summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* Move openssl(1) from /usr/sbin/openssl to /usr/bin/openssl, since it is notjsing2014-08-2655-33619/+0
* constify strerror return valuebcook2014-08-241-2/+2
* Include <sys/time.h> to get struct timevalbcook2014-08-241-1/+2
* Include <sys/select.h> to get selectbcook2014-08-244-4/+9
* Let SSL_CIPHER_description() allocate the buffer for the description,jsing2014-08-241-4/+6
* Replace the remaining uses of ssl3_put_cipher_by_char() with s2n and ajsing2014-08-2410-58/+38
* Remove non-standard GOST cipher suites (which are not compiled injsing2014-08-232-136/+2
* Replace the remaining ssl3_get_cipher_by_char() calls with n2s() andjsing2014-08-238-80/+60
* Three independent typos for `independent' or `independently'.miod2014-08-191-1/+1
* replace more ROTATE macros with plain-old C code.bcook2014-08-182-40/+19
* remove return value from HOST_c2l/l2c macrosbcook2014-08-188-106/+106
* fixed overrid(d)en typotobias2014-08-141-2/+2
* Merge a patch that i successfully pushed to OpenSSL,schwarze2014-08-122-2/+2
* Replace intrinsic ROTATE macros with an inline.bcook2014-08-121-41/+10
* Guard RSA / RC4-5 ASM when NO_ASM is not definedbcook2014-08-112-5/+6
* Check the return value of sk_SSL_CIPHER_new_null(), since it allocatesjsing2014-08-112-10/+14
* Unchecked memory allocation and potential leak upon error inmiod2014-08-112-10/+24
* Remove now-unused SSL2_STATE as well as ssl2-specific state machine values.miod2014-08-112-234/+2
* Currently, ssl3_put_char_by_bytes(NULL, NULL) is just a long handed wayjsing2014-08-116-26/+24
* Provide a ssl3_get_cipher_by_id() function that allows ciphers to be lookedjsing2014-08-116-30/+36
* Tweak cipher list comments and add missing cipher value comments.jsing2014-08-102-10/+52
* Remove disabled (weakened export and non-ephemeral DH) cipher suites fromjsing2014-08-102-940/+10
* Since we no longer need to support SSLv2-style cipher lists, startjsing2014-08-1032-182/+68
* Fix CVE-2014-3507, avoid allocating and then leaking a fresh fragmentguenther2014-08-082-4/+14
* Fix CVE-2014-3508, pretty printing and OID validation:guenther2014-08-082-12/+28
* Correct test reversed during merge of fix for CVE-2014-3509guenther2014-08-072-4/+4
* Fix CVE-2014-3506, DTLS handshake message size checks. Fromguenther2014-08-072-32/+44
* Oops, revert changes commited by mistake. The previous commit was supposedmiod2014-08-0713-53/+59
* When you expect a function to return a particular value, don't put a commentmiod2014-08-0715-71/+59
* Fix CVE-2014-3511; TLS downgrade, verbatim diffderaadt2014-08-072-10/+54
* merge CVE-2014-3510; Fix DTLS anonymous EC(DH) denial of servicederaadt2014-08-072-2/+18
* merge fix for CVE-2014-3509 -- basically a missing s->hit check; ok guentherderaadt2014-08-062-18/+26
* Prevent a possible use after free by mimicing the s3_srvr.c fixes contributed bymiod2014-08-062-8/+2
* Allow B64_EOF to follow a base64 padding character. This restores previousjsing2014-08-061-2/+3
* Correct error checks in EVP_read_pw_string_min(): UI_add_input_string()guenther2014-08-061-3/+3
* In chacha_init(), allow for a NULL iv. Reported by znz on github.miod2014-08-041-2/+3
* Fix a usage string; the proper spelling of 'alot' is 'a lot'.blambert2014-07-291-2/+2
* Remove SRP code. It contains a bug (this should not surprise anyone), buttedu2014-07-286-1816/+1
* The RSA, DH, and ECDH temporary key callbacks expect the number of keybitsguenther2014-07-286-18/+42
* Add missing year to copyright.jsing2014-07-252-4/+4
* BIO_free() returns immediately when the sole input is NULL.doug2014-07-2519-71/+45
* level_add_node(): if a memory allocation failure causes us to attempt to cleanmiod2014-07-231-4/+7
* Make sure PEM_def_callback() correctly handles negative buffer sizes; all usesmiod2014-07-231-10/+17
* Check the return value of the UI functions (including UI_new() which returnmiod2014-07-231-6/+11
* Now that DES_random_key() can be trusted, use it to generate DES keys in themiod2014-07-222-12/+10
* In DES_random_key(), force the generated key to the odd parity before checkingmiod2014-07-221-8/+8
* Handle failure of NETSCAPE_SPKI_b64_encode() and don't leak memoryguenther2014-07-221-6/+10
* Kill a bunch more BUF_strdup's - these are converted to have a check forbeck2014-07-226-15/+20
* Mark the format string argument to BIO_*printf as not being allowed to be NULLguenther2014-07-201-5/+7
* Fix strtonum range to unbreak -pass fd:0lteo2014-07-191-2/+2