| Commit message (Expand) | Author | Age | Files | Lines |
* | Avoid a NULL pointer deref when X509_get_pubkey() returns NULL. |  doug | 2015-03-15 | 1 | -2/+4 |
* | Fix CVE-2014-3570: properly calculate the square of a BIGNUM value. |  bcook | 2015-02-25 | 3 | -654/+303 |
* | Remove IMPLEMENT_STACK_OF noops. |  jsing | 2015-02-22 | 1 | -2/+1 |
* | If BN_rand() or BN_pseudo_rand() are called with a NULL rnd argument, |  jsing | 2015-02-19 | 1 | -3/+8 |
* | Memory leak in error path. Coverity CID 78822. |  miod | 2015-02-17 | 1 | -8/+9 |
* | Avoid calling BN_CTX_end() on a context that wasn't started. |  doug | 2015-02-15 | 1 | -4/+4 |
* | Regen |  miod | 2015-02-15 | 3 | -264/+282 |
* | If we decide to discard the provided seed buffer because its size is not |  miod | 2015-02-15 | 1 | -8/+6 |
* | Check ASN1_OCTET_STRING_new() for failure. Coverity CID 78904 |  miod | 2015-02-15 | 1 | -6/+8 |
* | In ec_wNAF_mul(), move the declaration of tmp_wNAF higher in scope, so that |  miod | 2015-02-15 | 1 | -6/+5 |
* | Remove asn1_ex_i2c() prototype, now that this function has been made static; |  miod | 2015-02-14 | 1 | -2/+1 |
* | 1.18 would introduce a possible out-of-bounds access in the error path; |  miod | 2015-02-14 | 1 | -7/+5 |
* | Remove DEBUG_PKCS5V2 code. |  miod | 2015-02-14 | 1 | -25/+1 |
* | Unchecked allocations in x509_name_canon(). |  miod | 2015-02-14 | 1 | -1/+5 |
* | Memory leak upon error in X509_add1_{trust,reject}_object. |  miod | 2015-02-14 | 1 | -7/+23 |
* | Manually expand IMPLEMENT_EXTERN_ASN1 macro (the only occurence in crypto). |  jsing | 2015-02-14 | 1 | -3/+10 |
* | Remove IMPLEMENT_COMPAT_ASN1() and related support code. Nothing uses it in |  miod | 2015-02-14 | 5 | -141/+7 |
* | Make asn1_ex_i2c() static. ok jsing@ |  miod | 2015-02-14 | 1 | -2/+4 |
* | Memory leak in `should not happen' condition; Coverity CID 78889. |  miod | 2015-02-14 | 1 | -4/+4 |
* | Memory leak upon error; Coverity CID 78857 |  miod | 2015-02-14 | 1 | -1/+4 |
* | Check i2d_name_canon() for failure (negative return). Coverity CID 78888. |  miod | 2015-02-14 | 1 | -6/+8 |
* | Possible NULL pointer dereferences. Coverity CID 21719, 21732. |  miod | 2015-02-14 | 2 | -3/+7 |
* | Potential NULL dereference in the error path; Coverity CID 21720 |  miod | 2015-02-14 | 1 | -2/+2 |
* | Coverity CID 21733 (unchecked allocation), 78823 (leak on error). |  miod | 2015-02-14 | 1 | -1/+6 |
* | Check for allocation error in RSA_eay_mod_exp(). Coverity CID 25217. |  miod | 2015-02-14 | 2 | -2/+7 |
* | Memory leaks upon error. Coverity CID 78874. |  miod | 2015-02-14 | 1 | -10/+10 |
* | Fix tests that got incorrectly inverted with the BN_CTX_get() return check |  jsing | 2015-02-14 | 1 | -5/+5 |
* | Expand ASN1_CHOICE*, ASN1_SEQUENCE* and associated macros, making the |  jsing | 2015-02-14 | 3 | -60/+416 |
* | Expand ASN1_CHOICE*, ASN1_SEQUENCE* and associated macros, making the |  jsing | 2015-02-14 | 1 | -9/+53 |
* | Attempt to correctly free temporary storage upon error. With help from |  miod | 2015-02-14 | 1 | -15/+18 |
* | Spell NULL correctly, be explicit with NULL checks and it is also easier to |  jsing | 2015-02-14 | 2 | -10/+6 |
* | Try and fix a bunch of memory leaks upon error; |  miod | 2015-02-14 | 3 | -12/+33 |
* | Consistently check the return value from BN_CTX_get() on assignment. |  jsing | 2015-02-14 | 4 | -42/+44 |
* | Don't leak memory on errors - fixes coverity issues 105353 105253 |  beck | 2015-02-13 | 1 | -4/+9 |
* | fix leaking of bn, coverity issue 105351 |  beck | 2015-02-13 | 1 | -1/+2 |
* | prevent a crash with openssl asn1parse -genstr FORMAT |  jsg | 2015-02-12 | 1 | -1/+5 |
* | If you do not support POSIX I/O then you're not tall enough to ride... |  jsing | 2015-02-12 | 4 | -23/+4 |
* | Guenther has plans for OPENSSL_NO_CMS, so revert this for the moment. |  beck | 2015-02-11 | 9 | -12/+123 |
* | Remove initialisers with default values from the ASN1 data structures. |  jsing | 2015-02-11 | 17 | -188/+23 |
* | get rid of OPENSSL_NO_CMS code we do not use. |  beck | 2015-02-11 | 9 | -123/+12 |
* | get rid of OPENSSL_NO_COMP code we don't use. |  beck | 2015-02-11 | 2 | -11/+2 |
* | Expand most of the ASN1_SEQUENCE* and associated macros, making the data |  jsing | 2015-02-11 | 17 | -146/+950 |
* | Enable building with -DOPENSSL_NO_DEPRECATED. |  doug | 2015-02-11 | 29 | -29/+68 |
* | More unifdef OPENSSL_NO_RFC3779 that got missed last time around. |  jsing | 2015-02-11 | 2 | -16/+2 |
* | unifdef OPENSSL_NO_RFC3779 - this is currently disabled and unlikely to |  jsing | 2015-02-10 | 6 | -2704/+4 |
* | Remove old interesting but not useful content. |  jsing | 2015-02-10 | 1 | -278/+0 |
* | unifdef OPENSSL_NO_RC5 |  jsing | 2015-02-10 | 3 | -29/+3 |
* | Remove RC5 code - this is not currently enabled and is not likely to ever |  jsing | 2015-02-10 | 8 | -1079/+0 |
* | Remove more IMPLEMENT_STACK_OF noops that have been hiding for the last |  jsing | 2015-02-10 | 13 | -39/+14 |
* | Remove crypto/store - part of which is "currently highly experimental". |  jsing | 2015-02-10 | 7 | -3505/+0 |