summaryrefslogtreecommitdiffstats
path: root/lib/libssl/src/crypto (follow)
Commit message (Expand)AuthorAgeFilesLines
* pull string for memcpy; ok hshoexer@martynas2009-08-071-1/+2
* resolve conflictsdjm2009-04-0624-64/+116
* import of OpenSSL 0.9.8kdjm2009-04-0631-120/+15289
* convert a strdup (into a purpose-allocated buffer) in libcrypto to adjm2009-01-121-2/+3
* resolve conflictsdjm2009-01-09223-2853/+2919
* import openssl-0.9.8jdjm2009-01-0992-925/+5697
* update to openssl-0.9.8i; tested by several, especially krw@djm2009-01-0549-334/+1015
* fix some cause of bad TEXTREL on i386 and amd64otto2008-09-195-14/+64
* use one call to arc4random_buf() instead of lots of arc4random()djm2008-09-101-8/+2
* Fix merge botch.kettenis2008-09-071-3/+0
* remove duplicate definition of OPENSSL_DSA_MAX_MODULUS_BITS spotteddjm2008-09-061-2/+0
* remerge local tweaks, update per-arch configuration headers, updatedjm2008-09-065-20/+25
* resolve conflictsdjm2008-09-06432-8802/+21473
* import of OpenSSL 0.9.8hdjm2008-09-06221-5766/+51643
* fix memory leak (in one case of unaligned buffers); from Markus Kvetterderaadt2008-02-261-2/+3
* Proper use of fseek/fseeko macros.tobias2007-09-101-1/+1
* http://openssl.org/news/patch-CVE-2007-3108.txt; ok pval, deraadtmarkus2007-08-211-13/+65
* Add proper checks against fgets failure. From Charles Longeau.ray2007-04-061-1/+2
* remove some bogus *p tests from charles longeautedu2007-03-203-5/+5
* openssl security fixes, diff from markus@, ok & "commit it" djm@pvalchev2006-10-0410-0/+81
* fix RSA signature padding vulnerability in OpenSSL libcrypto CVE-2006-4339;djm2006-09-091-0/+17
* resolve conflictsdjm2006-06-27109-1530/+2811
* import of openssl-0.9.7jdjm2006-06-2745-176/+1107
* potential fd leak (we will fix this before we move to cloning)deraadt2006-06-081-1/+3
* backport checks for degenerate Diffie-Hellman public exponents fromdjm2006-05-044-0/+36
* make BN_is_prime() realise that 2 is, in fact, a prime number.djm2006-03-141-1/+3
* no need to byteswap for AES_ASM, from tom@markus2005-05-231-1/+9
* import i386 AES asm code from openssl.org; ok and help with testing djm@markus2005-05-102-1/+1550
* increase EVP_MAX_MD_SIZE to something sane (big enough for SHA512)djm2005-04-291-1/+1
* resolve conflictsdjm2005-04-29169-681/+2554
* import of openssl-0.9.7g; tested on platforms from alpha to zaurus, ok deraadt@djm2005-04-2959-24/+13442
* typomiod2005-04-251-2/+2
* fix lies about snprintfderaadt2005-04-231-2/+3
* enable openssl DSO (typo, it's -DDSO_DLFCN not -DSO_DLFCN); Douglas Santosmarkus2005-03-301-3/+3
* belive -> believemiod2005-03-292-2/+2
* adjust comment, open_dev_crypto() returns -1 on error.hshoexer2005-01-291-1/+1
* on error set correct pointer to NULL.hshoexer2005-01-261-2/+2
* machdep.xcrypt now has a different meaning: Instead of > 0 indicatingderaadt2004-06-151-14/+16
* update missing pieces from 0.9.7d; ok henningmarkus2004-04-253-11/+67
* from openssl, 1.50.2.9, make S/MIME encrypt work again.markus2004-04-251-4/+9
* backout for nowmarkus2004-04-083-67/+11
* merge 0.9.7dmarkus2004-04-0868-461/+482
* import openssl-0.9.7dmarkus2004-04-077-14/+237
* Unbreak rmd160. Was broken on sparc64 when compiled with gcc3. Fix and reporthshoexer2004-03-221-2/+2
* Insert missing ABORT if EC_GROUP_copy() fails.tom2004-03-211-1/+1
* return(00); -> return(0); markus@ okaaron2004-03-171-2/+2
* Cleanup and shrink ACSS_KEY a bit. Thus crank library minor.hshoexer2004-02-133-19/+24
* remove some debug code and cleanup..deraadt2004-02-041-18/+6
* OK, this time the AES soft keys work with ssh and such. I spent over 3deraadt2004-02-031-16/+63
* oops, software key gen bugderaadt2004-02-031-35/+10