- 24 3月, 2015 1 次提交
-
-
由 Rich Salz 提交于
Start ensuring all OpenSSL "free" routines allow NULL, and remove any if check before calling them. This gets ASN1_OBJECT_free and ASN1_STRING_free. Reviewed-by: NMatt Caswell <matt@openssl.org>
-
- 12 3月, 2015 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NAndy Polyakov <appro@openssl.org>
-
- 09 3月, 2015 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NRich Salz <rsalz@openssl.org>
-
- 26 2月, 2015 5 次提交
-
-
由 Matt Caswell 提交于
Updates to include SHA224, SHA256, SHA384 and SHA512. In particular note the restriction on setting md to NULL with regards to thread safety. Reviewed-by: NTim Hudson <tjh@openssl.org>
-
由 Rainer Jung 提交于
the extract-names.pl script. RT#3718 Reviewed-by: NRich Salz <rsalz@openssl.org>
-
由 Matt Caswell 提交于
Reviewed-by: NEmilia Käsper <emilia@openssl.org>
-
由 Matt Caswell 提交于
Reviewed-by: NEmilia Käsper <emilia@openssl.org>
-
由 Matt Caswell 提交于
Reviewed-by: NEmilia Käsper <emilia@openssl.org>
-
- 25 2月, 2015 1 次提交
-
-
由 Matt Caswell 提交于
the X509_V_FLAG_NO_ALT_CHAINS flag. Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
-
- 21 2月, 2015 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NMatt Caswell <matt@openssl.org>
-
- 10 2月, 2015 1 次提交
-
-
由 Emilia Kasper 提交于
Specifically, an ASN.1 NumericString in the certificate CN will fail UTF-8 conversion and result in a negative return value, which the "x509 -checkhost" command-line option incorrectly interpreted as success. Also update X509_check_host docs to reflect reality. Thanks to Sean Burford (Google) for reporting this issue. Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 04 2月, 2015 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NRich Salz <rsalz@openssl.org>
-
- 03 2月, 2015 1 次提交
-
-
由 Rich Salz 提交于
Remove outdated doc files. Fix windows build after old_des was removed. Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 29 1月, 2015 1 次提交
-
-
由 Rich Salz 提交于
Reviewed-by: NMatt Caswell <matt@openssl.org>
-
- 28 1月, 2015 2 次提交
-
-
由 Matt Caswell 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
由 Rich Salz 提交于
Remove support for SHA0 and DSS0 (they were broken), and remove the ability to attempt to build without SHA (it didn't work). For simplicity, remove the option of not building various SHA algorithms; you could argue that SHA_224/256/384/512 should be kept, since they're like crypto algorithms, but I decided to go the other way. So these options are gone: GENUINE_DSA OPENSSL_NO_SHA0 OPENSSL_NO_SHA OPENSSL_NO_SHA1 OPENSSL_NO_SHA224 OPENSSL_NO_SHA256 OPENSSL_NO_SHA384 OPENSSL_NO_SHA512 Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 27 1月, 2015 1 次提交
-
-
由 Rich Salz 提交于
A DES algorithm mode, known attacks, no EVP support. Flushed. Reviewed-by: NAndy Polyakov <appro@openssl.org>
-
- 26 1月, 2015 1 次提交
-
-
由 Rich Salz 提交于
Per discussion: should not exit. Should not print to stderr. Errors are ignored. Updated doc to reflect that, and the fact that this function is to be avoided. Reviewed-by: NMatt Caswell <matt@openssl.org> Reviewed-by: NTim Hudson <tjh@openssl.org> Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
-
- 07 1月, 2015 1 次提交
-
-
由 Rich Salz 提交于
Show only the #define, not the values, in BIO_f_buffer. Data abstraction and we can remove a "see also" entry. Remove internal forward reference to NOTES in EVP_EncryptInit; just say "see below" as we do in the other pages. Add missing (3) in pem.pod so the L<> entry is consistent. Fix entry to point to the "master" page, not the symlink'd one. Reviewed-by: NMatt Caswell <matt@openssl.org>
-
- 03 1月, 2015 1 次提交
-
-
由 Dr. Stephen Henson 提交于
MS Server gated cryptography is obsolete and dates from the time of export restrictions on strong encryption and is only used by ancient versions of MSIE. Reviewed-by: NMatt Caswell <matt@openssl.org>
-
- 12 12月, 2014 1 次提交
-
-
由 Rich Salz 提交于
