summaryrefslogtreecommitdiffstats
path: root/lib/libssl/src/crypto (follow)
Commit message (Expand)AuthorAgeFilesLines
* Place the ASN.1 template macros (and remaining implement macros) underjsing2015-07-251-3/+6
* Expand another ASN.1 template macro that snuck through last time around.jsing2015-07-251-2/+8
* Manually expand ASN.1 template macros - only change in generated assemblyjsing2015-07-253-16/+40
* Expand ASN.1 template macros that got missed in the last pass - only changejsing2015-07-253-11/+31
* Expand ASN.1 template macros - the generated assembly only differs byjsing2015-07-2513-141/+806
* Expand ASN.1 template macros - no change in generated assembly.jsing2015-07-251-56/+294
* Expand ASN.1 template macros - no change in generated assembly.jsing2015-07-251-89/+545
* Expand another wall of ASN.1 template macros - no change to generatedjsing2015-07-251-224/+1357
* Expand ASN.1 template macros - no change in generated assembly.jsing2015-07-251-76/+496
* Expand ASN.1 template macros - no change in generated assembly.jsing2015-07-251-60/+351
* Expand ASN.1 template macros - the generated assembly only differs byjsing2015-07-251-55/+351
* Expand ASN.1 template macros - no change in generated assembly.jsing2015-07-241-5/+27
* Expand ASN.1 template macros - no change in generated assembly.jsing2015-07-241-22/+144
* Expand ASN.1 template macros - the generated assembly only differs byjsing2015-07-241-51/+341
* Expand ASN1_ITEM_TEMPLATE/ASN1_EX_TEMPLATE_TYPE/ASN1_ITEM_TEMPLATE_ENDjsing2015-07-244-22/+106
* Expand IMPLEMENT_ASN1_MSTRING macros - the generated assembly only differsjsing2015-07-242-6/+42
* Correct #if/else logic in BIO's dgram_ctrl.doug2015-07-201-3/+3
* prefer string.h to strings.h ok guenther@ doug@bcook2015-07-201-2/+2
* Various memory leaks upon error or unchecked allocations.miod2015-07-201-4/+13
* Use V_ASN1_UNDEF instead of -1.miod2015-07-201-7/+7
* Check the return value of asn1_enc_save(). ok bcook@ doug@miod2015-07-201-2/+4
* When freeing an X509_CRL, if freeing the user-maintained meth_data fails,miod2015-07-201-3/+4
* In X509_PKEY_new(), make sure all allocation failures push an error to themiod2015-07-201-7/+15
* Remove OpenSSL engine RSAX.doug2015-07-194-701/+3
* Drop stupid (int) casts for the arguments of malloc() and friends. This ismiod2015-07-199-24/+24
* unifdef -UCBC_HANDLES_TRUNCATED_IOmiod2015-07-191-19/+1
* Verify ASN1 objects types before attempting to access them as a particularmiod2015-07-192-2/+6
* Now that it is safe to invoke X509_STORE_CTX_cleanup() if X509_STORE_CTX_init()miod2015-07-192-8/+16
* Put explicit braces around assignment used in a conditional.miod2015-07-191-2/+2
* Remove the logic responsible for outputting most AES-NI instructions asmiod2015-07-193-107/+0
* Replace `.byte 0x48,0x83,0xEC,0x08' with `sub \$8,%rsp' which is exactly themiod2015-07-191-2/+2
* Simplify X509_STORE_CTX_init and make it safe with stack variables.doug2015-07-191-58/+55
* Remove case that can never happen.doug2015-07-191-5/+1
* Fix Coverity 72742 - ret is overwritten immediately after this.beck2015-07-191-2/+1
* abort when ENGINE_remove fails, fix Coverity 21656bcook2015-07-191-5/+2
* rand_err doesn't exist anymore, coverity 78808beck2015-07-181-3/+3
* Coverity 21651beck2015-07-181-3/+7
* Dead code, Coverity 78798beck2015-07-181-3/+1
* Coverity ID 78910 - Yet another stupid API designed to not show failures. do thebeck2015-07-181-6/+8
* Check the return value of ASN1_STRING_set(), for it may fail to allocatemiod2015-07-182-6/+14
* Fix leak found by coverity, issue 78897 - which also brough tobeck2015-07-183-25/+33
* extenstion -> extensionmiod2015-07-171-1/+1
* Bump LIBRESSL_VERSION defines.bcook2015-07-161-3/+7
* Enforce V_ASN1_OCTET_STRING type before accessing the object as octet string;miod2015-07-161-2/+4
* After reading a password with terminal echo off, restore the terminal toguenther2015-07-161-6/+5
* Explicitely cast a char into unsigned long before shifting it left by 24, formiod2015-07-161-2/+2
* Check return value of all used functions in OCSP_REQUEST_print(); coversmiod2015-07-161-5/+9
* Make sure the `reject negative sizes' logic introduced in 1.34 is actuallymiod2015-07-161-3/+4
* Fix inverted test in previous. Commit message told what we intended, butmiod2015-07-151-2/+2
* Remove dead code. Coverity CID 21688miod2015-07-151-4/+1