summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* if (x) free(x) -> free(x); semantic patch generated with coccinelle, carefullymiod2014-05-2226-83/+43
* Add explicit #include lines for stdio.h, stdlib.h and string.h; these filesmiod2014-05-222-0/+6
* Expand the OPENSSL_{GLOBAL,EXPORT,IMPORT,EXTERN} macros - this rids thejsing2014-05-227-22/+20
* There are two actual uses of e_os2.h in libssl - an OPENSSL_GLOBAL (anjsing2014-05-228-14/+4
* Stop pulling pqueue.h into ssl_locl.h since only a small part of libssljsing2014-05-2212-12/+16
* Stop including kssl_lcl.h and nuke it from orbit - it is a no-op now.jsing2014-05-229-72/+0
* Hello? Yes, you're speaking with OPENSSL_SYS_UNIX.jsing2014-05-221-28/+0
* mark BIO_snprintf as deprecated, so warnings will be generated for it'sbeck2014-05-221-2/+2
* KNF.jsing2014-05-223-171/+154
* More KNF.jsing2014-05-222-368/+388
* No uses of UTF8_{getc,putc}() in ports, so remove them from the public header.guenther2014-05-222-9/+8
* KSSL is dead... nuke KSSL_DEBUG from orbit.jsing2014-05-2010-276/+0
* Bring UTF8_{getc,putc} up-to-date: it's been a decade since 5- and 6-byteguenther2014-05-204-93/+88
* Fix several bounds checks in ssl_add_clienthello_tlsext() andmiod2014-05-192-68/+78
* More KNF.jsing2014-05-191-60/+60
* More whack-a-mole^Wfips.jsing2014-05-192-18/+1
* It is perfectly valid to call free(NULL), so stop checking for non-NULLjsing2014-05-1929-128/+80
* If you need to allocate `a + b' bytes of memory, then don't allocate `a + b*2',miod2014-05-183-6/+6
* Make sure UTF8_getc() is invoked with the proper buffer size.miod2014-05-181-2/+2
* Out of all the openssl apps, just one of them has code to mess around withjsing2014-05-181-12/+0
* W_OK comes via unistd.h - nuke several #ifndef W_OK that attempt to handlejsing2014-05-181-13/+2
* Remove unused include.jsing2014-05-183-3/+0
* Group and sort includes.jsing2014-05-1850-214/+308
* Plug memory leaks upon error in OCSP_url_svcloc_new().miod2014-05-181-6/+9
* In OCSP_sendreq_bio(), cope with OCSP_sendreq_new() returning NULL.miod2014-05-181-4/+6
* In dtls1_reassemble_fragment() and dtls1_process_out_of_seq_message(), in casemiod2014-05-182-14/+6
* In ssl3_send_certificate_request(), when adding the extra payload ifmiod2014-05-182-2/+12
* Make sure ssl3_setup_buffers() does not return upon error with a freedmiod2014-05-182-14/+14
* bio_err is initialised in main, hence there is no need to initialise itjsing2014-05-1846-168/+16
* More KNF.jsing2014-05-1810-193/+208
* Omit -Werror if building with gcc3, for it triggers "redefinition of `pqueue'"miod2014-05-181-2/+6
* No need to check for NULL before invoking free(); use calloc() whenmiod2014-05-182-60/+14
* does sunos not have memmove? sorry, i guess sunos will not have libressl.tedu2014-05-171-21/+3
* unchecked malloc() return value in OCSP_sendreq_new().miod2014-05-171-0/+2
* KNFmiod2014-05-178-1274/+1332
* add missing header needed for mem{cpy,cmp}()chl2014-05-171-0/+1
* simple reallocarray to check multiplies. ok guenthertedu2014-05-171-6/+4
* no no md2tedu2014-05-176-48/+0
* no no seedtedu2014-05-172-17/+0
* deleted seed some time agotedu2014-05-1713-295/+0
* switch RSA key generation default to 2048 bits (matching ssh); ok miod@sthen2014-05-174-4/+4
* When OPENSSL_LOAD_CONF was added it ended up with more #if 0 code,jsing2014-05-163-94/+14
* Fix memory leaks upon failure.miod2014-05-152-27/+39
* Replace ASN1_GENERALIZEDTIME_adj(), ASN1_UTCTIME_adj() andmiod2014-05-153-25/+73
* No longer make pqueue.h a public (and installed) header file. Replace itsmiod2014-05-157-6/+12
* More KNF.jsing2014-05-154-7/+7
* Use C99 initialisers for the AEAD struct.jsing2014-05-151-9/+9
* KNF.jsing2014-05-151-70/+67
* Add a ChaCha20-Poly1305 AEAD EVP implementation to libcrypto, from Adamjsing2014-05-153-0/+272
* KNF.jsing2014-05-155-283/+343