summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
* Expand the OPENSSL_{GLOBAL,EXPORT,IMPORT,EXTERN} macros - this rids thejsing2014-05-2214-44/+40
* There are two actual uses of e_os2.h in libssl - an OPENSSL_GLOBAL (anjsing2014-05-228-14/+4
* Stop pulling pqueue.h into ssl_locl.h since only a small part of libssljsing2014-05-2212-12/+16
* Stop including kssl_lcl.h and nuke it from orbit - it is a no-op now.jsing2014-05-229-72/+0
* Hello? Yes, you're speaking with OPENSSL_SYS_UNIX.jsing2014-05-222-56/+0
* mark BIO_snprintf as deprecated, so warnings will be generated for it'sbeck2014-05-222-4/+4
* KNF.jsing2014-05-226-342/+308
* More KNF.jsing2014-05-222-368/+388
* No uses of UTF8_{getc,putc}() in ports, so remove them from the public header.guenther2014-05-224-18/+16
* fix MALLOC_STATS (not compiled in by default); ok tedu@otto2014-05-211-18/+19
* KSSL is dead... nuke KSSL_DEBUG from orbit.jsing2014-05-2010-276/+0
* Bring UTF8_{getc,putc} up-to-date: it's been a decade since 5- and 6-byteguenther2014-05-208-186/+176
* Fix several bounds checks in ssl_add_clienthello_tlsext() andmiod2014-05-192-68/+78
* More KNF.jsing2014-05-191-60/+60
* More whack-a-mole^Wfips.jsing2014-05-192-18/+1
* It is perfectly valid to call free(NULL), so stop checking for non-NULLjsing2014-05-1929-128/+80
* If you need to allocate `a + b' bytes of memory, then don't allocate `a + b*2',miod2014-05-186-12/+12
* Make sure UTF8_getc() is invoked with the proper buffer size.miod2014-05-182-4/+4
* factor out a bit of the chunk index code and use it to make sure that atedu2014-05-181-14/+33
* Out of all the openssl apps, just one of them has code to mess around withjsing2014-05-181-12/+0
* W_OK comes via unistd.h - nuke several #ifndef W_OK that attempt to handlejsing2014-05-181-13/+2
* Remove unused include.jsing2014-05-183-3/+0
* Group and sort includes.jsing2014-05-1850-214/+308
* Plug memory leaks upon error in OCSP_url_svcloc_new().miod2014-05-182-12/+18
* In OCSP_sendreq_bio(), cope with OCSP_sendreq_new() returning NULL.miod2014-05-182-8/+12
* In dtls1_reassemble_fragment() and dtls1_process_out_of_seq_message(), in casemiod2014-05-182-14/+6
* In ssl3_send_certificate_request(), when adding the extra payload ifmiod2014-05-182-2/+12
* Make sure ssl3_setup_buffers() does not return upon error with a freedmiod2014-05-182-14/+14
* bio_err is initialised in main, hence there is no need to initialise itjsing2014-05-1846-168/+16
* More KNF.jsing2014-05-1820-386/+416
* Omit -Werror if building with gcc3, for it triggers "redefinition of `pqueue'"miod2014-05-181-2/+6
* No need to check for NULL before invoking free(); use calloc() whenmiod2014-05-182-60/+14
* does sunos not have memmove? sorry, i guess sunos will not have libressl.tedu2014-05-172-42/+6
* unchecked malloc() return value in OCSP_sendreq_new().miod2014-05-172-0/+4
* KNFmiod2014-05-1716-2548/+2664
* add missing header needed for mem{cpy,cmp}()chl2014-05-171-0/+1
* correctly match size and buffer. from enh at googletedu2014-05-171-3/+3
* simple reallocarray to check multiplies. ok guenthertedu2014-05-172-12/+8
* no no md2tedu2014-05-179-57/+0
* no no seedtedu2014-05-174-34/+0
* deleted seed some time agotedu2014-05-1713-295/+0
* Add missing header needed by isdigit().chl2014-05-171-4/+5
* refactor some of the des crypt code to use fewer globals.tedu2014-05-172-42/+45
* switch RSA key generation default to 2048 bits (matching ssh); ok miod@sthen2014-05-175-5/+5
* update NAME and MLINKS for previous;jmc2014-05-162-5/+7
* document crypt_checkpasstedu2014-05-161-1/+14
* When OPENSSL_LOAD_CONF was added it ended up with more #if 0 code,jsing2014-05-167-190/+30
* use $2b in the bcrypt example, ok tedusthen2014-05-161-3/+3
* Fix memory leaks upon failure.miod2014-05-154-54/+78
* Replace ASN1_GENERALIZEDTIME_adj(), ASN1_UTCTIME_adj() andmiod2014-05-156-50/+146