1. 26 5月, 2023 1 次提交
  2. 12 4月, 2023 2 次提交
  3. 10 8月, 2021 1 次提交
  4. 27 2月, 2020 1 次提交
  5. 28 9月, 2019 1 次提交
  6. 10 9月, 2019 1 次提交
  7. 09 9月, 2019 1 次提交
  8. 05 9月, 2018 2 次提交
  9. 29 5月, 2018 1 次提交
  10. 18 5月, 2018 1 次提交
  11. 18 10月, 2017 1 次提交
  12. 26 9月, 2017 1 次提交
  13. 30 8月, 2017 2 次提交
  14. 08 4月, 2017 1 次提交
  15. 18 11月, 2016 1 次提交
  16. 16 6月, 2016 2 次提交
  17. 01 6月, 2016 1 次提交
  18. 18 5月, 2016 1 次提交
  19. 29 4月, 2016 1 次提交
  20. 28 4月, 2016 1 次提交
  21. 27 4月, 2016 1 次提交
    • R
      RSA, DSA, DH: Allow some given input to be NULL on already initialised keys · 1da12e34
      Richard Levitte 提交于
      The diverse {RSA,DSA,DH}_set0_* functions are made to allow some
      parameters to be NULL IF the corresponding numbers in the given key
      structure have already been previously initialised.  Specifically,
      this allows the addition of private components to be added to a key
      that already has the public half, approximately like this:
      
          RSA_get0_key(rsa, NULL, &e, NULL);
          RSA_get0_factors(rsa, &p, &q);
          /* calculate new d */
          RSA_set0_key(rsa, NULL, NULL, d);
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      1da12e34
  22. 09 4月, 2016 1 次提交
  23. 21 3月, 2016 1 次提交
  24. 08 3月, 2016 1 次提交
  25. 26 2月, 2016 1 次提交
  26. 12 2月, 2016 1 次提交
  27. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  28. 02 12月, 2015 1 次提交
  29. 04 9月, 2015 1 次提交
  30. 11 8月, 2015 1 次提交
  31. 09 6月, 2015 1 次提交
  32. 14 5月, 2015 1 次提交
  33. 05 5月, 2015 1 次提交
    • R
      Use safer sizeof variant in malloc · b4faea50
      Rich Salz 提交于
      For a local variable:
              TYPE *p;
      Allocations like this are "risky":
              p = OPENSSL_malloc(sizeof(TYPE));
      if the type of p changes, and the malloc call isn't updated, you
      could get memory corruption.  Instead do this:
              p = OPENSSL_malloc(sizeof(*p));
      Also fixed a few memset() calls that I noticed while doing this.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      b4faea50
  34. 01 5月, 2015 2 次提交
  35. 29 4月, 2015 1 次提交