summaryrefslogtreecommitdiff
path: root/src (unfollow)
Commit message (Expand)AuthorFilesLines
2014-06-21loosen the spec for timingsafe functions slightly, so as to nottedu1-10/+5
2014-06-21Pull the code that builds a DTLS sequence number out into its own functionjsing6-46/+58
2014-06-21Specify the correct strength bits for 3DES cipher suites.jsing2-30/+26
2014-06-21Add DTLS support to ssltest and wire up some regress tests.jsing2-8/+41
2014-06-21Switch to the ISC licensed versions of these files, which Google has madejsing4-202/+52
2014-06-21Pull out the sequence number selection and handle this up front. Also, thejsing2-18/+12
2014-06-21More KNF and clean up.jsing2-26/+18
2014-06-21More KNF.jsing16-122/+112
2014-06-21KNFmiod6-248/+274
2014-06-21KNFmiod6-356/+372
2014-06-21Fix memory leak in error path.logan2-4/+4
2014-06-21Protect explicit_bzero() from link-time optimizationmatthew1-7/+10
2014-06-21hash in correct pointerderaadt2-4/+4
2014-06-20Remove the OPENSSL_*cap getenv's. A program should not be able toderaadt6-50/+10
2014-06-20wrap getenv OPENSSL_ALLOW_PROXY_CERTS in an issetugid check, to protectderaadt2-4/+4
2014-06-20KNFbeck2-96/+112
2014-06-20indentderaadt2-4/+4
2014-06-20rearrange so that the main function with the important comments is at the topotto2-156/+160
2014-06-20Work in progress on how to deal with the inherit unreliability ofbeck2-0/+878
2014-06-20Remove OPENSSL_instrument_halt and OPENSSL_far_spin, which both mightmiod2-140/+0
2014-06-20Fix incorrect bounds check in amd64 assembly version of bn_mul_mont();miod4-8/+8
2014-06-20Simple regress test for the amd64 bn_mul_mont bug found by Joyentmiod3-2/+86
2014-06-20Move the crypto/bn regression test one directory deeper in preparation formiod3-7/+15
2014-06-20arc4random: hard fail with raise(SIGKILL) if getentropy() returns -1matthew1-3/+4
2014-06-19convert CRYPTO_memcmp to timingsafe_memcmp based on current policy favoringtedu18-44/+44
2014-06-19check stack push return and make some effort to clean up. ok beck miodtedu2-4/+12
2014-06-19improve error checking. set error code on error, and check malloc return.tedu2-4/+26
2014-06-19Move rs_chacha and rs_buf into the same memory page and don't mark itmatthew1-22/+31
2014-06-18Always call atexit handlers as if they were registered with __cxa_atexit.kettenis3-19/+13
2014-06-18Add regress tests to make sure arc4random(3) is reinitializedmatthew3-2/+181
2014-06-18In ssl3_send_newsession_ticket(), fix a memory leak in an error path.miod2-4/+8
2014-06-18Missinc calloc() return value check; ok deraadt@miod1-1/+5
2014-06-18Make sure to always invoke EVP_CIPHER_CTX_cleanup() before returning in themiod2-8/+20
2014-06-18Use asprintf() instead of a fixed 128-byte size in SSL_CIPHER_description()miod2-22/+22
2014-06-18In SSL_COMP_add_compression_method(), make sure error cases actually returnmiod2-4/+4
2014-06-17ssl_session_cmp is not a sort function, can use CRYPTO_memcmp here too.tedu2-4/+8
2014-06-17Use MAP_INHERIT_ZERO in arc4random(3)matthew1-37/+44
2014-06-15free iv, then cleanse. from Cyril Jouvetedu2-4/+4
2014-06-15Simplify EVP_MD_CTX_create() by just using calloc(). Also, use 0 ratherjsing2-18/+8
2014-06-15Simplify EVP_CIPHER_CTX_new() - stop pretending that EVP_CIPHER_CTX_init()jsing2-12/+4
2014-06-15Add missing OPENSSL_cleanse() in aead_aes_gcm_cleanup().jsing2-2/+4
2014-06-15The OPENSSL_cleanse() in aes_gcm_cleanup() only cleans the gcm field of thejsing2-4/+4
2014-06-15Rename ssl3_record_sequence_update() to ssl3_record_sequence_increment(),jsing7-55/+28
2014-06-15oops, typo. James Hartley is fast at trying -currentderaadt1-2/+2
2014-06-15In srandomdev(), use arc4random_buf() instead of from the kernel.deraadt1-4/+3
2014-06-14Add more bounded attributes to the buffer and md5/sha headers in libsslavsm6-38/+70
2014-06-13typomiod2-4/+4
2014-06-13For now... assume success of getentropy() just like we assumed successderaadt1-3/+3
2014-06-13Correctly calculate the key block length when using export ciphers.jsing2-2/+10
2014-06-13Overhaul the keyblock handling in ssl3_change_cipher_state(). Usejsing1-32/+45