summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* In chacha_init(), allow for a NULL iv. Reported by znz on github.miod2014-08-041-2/+3
* Fix a usage string; the proper spelling of 'alot' is 'a lot'.blambert2014-07-291-2/+2
* Remove SRP code. It contains a bug (this should not surprise anyone), buttedu2014-07-286-1816/+1
* The RSA, DH, and ECDH temporary key callbacks expect the number of keybitsguenther2014-07-286-18/+42
* Add missing year to copyright.jsing2014-07-252-4/+4
* BIO_free() returns immediately when the sole input is NULL.doug2014-07-2519-71/+45
* level_add_node(): if a memory allocation failure causes us to attempt to cleanmiod2014-07-231-4/+7
* Make sure PEM_def_callback() correctly handles negative buffer sizes; all usesmiod2014-07-231-10/+17
* Check the return value of the UI functions (including UI_new() which returnmiod2014-07-231-6/+11
* Now that DES_random_key() can be trusted, use it to generate DES keys in themiod2014-07-222-12/+10
* In DES_random_key(), force the generated key to the odd parity before checkingmiod2014-07-221-8/+8
* Handle failure of NETSCAPE_SPKI_b64_encode() and don't leak memoryguenther2014-07-221-6/+10
* Kill a bunch more BUF_strdup's - these are converted to have a check forbeck2014-07-226-15/+20
* Mark the format string argument to BIO_*printf as not being allowed to be NULLguenther2014-07-201-5/+7
* Fix strtonum range to unbreak -pass fd:0lteo2014-07-191-2/+2
* missing newlinederaadt2014-07-181-2/+2
* avoid errx(); Jonas Termansenderaadt2014-07-171-3/+5
* avoid sys/param.h; Jonas Termansenderaadt2014-07-173-7/+8
* Missing bounds check in ssl3_get_certificate_request(), was not spotted inmiod2014-07-172-2/+12
* Free sktmp when it's no longer needed. By doing so, we fix a bunch of memory ...logan2014-07-171-2/+4
* do not need a variable to track locking, since all code paths have itderaadt2014-07-161-5/+2
* not needed anymorederaadt2014-07-142-1173/+0
* Fix memory leak upon error in ssl_parse_clienthello_use_srtp_ext().miod2014-07-142-12/+12
* whitespacederaadt2014-07-1445-172/+172
* Improve RAND_write_file(), chmod crud, etc.deraadt2014-07-141-27/+19
* Stop leaking internal library pointers in error messages.jsing2014-07-132-4/+4
* Explicitly initialise slen - this was not previously done due to a missingjsing2014-07-132-2/+4
* Convert error handling to SSLerr and ERR_asprintf_error_data.jsing2014-07-132-118/+108
* Convert d2i_SSL_SESSION to ASN1 primitives, instead of the horrificjsing2014-07-132-52/+594
* Remove license introduced with the PSK code, which has since been removed.jsing2014-07-132-54/+2
* Another compression remnant.jsing2014-07-132-4/+2
* Expand the tlsext_sigalg macros. The end result is about the same numberjsing2014-07-132-32/+38
* Rewrite i2d_SSL_SESSION to use the ASN1 primitives, rather than using thejsing2014-07-132-150/+196
* The bell tolls for BUF_strdup - Start the migration to usingbeck2014-07-1325-85/+92
* Fix memory leak.logan2014-07-131-1/+2
* OPENSSL_{malloc,free} -> {malloc,free}miod2014-07-1311-15/+15
* Warn about the use of BUF_strdup.miod2014-07-131-2/+4
* unbreak build this needed to be an and..beck2014-07-134-8/+8
* Make sure all error conditions in RSA_padding_add_PKCS1_PSS_mgf1() causemiod2014-07-131-3/+4
* Possible PBEPARAM leak in the error path.miod2014-07-131-6/+8
* dsa_priv_decode(): only destroy the object we've created, and with themiod2014-07-131-3/+5
* Check X509_NAME_oneline() return value when it will have to allocate memory.miod2014-07-131-1/+3
* EVP_DigestInit_ex() may be used to recycle an existing EVP_MD_CTX without havingmiod2014-07-131-3/+9
* Don't include asn1_mac.h if all you need is asn1.h.miod2014-07-131-2/+2
* Take out __bounded__ in the include files we use it in when not on OpenBSD.beck2014-07-134-5/+16
* No need to include evp_locl.h in there.miod2014-07-136-18/+6
* KNF and some code cleaning.jsing2014-07-132-72/+92
* remove silly castderaadt2014-07-131-2/+2
* Another large dose of KNF.jsing2014-07-132-472/+814
* Apply a large dose of KNF.jsing2014-07-122-252/+404