1. 14 9月, 2017 1 次提交
  2. 29 8月, 2017 1 次提交
  3. 22 8月, 2017 1 次提交
    • P
      This has been added to avoid the situation where some host ctype.h functions · a1df06b3
      Pauli 提交于
      return true for characters > 127.  I.e. they are allowing extended ASCII
      characters through which then cause problems.  E.g. marking superscript '2' as
      a number then causes the common (ch - '0') conversion to number to fail
      miserably.  Likewise letters with diacritical marks can also cause problems.
      
      If a non-ASCII character set is being used (currently only EBCDIC), it is
      adjusted for.
      
      The implementation uses a single table with a bit for each of the defined
      classes.  These functions accept an int argument and fail for
      values out of range or for characters outside of the ASCII set.  They will
      work for both signed and unsigned character inputs.
      Reviewed-by: NAndy Polyakov <appro@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/4102)
      a1df06b3
  4. 08 8月, 2017 1 次提交
  5. 07 8月, 2017 2 次提交
  6. 03 8月, 2017 1 次提交
  7. 20 7月, 2017 1 次提交
  8. 30 6月, 2017 2 次提交
  9. 29 6月, 2017 2 次提交
  10. 28 6月, 2017 1 次提交
  11. 19 6月, 2017 1 次提交
  12. 15 6月, 2017 1 次提交
  13. 31 5月, 2017 3 次提交
  14. 26 5月, 2017 1 次提交
  15. 02 5月, 2017 1 次提交
  16. 26 4月, 2017 1 次提交
    • D
      Add support for custom signature parameters · 786dd2c2
      Dr. Stephen Henson 提交于
      Many signature types define the digest and public key type by a single OID
      such as ecdsa_with_sha256.
      
      Some types (RSA-PSS for example) use a single OID to indicate the signature
      scheme and additional parameters are encoded in the AlgorithmIdentifier.
      
      Add an X509_SIG_INFO structure to contain details about the signature type:
      specifically the digest algorithm, public key algorithm, security bits and
      various flags. This supports both existing algorithms and more complex
      types.
      
      Add accessors for the structure and a special case that retrieves signature
      information from a certificate.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/3301)
      786dd2c2
  17. 21 4月, 2017 1 次提交
  18. 20 4月, 2017 1 次提交
  19. 28 2月, 2017 1 次提交
  20. 21 2月, 2017 1 次提交
  21. 02 2月, 2017 1 次提交
  22. 25 1月, 2017 1 次提交
  23. 24 1月, 2017 1 次提交
  24. 13 1月, 2017 1 次提交
    • R
      Add "random malloc failure" tooling · f7edeced
      Rich Salz 提交于
      Still needs to be documented, somehow/somewhere.
      
      The env var OPENSSL_MALLOC_FAILURES controls how often malloc/realloc
      should fail.  It's a set of fields separated by semicolons.  Each field
      is a count and optional percentage (separated by @) which defaults to 100.
      If count is zero then it lasts "forever."  For example: 100;@25 means the
      first 100 allocations pass, then the rest have a 25% chance of failing
      until the program exits or crashes.
      
      If env var OPENSSL_MALLOC_FD parses as a positive integer, a record
      of all malloc "shouldfail" tests is written to that file descriptor.
      If a malloc will fail, and OPENSSL_NO_CRYPTO_MDEBUG_BACKTRACE is not set
      (platform specific), then a backtrace will be written to the descriptor
      when a malloc fails.  This can be useful because a malloc may fail but
      not be checked, and problems will only occur later.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/1252)
      f7edeced
  25. 08 1月, 2017 2 次提交
  26. 18 11月, 2016 1 次提交
  27. 18 9月, 2016 1 次提交
  28. 19 8月, 2016 1 次提交
  29. 17 8月, 2016 1 次提交
  30. 13 8月, 2016 2 次提交
  31. 06 8月, 2016 1 次提交
  32. 26 7月, 2016 1 次提交
  33. 25 7月, 2016 1 次提交