/+2
* make the counter a size_t as well, which quells a warning on visual studio 2015beck2015-12-121-2/+3
* bump the major for libcrypto/ssl/tls for a CRYPTO_chacha_20 ABI changebcook2015-12-092-4/+4
* Change the counter argument for CRYPTO_chacha_20 to be 64-bits on all platforms.bcook2015-12-092-5/+6
* Remove SHA0 check, as we did in v1.21 of sha.h.bcook2015-12-071-2/+2
* Fix for OpenSSL CVE-2015-3195beck2015-12-041-3/+8
* Fix for OpenSSL CVE-2015-3194beck2015-12-031-2/+2
* fix references to lhash(3);jmc2015-11-152-14/+16
* mutli -> multimiod2015-11-141-1/+1
* Various *syncron* -> *synchron* typos.miod2015-11-141-1/+1
* update cross references after deleting the imaginary MLINKSschwarze2015-11-122-2/+2
* Convert the handful of manuals that had imaginary names,schwarze2015-11-126-1055/+0
* add missing functions to NAME, or otherwise correct the mlinkjmc2015-11-1120-43/+69
* Convert five more manuals from POD to mdoc.schwarze2015-11-115-458/+0