summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* nuke unused test programs; ok jsingderaadt2014-06-224-92/+4
* More KNF.jsing2014-06-222-10/+10
* KNF.jsing2014-06-226-416/+406
* KNF.jsing2014-06-2212-1922/+2162
* More KNF.jsing2014-06-226-18/+18
* matthew reminds me to update regress to reflect current spectedu2014-06-211-10/+3
* repair indentation for an inner loop; shorten some macros and variablederaadt2014-06-212-258/+270
* always compare memcmp against 0, for clarity.tedu2014-06-216-14/+14
* loosen the spec for timingsafe functions slightly, so as to nottedu2014-06-211-10/+5
* Pull the code that builds a DTLS sequence number out into its own functionjsing2014-06-216-46/+58
* Specify the correct strength bits for 3DES cipher suites.jsing2014-06-212-30/+26
* Add DTLS support to ssltest and wire up some regress tests.jsing2014-06-212-8/+41
* Switch to the ISC licensed versions of these files, which Google has madejsing2014-06-214-202/+52
* Pull out the sequence number selection and handle this up front. Also, thejsing2014-06-212-18/+12
* More KNF and clean up.jsing2014-06-212-26/+18
* More KNF.jsing2014-06-2116-122/+112
* KNFmiod2014-06-216-248/+274
* KNFmiod2014-06-216-356/+372
* Fix memory leak in error path.logan2014-06-212-4/+4
* Protect explicit_bzero() from link-time optimizationmatthew2014-06-211-7/+10
* hash in correct pointerderaadt2014-06-212-4/+4
* Remove the OPENSSL_*cap getenv's. A program should not be able toderaadt2014-06-206-50/+10
* wrap getenv OPENSSL_ALLOW_PROXY_CERTS in an issetugid check, to protectderaadt2014-06-202-4/+4
* KNFbeck2014-06-202-96/+112
* indentderaadt2014-06-202-4/+4
* rearrange so that the main function with the important comments is at the topotto2014-06-202-156/+160
* Work in progress on how to deal with the inherit unreliability ofbeck2014-06-202-0/+878
* Remove OPENSSL_instrument_halt and OPENSSL_far_spin, which both mightmiod2014-06-202-140/+0
* Fix incorrect bounds check in amd64 assembly version of bn_mul_mont();miod2014-06-204-8/+8
* Simple regress test for the amd64 bn_mul_mont bug found by Joyentmiod2014-06-203-2/+86
* Move the crypto/bn regression test one directory deeper in preparation formiod2014-06-203-7/+15
* arc4random: hard fail with raise(SIGKILL) if getentropy() returns -1matthew2014-06-201-3/+4
* convert CRYPTO_memcmp to timingsafe_memcmp based on current policy favoringtedu2014-06-1918-44/+44
* check stack push return and make some effort to clean up. ok beck miodtedu2014-06-192-4/+12
* improve error checking. set error code on error, and check malloc return.tedu2014-06-192-4/+26
* Move rs_chacha and rs_buf into the same memory page and don't mark itmatthew2014-06-191-22/+31
* Always call atexit handlers as if they were registered with __cxa_atexit.kettenis2014-06-183-19/+13
* Add regress tests to make sure arc4random(3) is reinitializedmatthew2014-06-183-2/+181
* In ssl3_send_newsession_ticket(), fix a memory leak in an error path.miod2014-06-182-4/+8
* Missinc calloc() return value check; ok deraadt@miod2014-06-181-1/+5
* Make sure to always invoke EVP_CIPHER_CTX_cleanup() before returning in themiod2014-06-182-8/+20
* Use asprintf() instead of a fixed 128-byte size in SSL_CIPHER_description()miod2014-06-182-22/+22
* In SSL_COMP_add_compression_method(), make sure error cases actually returnmiod2014-06-182-4/+4
* ssl_session_cmp is not a sort function, can use CRYPTO_memcmp here too.tedu2014-06-172-4/+8
* Use MAP_INHERIT_ZERO in arc4random(3)matthew2014-06-171-37/+44
* free iv, then cleanse. from Cyril Jouvetedu2014-06-152-4/+4
* Simplify EVP_MD_CTX_create() by just using calloc(). Also, use 0 ratherjsing2014-06-152-18/+8
* Simplify EVP_CIPHER_CTX_new() - stop pretending that EVP_CIPHER_CTX_init()jsing2014-06-152-12/+4
* Add missing OPENSSL_cleanse() in aead_aes_gcm_cleanup().jsing2014-06-152-2/+4
* The OPENSSL_cleanse() in aes_gcm_cleanup() only cleans the gcm field of thejsing2014-06-152-4/+4