summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* Fix return paths with missing EVP_CIPHER_CTX_cleanup() calls.jsg2015-05-157-17/+20
* use strdup() to init stringderaadt2015-04-301-3/+2
* Add whitespace and replace OPENSSL_free with free in documentation.doug2015-04-296-22/+22
* Call CBB_add_space() rather than reimplementing it.doug2015-04-292-4/+4
* Rename cbb_buffer_add_u to cbb_add_u and remove redundant code.doug2015-04-292-30/+12
* Added len_len error checking for internal cbb_buffer_add_u().doug2015-04-292-2/+8
* Call CBS_mem_equal() rather than reimplementing it.doug2015-04-292-6/+4
* Avoid NULL deref in CBS_get_any_asn1_element().doug2015-04-292-4/+6
* Added error checking for len argument in cbs_get_u().doug2015-04-292-2/+8
* free() can handle NULL.doug2015-04-292-16/+8
* Add missing BN_CTX_end() calls.doug2015-04-294-18/+18
* Don't ignore the reference count in X509_STORE_free.doug2015-04-251-1/+5
* Check for invalid leading zeros in CBS_get_asn1_uint64.doug2015-04-252-6/+16
* Do not need to buf[0] = 0 before strlcpy(buf, ...deraadt2015-04-231-2/+1
* Clean up the ssl_bytes_to_cipher_list() API - rather than having thejsing2015-04-156-42/+30
* Remove d2i_X509_PKEY and i2d_X509_PKEY from the SSLeay days.doug2015-04-122-44/+2
* Send OPENSSL_issetugid() straight to hell, no final cigarette.deraadt2015-04-112-15/+1
* Remove all getenv() calls, especially those wrapped by issetugid().deraadt2015-04-117-60/+16
* readdir() is thread-safe when DIR handles aren't shared, so delete the lock.guenther2015-04-062-6/+2
* Nuke the OPENSSL_MAX_TLS1_2_CIPHER_LENGTH hack - this has to be enabled atjsing2015-03-314-44/+4
* Factor out the init_buf initialisation code, rather than duplicating itjsing2015-03-2716-206/+112
* BUF_MEM_free() has its own explicit NULL check.jsing2015-03-272-18/+12
* Fix indentation that incorrectly implies a different control flow.doug2015-03-213-8/+11
* Fix a memory leak in an error path.doug2015-03-201-1/+3
* Fix several crash causing defects from OpenSSL.tedu2015-03-1913-64/+166
* Avoid a NULL pointer deref when X509_get_pubkey() returns NULL.doug2015-03-151-2/+4
* delay EVP_MD_CTX_init so we don't forget to clean it up.tedu2015-03-112-6/+8
* Reject DH keys sent by a server if they are considered too small; inspiredmiod2015-03-082-2/+24
* Fix a minor information leak that was introduced in t1_lib.c r1.71, wherebyjsing2015-03-022-4/+4
* Fix CVE-2014-3570: properly calculate the square of a BIGNUM value.bcook2015-02-253-654/+303
* Fix CVE-2015-0205: Do not accept client authentication with Diffie-Hellmanbcook2015-02-252-4/+4
* fourth batch of perlpod(1) to mdoc(7) conversionschwarze2015-02-2318-1273/+0
* Bump libcrypto and libssl majors, due to various recent churn.jsing2015-02-222-2/+2
* Reluctantly add server-side support for TLS_FALLBACK_SCSV.jsing2015-02-2215-25/+159
* There is not much point constructing an SSL_CIPHER, then callingjsing2015-02-222-14/+6
* Remove IMPLEMENT_STACK_OF noops.jsing2015-02-223-6/+3
* If BN_rand() or BN_pseudo_rand() are called with a NULL rnd argument,jsing2015-02-191-3/+8
* Memory leak in error path. Coverity CID 78822.miod2015-02-171-8/+9
* third batch of perlpod(1) to mdoc(7) conversionschwarze2015-02-1612-1364/+0
* Avoid calling BN_CTX_end() on a context that wasn't started.doug2015-02-151-4/+4
* Regenmiod2015-02-153-264/+282
* If we decide to discard the provided seed buffer because its size is notmiod2015-02-151-8/+6
* Check ASN1_OCTET_STRING_new() for failure. Coverity CID 78904miod2015-02-151-6/+8
* In ec_wNAF_mul(), move the declaration of tmp_wNAF higher in scope, so thatmiod2015-02-151-6/+5
* Remove asn1_ex_i2c() prototype, now that this function has been made static;miod2015-02-141-2/+1
* Words read better when they are separated by spaces.miod2015-02-141-1/+1
* 1.18 would introduce a possible out-of-bounds access in the error path;miod2015-02-141-7/+5
* Remove DEBUG_PKCS5V2 code.miod2015-02-141-25/+1
* Unchecked allocations in x509_name_canon().miod2015-02-141-1/+5
* Memory leak upon error in X509_add1_{trust,reject}_object.miod2015-02-141-7/+23