summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* Initial KNF.jsing2014-04-171-329/+289
* I've replaced everything in this file. ISC liscense it with my copyrightbeck2014-04-171-54/+13
* Initial KNF.jsing2014-04-171-212/+214
* Remove defines for unwanted OS support...jsing2014-04-171-54/+0
* remove some code that is now unused after guenther's changes in 1.20.jsg2014-04-172-32/+2
* KNF.jsing2014-04-171-3/+3
* Initial KNF.jsing2014-04-173-139/+122
* simply wrap around intrinsics, and knf cleanup.beck2014-04-171-57/+54
* Change library to use intrinsic memory allocation functions instead ofbeck2014-04-17277-1614/+1614
* Revert unintended whitespace changes.jsing2014-04-173-13/+13
* OPENSSL_gmtime() is not a gmtime() wrapper. It is a gmtime_r().deraadt2014-04-171-18/+4
* OPENSSL_DECLARE_EXIT serves no purpose.deraadt2014-04-1710-10/+0
* 1. RAND_seed is now DEPRECATEDderaadt2014-04-172-2/+0
* RAND_seed now does nothing, so skip the operationderaadt2014-04-171-6/+0
* Do not feed RSA private key information to the random subsystem asderaadt2014-04-173-11/+0
* remove duplicated tests in if statementsjsg2014-04-171-4/+4
* Fix for ", " issue in jsing's knf scriptguenther2014-04-171-2/+2
* Do not need to map to another silly name for unistd.h here eitherderaadt2014-04-171-1/+0
* unistd.h is always in the same place; no need to #include the result ofderaadt2014-04-1715-30/+18
* minimal fix for ', ' issue in jsing's indent scriptderaadt2014-04-171-8/+9
* OpenSSL PR#3309: when looking for an extension, set the last found positionsthen2014-04-171-3/+3
* move enginetest to regress as was done with the other testsjsg2014-04-171-283/+0
* call the correct decrypt function in aes_cbc_cipher()jsg2014-04-171-1/+1
* tag some functions with bounded. idea and ok djmtedu2014-04-171-3/+6
* TANSTAAFL - delete the buf freelist code. if you need a better malloc, gettedu2014-04-169-260/+9
* add back SRP. i was being too greedy.tedu2014-04-1623-2/+1804
* Clean up dangerous strncpy use. This included a use where the resultingbeck2014-04-1610-123/+17
* - Why do we hide from the OpenSSL police, dad?miod2014-04-166-114/+23
* > As I walk through the valley of the shadow of deathtedu2014-04-1610-606/+4
* lots of ifdef cleanuptedu2014-04-163-400/+1
* repair knftedu2014-04-161-1/+1
* quoth the readme:tedu2014-04-16128-16802/+0
* delete a few leftoverstedu2014-04-161-5/+1
* fix a few bugs observed on http://www.viva64.com/en/b/0250/tedu2014-04-165-5/+3
* Thanks to the knobs in http://tools.ietf.org/html/rfc5746, we have a knobbeck2014-04-164-14/+6
* disentangle SRP code from TLStedu2014-04-1623-1804/+2
* whack the ifdef pinata:tedu2014-04-161-260/+5
* SSLv3_client_method() doesn't support TLSv1.*; use SSLv23_client_method()guenther2014-04-162-4/+4
* Zero-pad usec format to handle values less than 100,000 correctlyguenther2014-04-161-1/+1
* Initial KNF.jsing2014-04-165-1143/+1006
* Initial KNF.jsing2014-04-164-1035/+825
* Mandatory Surgeon Guenther's Warning: This code could not possibly betedu2014-04-161-24/+24
* Initial KNF.jsing2014-04-162-1903/+1662
* More KNF.jsing2014-04-162-100/+119
* First pass for KNF.jsing2014-04-162-1294/+1235
* revert. the full horror has only now revealed itself.tedu2014-04-161-26/+21
* replace some bio_snprintf crazy with regular snprintf.tedu2014-04-161-21/+26
* Kill the bogus "send an SSLv3/TLS hello in SSLv2 format" crap fromguenther2014-04-1614-650/+346
* More KNF.jsing2014-04-1610-104/+109
* Make this byzantine horror a shell of it's former self by stubbing thebeck2014-04-161-660/+17