1. 06 9月, 2016 1 次提交
  2. 02 8月, 2016 1 次提交
  3. 30 6月, 2016 1 次提交
  4. 11 6月, 2016 1 次提交
  5. 22 5月, 2016 1 次提交
  6. 18 5月, 2016 1 次提交
  7. 03 5月, 2016 1 次提交
  8. 08 4月, 2016 1 次提交
  9. 18 3月, 2016 1 次提交
  10. 06 2月, 2016 1 次提交
  11. 03 2月, 2016 1 次提交
    • D
      New BN functions. · 85a4807f
      Dr. Stephen Henson 提交于
      Add new function BN_bn2binpad() which checks the length of the output
      buffer and pads the result with zeroes if necessary.
      
      New functions BN_bn2lebinpad() and BN_lebin2bn() which use little endian
      format.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      85a4807f
  12. 29 1月, 2016 1 次提交
  13. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  14. 09 1月, 2016 1 次提交
  15. 08 1月, 2016 1 次提交
  16. 01 12月, 2015 1 次提交
  17. 26 11月, 2015 1 次提交
    • M
      Tighten up BN_with_flags usage and avoid a reachable assert · fd7d2520
      Matt Caswell 提交于
      The function rsa_ossl_mod_exp uses the function BN_with_flags to create a
      temporary copy (local_r1) of a BIGNUM (r1) with modified flags. This
      temporary copy shares some state with the original r1. If the state of r1
      gets updated then local_r1's state will be stale. This was occurring in the
      function so that when local_r1 was freed a call to bn_check_top was made
      which failed an assert due to the stale state. To resolve this we must free
      local_r1 immediately after we have finished using it and not wait until the
      end of the function.
      
      This problem prompted a review of all BN_with_flag usage within the
      codebase. All other usage appears to be correct, although often not
      obviously so. This commit refactors things to make it much clearer for
      these other uses.
      Reviewed-by: NEmilia Käsper <emilia@openssl.org>
      fd7d2520
  18. 10 11月, 2015 1 次提交
  19. 04 9月, 2015 1 次提交
  20. 28 8月, 2015 1 次提交
  21. 26 8月, 2015 1 次提交
  22. 11 8月, 2015 1 次提交
  23. 23 7月, 2015 1 次提交
  24. 24 6月, 2015 1 次提交
  25. 14 5月, 2015 1 次提交
  26. 06 5月, 2015 1 次提交
  27. 05 5月, 2015 1 次提交
    • R
      Use safer sizeof variant in malloc · b4faea50
      Rich Salz 提交于
      For a local variable:
              TYPE *p;
      Allocations like this are "risky":
              p = OPENSSL_malloc(sizeof(TYPE));
      if the type of p changes, and the malloc call isn't updated, you
      could get memory corruption.  Instead do this:
              p = OPENSSL_malloc(sizeof(*p));
      Also fixed a few memset() calls that I noticed while doing this.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      b4faea50
  28. 01 5月, 2015 2 次提交
  29. 29 4月, 2015 1 次提交
  30. 09 2月, 2015 1 次提交
  31. 22 1月, 2015 4 次提交
  32. 06 1月, 2015 2 次提交
  33. 31 12月, 2014 1 次提交
  34. 09 12月, 2014 2 次提交