index
:
wireguard-openbsd
jd/histogram
jd/queueboosts
jd/simplify-queueing
master
WireGuard implementation for the OpenBSD kernel
Matt Dunwoodie
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
lib
/
libcrypto
/
cms
Age
Commit message (
Expand
)
Author
Files
Lines
2020-06-05
Remove remaining error *_str_functs[]
jsing
1
-137
/
+5
2019-10-04
Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey.
tb
3
-4
/
+27
2019-08-12
Provide a local version of X509_get0_subject_key_id()
jsing
1
-3
/
+11
2019-08-12
Inline the equivalent of ASN1_TYPE_unpack_sequence().
jsing
1
-3
/
+6
2019-08-11
Use ERR_asprintf_error_data() instead of ERR_add_error_data().
jsing
1
-3
/
+3
2019-08-11
Remove unsupported GOST 2012 NIDs.
jsing
1
-3
/
+1
2019-08-11
Disable DES3 since we do not currently provide DES3 keywrap.
jsing
1
-1
/
+7
2019-08-11
Remove label that is now unused (due to arc4random_buf() returning void).
jsing
1
-3
/
+2
2019-08-11
Fix loading of CMS error strings.
jsing
1
-5
/
+5
2019-08-11
Include string.h for explicit_bzero().
jsing
2
-2
/
+6
2019-08-11
Expand M_ASN1_new_of and M_ASN1_free_of macros.
jsing
9
-39
/
+39
2019-08-11
Use arc4random_buf() instead of RAND_bytes().
jsing
3
-12
/
+8
2019-08-11
Include string.h for memcmp()/memcpy().
jsing
5
-5
/
+15
2019-08-11
Use freezero() rather than OPENSSL_clear_free().
jsing
5
-15
/
+15
2019-08-11
Use explicit_bzero() instead of OPENSSL_cleanse().
jsing
2
-5
/
+5
2019-08-11
Use malloc(3) and free(3), rather than OPENSSL_{malloc,free}().
jsing
6
-33
/
+33
2019-08-11
Convert CMSerr() to CMSerror().
jsing
11
-240
/
+191
2019-08-11
Switch ASN.1 INT32 back to LONG.
jsing
2
-28
/
+28
2019-08-11
Expand a new macro that tried to get away...
jsing
1
-2
/
+8
2019-08-11
Expand ASN.1 macros.
jsing
8
-253
/
+1524
2019-08-11
We use DECLARE_STACK_OF rather than DEFINE_STACK_OF.
jsing
2
-7
/
+7
2019-08-11
Unlike OpenSSL we do not have our own special ssize_t.
jsing
3
-9
/
+9
2019-08-10
Fix style(9) and whitespace.
jsing
1
-208
/
+203
2019-08-10
More style(9) and whitespace.
jsing
1
-332
/
+291
2019-08-10
More style(9), whitespace and readability fixes.
jsing
14
-674
/
+902
2019-08-10
First pass at style(9).
jsing
14
-3936
/
+3936
2019-08-10
Fix includes for non-installed headers.
jsing
9
-25
/
+25
2019-08-10
Include cms.h instead of cmserr.h.
jsing
1
-2
/
+2
2019-08-10
Add $OpenBSD$ tag.
jsing
1
-0
/
+1
2019-08-10
Restore the per-file license for cms.h.
jsing
1
-5
/
+49
2019-08-10
Provide cms.h.
jsing
1
-0
/
+515
2019-08-10
Add $OpenBSD$ tags.
jsing
15
-0
/
+15
2019-08-10
Restore the original per-file licenses for CMS.
jsing
14
-70
/
+686
2019-08-10
Work towards supporting Cryptographic Message Syntax (CMS) in libcrypto.
jsing
15
-0
/
+6172
2016-09-04
Remove cms.
jsing
15
-7541
/
+0
2016-03-11
X509_free(3) is NULL-safe, so remove NULL checks before its calls.
mmcc
2
-8
/
+5
2015-09-10
Correct spelling of OPENSSL_cleanse.
jsing
4
-14
/
+14
2015-07-25
Expand another wall of ASN.1 template macros - no change to generated
jsing
1
-195
/
+1328
2015-06-11
Avoid an infinite loop that can occur when verifying a message with an
jsing
1
-2
/
+2
2015-05-15
Fix return paths with missing EVP_CIPHER_CTX_cleanup() calls.
jsg
1
-4
/
+4
2015-02-11
Guenther has plans for OPENSSL_NO_CMS, so revert this for the moment.
beck
1
-1
/
+3
2015-02-11
get rid of OPENSSL_NO_CMS code we do not use.
beck
1
-3
/
+1
2015-02-11
get rid of OPENSSL_NO_COMP code we don't use.
beck
1
-4
/
+1
2014-11-09
GOST crypto algorithms (well, most of them), ported from the removed GOST
miod
1
-1
/
+3
2014-10-22
Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes().
jsing
3
-14
/
+13
2014-10-18
None of these need to include <openssl/rand.h>
jsing
1
-2
/
+1
2014-07-25
BIO_free() returns immediately when the sole input is NULL.
doug
1
-3
/
+2
2014-07-12
if (x) FOO_free(x) -> FOO_free(x).
miod
3
-13
/
+8
2014-07-11
Avoid invoking EVP_CIPHER_CTX_cleanup() on uninitialized memory; from
miod
1
-2
/
+2
2014-07-11
Fix version number processing in cms_sd_set_version(); OpenSSL PR #3249 via
miod
1
-3
/
+3
[next]