In EVP_EncryptInit remove duplicate mention of EVP_idea_cbc() In EVP_PKEY_CTX_ctrl.pod remove EVP_PKEY_get_default_digest_nid since it is documented elsewhere. Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 09 12月, 2014 1 次提交
-
-
由 Matt Caswell 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 08 12月, 2014 1 次提交
-
-
由 Matt Caswell 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 27 11月, 2014 3 次提交
-
-
由 Matt Caswell 提交于
Minor changes made by Matt Caswell Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
-
由 Matt Caswell 提交于
Minor changes made by Matt Caswell. Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
-
由 Matt Caswell 提交于
Minor changes made by Matt Caswell. Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
-
- 21 11月, 2014 1 次提交
-
-
由 Rich Salz 提交于
Fix CONF_load_modules to CONF_modules_load. Document that it calls exit. Advise against using it now. Add an error print to stderr. Reviewed-by: NMatt Caswell <matt@openssl.org>
-
- 13 11月, 2014 1 次提交
-
-
由 Alok Menghrajani 提交于
Out is the buffer which needs to contain at least inl + cipher_block_size - 1 bytes. Outl is just an int*. Reviewed-by: NEmilia Käsper <emilia@openssl.org>
-
- 03 10月, 2014 1 次提交
-
-
由 Rich Salz 提交于
If data is NULL, return the size needed to hold the derived key. No other API to do this, so document the behavior. Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 01 10月, 2014 1 次提交
-
-
由 Rich Salz 提交于
Reviewed-by: NMatt Caswell <matt@openssl.org>
-
- 25 9月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NMatt Caswell <matt@openssl.org>
-
- 08 9月, 2014 3 次提交
-
-
由 Rich Salz 提交于
The original RT request included a patch. By the time we got around to doing it, however, the callback scheme had changed. So I wrote a new function RSA_check_key_ex() that uses the BN_GENCB callback. But thanks very much to Vinet Sharma <vineet.sharma@gmail.com> for the initial implementation. Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
-
由 Rich Salz 提交于
The function returns 0 or 1, only. Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
-
由 Rich Salz 提交于
The function returns 0 or 1, only. Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
-
- 05 9月, 2014 1 次提交
-
-
由 Emilia Kasper 提交于
i2d_re_X509_tbs re-encodes the TBS portion of the certificate. Reviewed-by: NRich Salz <rsalz@openssl.org> Reviewed-by: NDr Stephen Henson <steve@openssl.org>
-
- 30 8月, 2014 2 次提交
-
-
由 Rich Salz 提交于
Andy found an additional typo "can be can be". Now I have that silly "Que sera sera" song stuck in my head. Reviewed-by: NAndy Polyakov <appro@openssl.org>
-
由 Rich Salz 提交于
The doc says that port can be "*" to mean any port. That's wrong. Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
-
- 29 8月, 2014 1 次提交
-
-
由 Rich Salz 提交于
RT1665: aes documentation. Paul Green wrote a nice aes.pod file. But we now encourage the EVP interface. So I took his RT item and used it as impetus to add the AES modes to EVP_EncryptInit.pod I also noticed that rc4.pod has spurious references to some other cipher pages, so I removed them. RT2300: Clean up MD history (merged into RT1665) Put HISTORY section only in EVP_DigestInit.pod. Also add words to discourage use of older cipher-specific API, and remove SEE ALSO links that point to them. Make sure digest pages have a NOTE that says use EVP_DigestInit. Review feedback: More cleanup in EVP_EncryptInit.pod Fixed SEE ALSO links in ripemd160.pod, sha.pod, mdc2.pod, blowfish.pod, rc4.d, and des.pod. Re-order sections in des.pod for consistency Reviewed-by: NMatt Caswell <matt@openssl.org>
-
- 28 8月, 2014 2 次提交
-
-
由 Matt Caswell 提交于
When d2i_ECPrivateKey reads a private key with a missing (optional) public key, generate one automatically from the group and private key. Reviewed-by: NDr Stephen Henson <steve@openssl.org>
-
由 Mihai Militaru 提交于
I also removed some trailing whitespace and cleaned up the "see also" list. Reviewed-by: NEmilia Kasper <emilia@openssl.org>
-