summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* third batch of perlpod(1) to mdoc(7) conversionschwarze2015-02-1612-1364/+0
* Avoid calling BN_CTX_end() on a context that wasn't started.doug2015-02-151-4/+4
* Regenmiod2015-02-153-264/+282
* If we decide to discard the provided seed buffer because its size is notmiod2015-02-151-8/+6
* Check ASN1_OCTET_STRING_new() for failure. Coverity CID 78904miod2015-02-151-6/+8
* In ec_wNAF_mul(), move the declaration of tmp_wNAF higher in scope, so thatmiod2015-02-151-6/+5
* Remove asn1_ex_i2c() prototype, now that this function has been made static;miod2015-02-141-2/+1
* Words read better when they are separated by spaces.miod2015-02-141-1/+1
* 1.18 would introduce a possible out-of-bounds access in the error path;miod2015-02-141-7/+5
* Remove DEBUG_PKCS5V2 code.miod2015-02-141-25/+1
* Unchecked allocations in x509_name_canon().miod2015-02-141-1/+5
* Memory leak upon error in X509_add1_{trust,reject}_object.miod2015-02-141-7/+23
* Manually expand IMPLEMENT_EXTERN_ASN1 macro (the only occurence in crypto).jsing2015-02-141-3/+10
* Remove IMPLEMENT_COMPAT_ASN1() and related support code. Nothing uses it inmiod2015-02-145-141/+7
* Make asn1_ex_i2c() static. ok jsing@miod2015-02-141-2/+4
* Memory leak in `should not happen' condition; Coverity CID 78889.miod2015-02-141-4/+4
* Memory leak upon error; Coverity CID 78857miod2015-02-141-1/+4
* Check i2d_name_canon() for failure (negative return). Coverity CID 78888.miod2015-02-141-6/+8
* Possible NULL pointer dereferences. Coverity CID 21719, 21732.miod2015-02-142-3/+7
* Potential NULL dereference in the error path; Coverity CID 21720miod2015-02-141-2/+2
* Coverity CID 21733 (unchecked allocation), 78823 (leak on error).miod2015-02-141-1/+6
* Check for allocation error in RSA_eay_mod_exp(). Coverity CID 25217.miod2015-02-142-2/+7
* Memory leaks upon error. Coverity CID 78874.miod2015-02-141-10/+10
* Fix tests that got incorrectly inverted with the BN_CTX_get() return checkjsing2015-02-141-5/+5
* Expand ASN1_CHOICE*, ASN1_SEQUENCE* and associated macros, making thejsing2015-02-143-60/+416
* Expand ASN1_CHOICE*, ASN1_SEQUENCE* and associated macros, making thejsing2015-02-141-9/+53
* Attempt to correctly free temporary storage upon error. With help frommiod2015-02-141-15/+18
* second batch of perlpod(1) to mdoc(7) conversionschwarze2015-02-1411-920/+0
* While doing development work on pod2mdoc(1),schwarze2015-02-145-531/+0
* Spell NULL correctly, be explicit with NULL checks and it is also easier tojsing2015-02-142-10/+6
* Fix pod markup error.miod2015-02-141-1/+1
* Try and fix a bunch of memory leaks upon error;miod2015-02-143-12/+33
* Consistently check the return value from BN_CTX_get() on assignment.jsing2015-02-144-42/+44
* End sentences with dots.miod2015-02-131-3/+3
* Don't leak memory on errors - fixes coverity issues 105353 105253beck2015-02-131-4/+9
* fix leaking of bn, coverity issue 105351beck2015-02-131-1/+2
* prevent a crash with openssl asn1parse -genstr FORMATjsg2015-02-121-1/+5
* If you do not support POSIX I/O then you're not tall enough to ride...jsing2015-02-124-23/+4
* unifdef -m -UOPENSSL_NO_NEXTPROTONEG - NPN is being replaced with ALPN,jsing2015-02-128-48/+8
* Guenther has plans for OPENSSL_NO_CMS, so revert this for the moment.beck2015-02-119-12/+123
* Remove initialisers with default values from the ASN1 data structures.jsing2015-02-1117-188/+23
* get rid of OPENSSL_NO_CMS code we do not use.beck2015-02-119-123/+12
* get rid of OPENSSL_NO_COMP code we don't use.beck2015-02-112-11/+2
* Expand most of the ASN1_SEQUENCE* and associated macros, making the datajsing2015-02-1117-146/+950
* Enable building with -DOPENSSL_NO_DEPRECATED.doug2015-02-1131-31/+72
* More unifdef OPENSSL_NO_RFC3779 that got missed last time around.jsing2015-02-112-16/+2
* unifdef OPENSSL_NO_RFC3779 - this is currently disabled and unlikely tojsing2015-02-106-2704/+4
* Remove old interesting but not useful content.jsing2015-02-101-278/+0
* unifdef OPENSSL_NO_RC5jsing2015-02-103-29/+3
* Remove RC5 code - this is not currently enabled and is not likely to everjsing2015-02-108-1079/+0