1. 18 5月, 2016 1 次提交
  2. 12 5月, 2016 1 次提交
  3. 03 5月, 2016 2 次提交
  4. 03 3月, 2016 1 次提交
  5. 29 2月, 2016 1 次提交
  6. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  7. 20 1月, 2016 1 次提交
  8. 01 1月, 2016 1 次提交
  9. 20 12月, 2015 1 次提交
  10. 20 11月, 2015 1 次提交
  11. 11 11月, 2015 1 次提交
    • M
      Fix SSL_use_certificate_chain_file · a974e64a
      Matt Caswell 提交于
      The new function SSL_use_certificate_chain_file was always crashing in
      the internal function use_certificate_chain_file because it would pass a
      NULL value for SSL_CTX *, but use_certificate_chain_file would
      unconditionally try to dereference it.
      Reviewed-by: NStephen Henson <steve@openssl.org>
      a974e64a
  12. 03 10月, 2015 1 次提交
  13. 30 9月, 2015 1 次提交
    • D
      Fix no-stdio build · 984d6c60
      David Woodhouse 提交于
      Much related/similar work also done by
      Ivan Nestlerode <ivan.nestlerode@sonos.com>
      
         +Replace FILE BIO's with dummy ops that fail.
         +Include <stdio.h> for sscanf() even with no-stdio (since the declaration
          is there). We rely on sscanf() to parse the OPENSSL_ia32cap environment
          variable, since it can be larger than a 'long'. And we don't rely on the
          availability of strtoull().
         +Remove OPENSSL_stderr(); not used.
         +Make OPENSSL_showfatal() do nothing (currently without stdio there's
          nothing we can do).
         +Remove file-based functionality from ssl/. The function
          prototypes were already gone, but not the functions themselves.
         +Remove unviable conf functionality via SYS_UEFI
         +Add fallback definition of BUFSIZ.
         +Remove functions taking FILE * from header files.
         +Add missing DECLARE_PEM_write_fp_const
         +Disable X509_LOOKUP_hash_dir(). X509_LOOKUP_file() was already compiled out,
          so remove its prototype.
         +Use OPENSSL_showfatal() in CRYPTO_destroy_dynlockid().
         +Eliminate SRP_VBASE_init() and supporting functions. Users will need to
          build the verifier manually instead.
         +Eliminate compiler warning for unused do_pk8pkey_fp().
         +Disable TEST_ENG_OPENSSL_PKEY.
         +Disable GOST engine as is uses [f]printf all over the place.
         +Eliminate compiler warning for unused send_fp_chars().
      Signed-off-by: NRich Salz <rsalz@akamai.com>
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      984d6c60
  14. 17 9月, 2015 1 次提交
  15. 01 9月, 2015 1 次提交
  16. 23 5月, 2015 1 次提交
  17. 19 5月, 2015 1 次提交
  18. 09 5月, 2015 1 次提交
  19. 02 5月, 2015 1 次提交
    • R
      free NULL cleanup -- coda · 25aaa98a
      Rich Salz 提交于
      After the finale, the "real" final part. :)  Do a recursive grep with
      "-B1 -w [a-zA-Z0-9_]*_free" to see if any of the preceeding lines are
      an "if NULL" check that can be removed.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      25aaa98a
  20. 01 5月, 2015 1 次提交
    • R
      free NULL cleanup 5a · 222561fe
      Rich Salz 提交于
      Don't check for NULL before calling a free routine.  This gets X509_.*free:
          x509_name_ex_free X509_policy_tree_free X509_VERIFY_PARAM_free
          X509_STORE_free X509_STORE_CTX_free X509_PKEY_free
          X509_OBJECT_free_contents X509_LOOKUP_free X509_INFO_free
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      222561fe
  21. 17 4月, 2015 1 次提交
  22. 25 3月, 2015 1 次提交
  23. 23 3月, 2015 1 次提交
  24. 15 3月, 2015 1 次提交
  25. 29 1月, 2015 1 次提交
  26. 22 1月, 2015 1 次提交
  27. 11 12月, 2014 1 次提交
  28. 29 8月, 2014 5 次提交
  29. 09 8月, 2014 1 次提交
  30. 28 3月, 2014 1 次提交
    • D
      Security framework. · b362ccab
      Dr. Stephen Henson 提交于
      Security callback: selects which parameters are permitted including
      sensible defaults based on bits of security.
      
      The "parameters" which can be selected include: ciphersuites,
      curves, key sizes, certificate signature algorithms, supported
      signature algorithms, DH parameters, SSL/TLS version, session tickets
      and compression.
      
      In some cases prohibiting the use of a parameters will mean they are
      not advertised to the peer: for example cipher suites and ECC curves.
      In other cases it will abort the handshake: e.g DH parameters or the
      peer key size.
      
      Documentation to follow...
      b362ccab
  31. 06 2月, 2014 3 次提交
  32. 04 1月, 2014 1 次提交
  33. 25 9月, 2013 1 次提交