summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* Fix from kinichiro.inoguchi@gmail.com to ensure that OCSP usesbeck2016-06-251-2/+2
* Fix the ocsp code to actually check for errors when comparing time valuesbeck2016-06-251-7/+31
* Disable DSA_FLAG_NO_EXP_CONSTTIME, always enable constant-time behavior.bcook2016-06-213-88/+46
* Set BN_FLG_CONSTTIME on the correct variable. beck committed wrong fix.libressl-v2.4.1tedu2016-06-061-2/+2
* Correct a problem that prevents the DSA signing algorithm from runningbeck2016-06-061-4/+6
* LibreSSL 2.4.1bcook2016-06-061-3/+3
* deprecate internal use of EVP_[Cipher|Encrypt|Decrypt]_Final.beck2016-05-306-16/+24
* Fix a short-read bug in the previous version of asn1_d2i_read_biobcook2016-05-201-26/+28
* fix for integer overflow in encode and encrypt update functions.tedu2016-05-042-6/+11
* fix a padding oracle in aesni cbc mac check. there must be enough datatedu2016-05-041-1/+4
* internal only negative types should not be handled here.tedu2016-05-043-9/+3
* be careful about consuming excessive memory by reading in chunks.tedu2016-05-041-14/+37
* revert the big change from yesterday to prepare for smaller commits.tedu2016-05-047-55/+30
* prefer limits.h over sys/limits.hbcook2016-05-031-2/+2
* patch from openssl for multiple issues:tedu2016-05-038-30/+265
* Crank majors for lib{crypto,ssl,tls} due to symbol removals, symboljsing2016-04-282-2/+2
* don't go into an unbreakable infinite loop during operations suchtedu2016-04-281-1/+2
* Implement the IETF ChaCha20-Poly1305 cipher suites.jsing2016-04-2810-92/+336
* Rename EVP_aead_chacha20_poly1305() to EVP_aead_chacha20_poly1305_old()jsing2016-04-284-17/+17
* Use the correct iv and counter when decrypting the ciphertext forjsing2016-04-131-4/+4
* for some time now mandoc has not required MLINKS to functionjmc2016-03-301-166/+1
* Merge a memleak fix from BoringSSL 6b6e0b2:mmcc2016-03-272-2/+6
* Return zero from two functions on allocation failure instead of alwaysmmcc2016-03-212-4/+4
* " the the " -> " the ", or in a couple of cases replace the superfluouskrw2016-03-207-10/+10
* explicit_bzero for asn1 objects on free. Too often these contain sensitive in...beck2016-03-171-24/+27
* 'accomodate' -> 'accommodate' in comments.krw2016-03-155-9/+9
* Fix examples for EVP_PKEY_CTX_set_rsa_padding.bcook2016-03-132-2/+2
* Add error handling to the remaining calls to bn_wexpand().bcook2016-03-122-16/+23
* Remove sentences in RETURN VALUES sections saying that functions withmmcc2016-03-1211-23/+2
* Bump for LibreSSL 2.4.0bcook2016-03-121-3/+3
* X509_free(3) is NULL-safe, so remove NULL checks before its calls.mmcc2016-03-1122-119/+73
* http -> https for a few more IETF URLs in comments or man pagesmmcc2016-03-105-12/+12
* http -> https for IETF/IANA URLs in commentsmmcc2016-03-072-8/+8
* explict_bzero for some asn1 free's - ok miod@beck2016-03-062-3/+9
* Make sure stdio functions don't end up in the library, from miod@beck2016-03-067-15/+39
* graduate bn_expand() to a real function. the openssl version of thisderaadt2016-03-042-4/+16
* Revert bn_expand until there's consensus on a fix.doug2016-03-041-14/+3
* fix the rest of the read_ledword() calls used as lengths to be bounded.beck2016-03-021-1/+5
* Add bounds checking for BN_hex2bn/BN_dec2bn.doug2016-03-022-10/+26
* bound lengths coming out of a pem file to something like realitybeck2016-03-021-3/+7
* Remove support for ancient, broken DSA implementations.doug2016-03-011-60/+20
* remove NULL checks for pqueue_free()mmcc2016-02-292-22/+12
* Therefor -> Therefore (where appropriate)tb2016-01-292-2/+2
* deprecate SSL_OP_SINGLE_DH_USElibressl-v2.3.2beck2016-01-274-74/+12
* Document that the ssl free() functions are NULL safe. OK mmcc@millert2015-12-306-12/+42
* More adress -> addressmmcc2015-12-242-2/+2
* remove NULL-checks before free()mmcc2015-12-233-19/+11
* assign pointer NULL rather than 0mmcc2015-12-231-2/+2
* assign pointer to NULL rather than 0mmcc2015-12-231-2/+2
* initialize a pointer to NULL rather than 0mmcc2015-12-221-2/+2