summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* 1. RAND_seed is now DEPRECATEDderaadt2014-04-172-2/+0
* RAND_seed now does nothing, so skip the operationderaadt2014-04-171-6/+0
* Do not feed RSA private key information to the random subsystem asderaadt2014-04-173-11/+0
* remove duplicated tests in if statementsjsg2014-04-171-4/+4
* Fix for ", " issue in jsing's knf scriptguenther2014-04-171-2/+2
* Do not need to map to another silly name for unistd.h here eitherderaadt2014-04-171-1/+0
* unistd.h is always in the same place; no need to #include the result ofderaadt2014-04-1715-30/+18
* minimal fix for ', ' issue in jsing's indent scriptderaadt2014-04-171-8/+9
* OpenSSL PR#3309: when looking for an extension, set the last found positionsthen2014-04-171-3/+3
* move enginetest to regress as was done with the other testsjsg2014-04-171-283/+0
* call the correct decrypt function in aes_cbc_cipher()jsg2014-04-171-1/+1
* tag some functions with bounded. idea and ok djmtedu2014-04-171-3/+6
* TANSTAAFL - delete the buf freelist code. if you need a better malloc, gettedu2014-04-169-260/+9
* add back SRP. i was being too greedy.tedu2014-04-1623-2/+1804
* Clean up dangerous strncpy use. This included a use where the resultingbeck2014-04-1610-123/+17
* - Why do we hide from the OpenSSL police, dad?miod2014-04-166-114/+23
* > As I walk through the valley of the shadow of deathtedu2014-04-1610-606/+4
* lots of ifdef cleanuptedu2014-04-163-400/+1
* repair knftedu2014-04-161-1/+1
* quoth the readme:tedu2014-04-16128-16802/+0
* delete a few leftoverstedu2014-04-161-5/+1
* fix a few bugs observed on http://www.viva64.com/en/b/0250/tedu2014-04-165-5/+3
* Thanks to the knobs in http://tools.ietf.org/html/rfc5746, we have a knobbeck2014-04-164-14/+6
* disentangle SRP code from TLStedu2014-04-1623-1804/+2
* whack the ifdef pinata:tedu2014-04-161-260/+5
* SSLv3_client_method() doesn't support TLSv1.*; use SSLv23_client_method()guenther2014-04-162-4/+4
* Zero-pad usec format to handle values less than 100,000 correctlyguenther2014-04-161-1/+1
* Initial KNF.jsing2014-04-165-1143/+1006
* Initial KNF.jsing2014-04-164-1035/+825
* Mandatory Surgeon Guenther's Warning: This code could not possibly betedu2014-04-161-24/+24
* Initial KNF.jsing2014-04-162-1903/+1662
* More KNF.jsing2014-04-162-100/+119
* First pass for KNF.jsing2014-04-162-1294/+1235
* revert. the full horror has only now revealed itself.tedu2014-04-161-26/+21
* replace some bio_snprintf crazy with regular snprintf.tedu2014-04-161-21/+26
* Kill the bogus "send an SSLv3/TLS hello in SSLv2 format" crap fromguenther2014-04-1614-650/+346
* More KNF.jsing2014-04-1610-104/+109
* Make this byzantine horror a shell of it's former self by stubbing thebeck2014-04-161-660/+17
* Some software expects RAND_status() to return 1 for success, so alwaysreyk2014-04-161-2/+10
* Clean up non-fatal error handling - we know which error numbers we havejsing2014-04-163-105/+0
* Sync the list of man pages for libcrypto, explicity rename conflictingmpi2014-04-1615-123/+86
* Remove pointless man pages that were not installed.mpi2014-04-164-383/+0
* Remove _CRAY references. Note that this pleads for the use of <stdint.h>miod2014-04-166-40/+5
* Remove DES_read_password and DES_read_2passwords which are `modern' flavoursmiod2014-04-162-144/+0
* Your operating system memory allocation functions are your friend. If theybeck2014-04-162-441/+199
* dead filetedu2014-04-161-521/+0
* API compat fix. RAND_load_file can never fail now. discovered and ok beck.tedu2014-04-161-3/+7
* missed vms commenttedu2014-04-161-4/+0
* first round of unifdef hammeringtedu2014-04-167-188/+2
* Remove non-posix support. Why is OPENSSL_isservice even here?tedu2014-04-161-229/+0