1. 26 5月, 2023 1 次提交
  2. 12 4月, 2023 2 次提交
  3. 10 8月, 2021 1 次提交
  4. 27 2月, 2020 1 次提交
  5. 28 9月, 2019 1 次提交
  6. 24 8月, 2018 1 次提交
  7. 12 7月, 2018 3 次提交
  8. 03 5月, 2018 1 次提交
  9. 27 4月, 2018 1 次提交
  10. 31 3月, 2018 1 次提交
  11. 28 3月, 2018 2 次提交
  12. 02 2月, 2018 1 次提交
  13. 19 1月, 2018 1 次提交
  14. 16 1月, 2018 1 次提交
    • M
      Revert BN_copy() flag copy semantics change · 7d461736
      Matt Caswell 提交于
      Commit 9f944291 changed the semantics of BN_copy() to additionally
      copy the BN_FLG_CONSTTIME flag if it is set. This turns out to be
      ill advised as it has unintended consequences. For example calling
      BN_mod_inverse_no_branch() can sometimes return a result with the flag
      set and sometimes not as a result. This can lead to later failures if we
      go down code branches that do not support constant time, but check for
      the presence of the flag.
      
      The original commit was made due to an issue in BN_MOD_CTX_set(). The
      original PR fixed the problem in that function, but it was changed in
      review to fix it in BN_copy() instead. The solution seems to be to revert
      the BN_copy() change and go back to the originally proposed way.
      Reviewed-by: NPaul Dale <paul.dale@oracle.com>
      (Merged from https://github.com/openssl/openssl/pull/5080)
      7d461736
  15. 18 10月, 2017 1 次提交
  16. 09 10月, 2017 1 次提交
  17. 27 9月, 2017 2 次提交
  18. 26 6月, 2017 1 次提交
  19. 18 5月, 2016 1 次提交
  20. 08 3月, 2016 1 次提交
  21. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  22. 01 12月, 2015 1 次提交
  23. 10 11月, 2015 1 次提交
  24. 12 8月, 2015 1 次提交
  25. 01 8月, 2015 1 次提交
  26. 23 7月, 2015 1 次提交
  27. 14 5月, 2015 1 次提交
  28. 06 5月, 2015 1 次提交
  29. 05 5月, 2015 1 次提交
    • R
      Use safer sizeof variant in malloc · b4faea50
      Rich Salz 提交于
      For a local variable:
              TYPE *p;
      Allocations like this are "risky":
              p = OPENSSL_malloc(sizeof(TYPE));
      if the type of p changes, and the malloc call isn't updated, you
      could get memory corruption.  Instead do this:
              p = OPENSSL_malloc(sizeof(*p));
      Also fixed a few memset() calls that I noticed while doing this.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      b4faea50
  30. 29 4月, 2015 1 次提交
  31. 06 2月, 2015 1 次提交
  32. 22 1月, 2015 1 次提交
  33. 12 1月, 2015 1 次提交
  34. 08 12月, 2014 1 次提交
  35. 19 8月, 2014 1 次提交