summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* Put back some parts of the public SSL API that should not have beenjsing2014-07-106-8/+56
* forgot to decompress here tootedu2014-07-102-17/+2
* Remove bogus preprocessor statements trying to pick the largest integermiod2014-07-104-32/+4
* check return value of write.bcook2014-07-101-4/+15
* crank major for decompression featuretedu2014-07-102-2/+2
* decompress libssl. ok beck jsingtedu2014-07-1049-1469/+77
* KNF comments, reflowing and moving out of the middle of argument lists inguenther2014-07-106-186/+300
* remove unused ecc_pkey_size.bcook2014-07-102-8/+4
* BN_free, BN_clear_free, BN_CTX_free, BN_BLINDING_free and BN_MONT_CTX_freejsing2014-07-106-55/+32
* Use a while loop instead of an ifdowhile loop.jsing2014-07-102-12/+10
* include <limits.h> for LONG_MIN/LONG_MAX.bcook2014-07-091-2/+2
* ASN1_STRING_free can handle NULL, so callers don't need to check. ok miodtedu2014-07-095-27/+17
* unfidef RL_DEBUG. hopefully it's been debugged by nowtedu2014-07-092-50/+2
* firebomb some MDEBUG leftoverstedu2014-07-091-87/+1
* unifdef a whole bunch of NO RSA/DSA/ECDH defines i deleted from libssltedu2014-07-0912-190/+12
* clean up if 0/if 1 code. we don't care anymore.tedu2014-07-092-119/+3
* move a commenttedu2014-07-091-3/+3
* reset host, port, path to null after freeing so the caller doesn'ttedu2014-07-091-1/+4
* stale prototypetedu2014-07-091-2/+1
* Make comments readable.jsing2014-07-091-27/+33
* More KNF.jsing2014-07-0919-322/+331
* KNF.jsing2014-07-092-123/+108
* ocsp_check_ids says "If algoritm mismatch let caller deal with it" beforetedu2014-07-091-6/+1
* Update to match the current state of crypto/rand, and remove MLINKS formiod2014-07-094-98/+15
* Remove mention that the PRNG needs to be seeded before invoking somemiod2014-07-0915-38/+4
* Unifdef -UPKCS_TESTVECT - we don't want the random data used in OAEP paddingmiod2014-07-091-6/+1
* {malloc,reallocarray} + memset(,0,) -> callocmiod2014-07-092-7/+5
* Replace memset(a, 0, ...); free(a); by explicit_bzero(a, ...); free(a); inmiod2014-07-091-2/+2
* Remove leading underscore from _BYTE_ORDER and _{LITTLE,BIG}_ENDIAN, to bemiod2014-07-0912-62/+62
* miod@ fixed the "bug" so remove reference to it in the man pod^Wpage.jsing2014-07-091-5/+0
* add <sys/filio.h> header for FIONBIObcook2014-07-091-1/+2
* Clean up and simplify SSL_CIPHER_description by always using asprintf. Ifjsing2014-07-092-108/+108
* Simplify error path of DH_check_pub_key()miod2014-07-091-8/+4
* KNFmiod2014-07-099-567/+599
* tedu the SSL export cipher handling - since we do not have enabled exportjsing2014-07-0921-724/+93
* cast ASN1_STRING (unsigned char *) to match strlcat's argument (char *)bcook2014-07-091-2/+2
* remove unused, private version strings except SSL_version_strbcook2014-07-0939-178/+38
* Make use of this wonderful modern C construct known as a `switch', instead ofmiod2014-07-091-11/+17
* KNFmiod2014-07-0911-906/+939
* Kill more FIPS tentacles by removing the private_AES_set_{enc,dec}rypt_key()miod2014-07-098-84/+60
* Be more strict in RSA_padding_check_X931(), and thus avoid a possiblemiod2014-07-091-2/+2
* Remove typecasts on password_callback.bcook2014-07-093-20/+15
* In the old days (not in this century), SSLeay 0.4.5 would create X.509 RSAmiod2014-07-091-14/+3
* Remove RSA_memory_lock(). This undocumented function sort-of serializes yourmiod2014-07-092-51/+2
* remove unused dynamic_cmd_defns_empty structure.bcook2014-07-091-4/+1
* RSA_NULL used to be a compile option allowing the RSA interfaces to bemiod2014-07-094-176/+4
* KNFmiod2014-07-0919-1967/+1959
* Mark the weakened 40-bit export ciphers as invalid - no one in their rightjsing2014-07-082-18/+18
* Remove SSL_FIPS.jsing2014-07-086-188/+172
* Nuke SSL_NOT_EXP since it does nothing.jsing2014-07-084-252/+250