summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
* bump to 2.3.1bcook2015-09-272-6/+6
* Use ASN1_item_dup() instead of ASN1_dup().jsing2015-09-264-14/+10
* lint is dead: delete useless LINTLIBRARY commentsguenther2015-09-262-4/+2
* We don't need no stinking "EXAMPLE OF THE DSA" or README (the credits arejsing2015-09-264-252/+0
* typos in documentation; better wording, suggested by jmc@libressl-v2.3.0sobrado2015-09-2251-88/+88
* Don't wrap initialized variables: binutils appears to be mishandling themguenther2015-09-191-1/+3
* avoid void * pointer arithmeticbcook2015-09-182-4/+4
* Revert bn_print.c:r1.25 ("handle negative-zero in BN_bn2dec() too") forsthen2015-09-182-62/+44
* Remove more EVP_sha() SHA-0 references.bcook2015-09-173-6/+5
* Re-add missing comma from SHA-0 removal which breaks mlinks generation.sthen2015-09-172-2/+2
* include stdint.h for uint64_tbcook2015-09-172-2/+4
* tweak previous;jmc2015-09-141-2/+2
* Provide tls_config_insecure_noverifytime() in order to be able to disablejsing2015-09-146-6/+29
* Add support for disabling certificate and CRL validity checking.jsing2015-09-144-22/+30
* delete bogus trailing .Ns from SYNOPSIS .Ft macrosschwarze2015-09-142-12/+12
* fix formatting by adding the required quotes to .Fa in the SYNOPSISschwarze2015-09-144-22/+22
* Remove useless quoting from .Fo and .Fn function names, to preventschwarze2015-09-143-10/+10
* some conn_version and conn_cipher bits;jmc2015-09-142-9/+10
* Only two of the *rand48.c files need <math.h>, so just #include it in themguenther2015-09-143-4/+5
* use .Va for global variables, and .Vt where the type is includedschwarze2015-09-141-4/+3
* Expose EOF without close-notify via tls_close().jsing2015-09-142-6/+14
* Return an error if tls_handshake() or tls_close() is called on a contextjsing2015-09-141-2/+13
* add missing function return typesschwarze2015-09-141-2/+3
* Wrap <ifaddrs.h>, <netinet/in.h>, and <netinet/if_ether.h> so internalguenther2015-09-143-3/+7
* Wrap <net/if.h> and <net/if_dl.h> so internal calls go direct and all theguenther2015-09-142-2/+4
* Remove cast of int* to int*guenther2015-09-141-2/+2
* Finish wrapping <netdb.h> so that calls go direct and the symbols are all weakguenther2015-09-149-9/+24
* Temporarily revive MD4 for MS CHAP support.doug2015-09-1427-42/+1320
* Crank major version due to removal of SHA-0 and MD4 from libcrypto.doug2015-09-135-10/+10
* Remove MD4 support from LibreSSL.doug2015-09-1327-1320/+42
* Wrap <arpa/inet.h> and <arpa/nameser.h> so that calls go direct and theguenther2015-09-135-5/+11
* Remove SHA-0 support.doug2015-09-1321-649/+35
* For now, permit overriding of the malloc family, to make emacs happyguenther2015-09-131-6/+6
* Since a major bump of libcrypto is coming, remove OPENSSL_ia32cap andmiod2015-09-134-34/+4
* Handle negative-zero in BN_bn2dec() too, just like in BN_print().deraadt2015-09-132-44/+62
* Reorder functions for readability/consistency.jsing2015-09-132-470/+456
* BN does support negative-zero -- BN_print() sets the standard here.deraadt2015-09-132-6/+6
* work around the stupid semantics of SSL_read and SSL_write to make surebeck2015-09-131-3/+3
* Wrap <pwd.h> so that calls go direct and the symbols are all weak.guenther2015-09-132-7/+8
* Overshot w/PROTO_DEPRECATED: seed48_deterministic() is used internallyguenther2015-09-131-1/+2
* Only check for key truncation if no KDF function is being used.jsing2015-09-132-8/+8
* Don't leak conninfo - spotted by marko kreen.beck2015-09-131-2/+3
* Stop generating private keys in a network buffer.jsing2015-09-132-58/+58
* The number of rounds is just two digits in the salt. We've alreadymillert2015-09-131-2/+2
* Use ECDH_size() instead of rolling our own.jsing2015-09-134-24/+22
* Switch to miod's shiny new OPENSSL_cpu_caps() and we can now also enablejsing2015-09-132-6/+6
* Merge ech_ossl.c into ech_key.c - not much point having one file with ajsing2015-09-135-432/+294
* Nuke openssl/e_os2.h, since nothing should be using it.jsing2015-09-132-86/+1
* Provide ECDH_size().jsing2015-09-136-8/+22
* Check ECDH output buffer length and avoid truncation.jsing2015-09-136-12/+32