- 09 6月, 2015 1 次提交
-
-
由 Kurt Roeckx 提交于
Reviewed-by: NMatt Caswell <matt@openssl.org> MR #588
-
- 14 5月, 2015 1 次提交
-
-
由 Richard Levitte 提交于
There are header files in crypto/ that are used by a number of crypto/ submodules. Move those to crypto/include/internal and adapt the affected source code and Makefiles. The header files that got moved are: crypto/cryptolib.h crypto/md32_common.h Reviewed-by: NRich Salz <rsalz@openssl.org>
-
- 05 5月, 2015 1 次提交
-
-
由 Rich Salz 提交于
For a local variable: TYPE *p; Allocations like this are "risky": p = OPENSSL_malloc(sizeof(TYPE)); if the type of p changes, and the malloc call isn't updated, you could get memory corruption. Instead do this: p = OPENSSL_malloc(sizeof(*p)); Also fixed a few memset() calls that I noticed while doing this. Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 01 5月, 2015 2 次提交
-
-
由 Rich Salz 提交于
Don't check for NULL before calling OPENSSL_free Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
由 Rich Salz 提交于
This gets BN_.*free: BN_BLINDING_free BN_CTX_free BN_FLG_FREE BN_GENCB_free BN_MONT_CTX_free BN_RECP_CTX_free BN_clear_free BN_free BUF_MEM_free Also fix a call to DSA_SIG_free to ccgost engine and remove some #ifdef'd dead code in engines/e_ubsec. Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 29 4月, 2015 1 次提交
-
-
由 Rich Salz 提交于
Following ANSI C rules, remove the casts from calls to OPENSSL_malloc and OPENSSL_realloc. Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 25 3月, 2015 1 次提交
-
-
由 Rich Salz 提交于
Start ensuring all OpenSSL "free" routines allow NULL, and remove any if check before calling them. This gets DH_free, DSA_free, RSA_free Reviewed-by: NMatt Caswell <matt@openssl.org>
-
- 22 1月, 2015 1 次提交
-
-
由 Matt Caswell 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 28 3月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Add functions to return the "bits of security" for various public key algorithms. Based on SP800-57.
-
- 21 1月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 31 1月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
PR: 287
-
- 17 3月, 2002 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Ensure EVP_CipherInit() uses the correct encode/decode parameter if enc == -1 [Reported by Markus Friedl <markus@openbsd.org>] Fix typo in dh_lib.c (use of DSAerr instead of DHerr).
-
- 10 3月, 2002 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Make {RSA,DSA,DH}_new_method obtain and release an ENGINE functional reference in all cases.
-
- 26 9月, 2001 2 次提交
-
-
由 Geoff Thorpe 提交于
-
由 Geoff Thorpe 提交于
ENGINE surgery. DH, DSA, RAND, and RSA now use *both* "method" and ENGINE pointers to manage their hooking with ENGINE. Previously their use of "method" pointers was replaced by use of ENGINE references. See crypto/engine/README for details. Also, remove the ENGINE iterations from evp_test - even when the cipher/digest code is committed in, this functionality would require a different set of API calls.
-
- 06 9月, 2001 1 次提交
-
-
由 Geoff Thorpe 提交于
declaration and implementation had not. So a recent update recreated the original definition in libeay.num ... this corrects it and changes the "dh" code to the "up_ref" variant.
-
- 02 9月, 2001 1 次提交
-
-
由 Geoff Thorpe 提交于
See the commit log message for that for more information. NB: X509_STORE_CTX's use of "ex_data" support was actually misimplemented (initialisation by "memset" won't/can't/doesn't work). This fixes that but requires that X509_STORE_CTX_init() be able to handle errors - so its prototype has been changed to return 'int' rather than 'void'. All uses of that function throughout the source code have been tracked down and adjusted.
-
- 26 8月, 2001 1 次提交
-
-
由 Geoff Thorpe 提交于
dependant code has to directly increment the "references" value of each such structure using the corresponding lock. Apart from code duplication, this provided no "REF_CHECK/REF_PRINT" checking and violated encapsulation.
-
- 13 8月, 2001 1 次提交
-
-
由 Geoff Thorpe 提交于
setting stack (actually, array) values in ex_data. So only increment the global counters if the underlying CRYPTO_get_ex_new_index() call succeeds. This change doesn't make "ex_data" right (see the comment at the head of ex_data.c to know why), but at least makes the source code marginally less frustrating.
-
- 27 7月, 2001 1 次提交
-
-
由 Lutz Jänicke 提交于
circumstances.
-
- 24 6月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
count of the ENGINE is x is not NULL since it will be freed in {RSA,DSA,DH}_free().
-
- 30 4月, 2001 1 次提交
-
-
由 Geoff Thorpe 提交于
ENGINE code does not return a default, set an error.
-
- 30 11月, 2000 1 次提交
-
-
由 Geoff Thorpe 提交于
the initialisation and cleanup of "ex_data" elements to before an init() handler and after a finish() handler respectively.
-
- 07 11月, 2000 1 次提交
-
-
由 Richard Levitte 提交于
-
- 27 10月, 2000 1 次提交
-
-
由 Richard Levitte 提交于
At the same time, add VMS support for Rijndael.
-
- 02 6月, 2000 1 次提交
-
-
由 Richard Levitte 提交于
like Malloc, Realloc and especially Free conflict with already existing names on some operating systems or other packages. That is reason enough to change the names of the OpenSSL memory allocation macros to something that has a better chance of being unique, like prepending them with OPENSSL_. This change includes all the name changes needed throughout all C files.
-
- 20 4月, 2000 1 次提交
-
-
由 Geoff Thorpe 提交于
with RSA_METHOD (the **_get_default_methods do set the default value if it's not set). However, the code had some duplication and was a bit conter-intuitive.
-
- 28 1月, 2000 1 次提交
-
-
由 Dr. Stephen Henson 提交于
New -pkcs12 option to CA.pl. Document CA.pl script. Initialise and free up the extra DH fields (nothing uses them yet though).
-
- 24 1月, 2000 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Tidy up CRYPTO_EX_DATA structures.
-
- 02 9月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 24 8月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
DSA_METHOD to make it more consistent with RSA_METHOD.
-
- 24 4月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Reviewed by: PR:
-
- 20 4月, 1999 1 次提交
-
-
由 Ulf Möller 提交于
-
- 18 4月, 1999 1 次提交
-
-
由 Ben Laurie 提交于
-
- 22 3月, 1999 1 次提交
-
-
由 Ben Laurie 提交于
-
- 06 1月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
DSA_free(): this was causing crashes when for example an attempt was made to handle a (currently) unsupported DH public key. Also X509_PUBKEY_set()i wasn't checking errors from d2i_PublicKey().
-
- 31 12月, 1998 1 次提交
-
-
由 Ralf S. Engelschall 提交于
1. The already released version was 0.9.1c and not 0.9.1b 2. The next release should be 0.9.2 and not 0.9.1d, because first the changes are already too large, second we should avoid any more 0.9.1x confusions and third, the Apache version semantics of VERSION.REVISION.PATCHLEVEL for the version string is reasonable (and here .2 is already just a patchlevel and not major change). tVS: ----------------------------------------------------------------------
-
- 23 12月, 1998 2 次提交
-
-
由 Ralf S. Engelschall 提交于
-
由 Ralf S. Engelschall 提交于
-
- 22 12月, 1998 1 次提交
-
-
由 Ralf S. Engelschall 提交于
-