- 18 9月, 2015 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NRich Salz <rsalz@openssl.org>
-
- 17 9月, 2015 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NRich Salz <rsalz@openssl.org>
-
- 03 9月, 2015 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 14 5月, 2015 1 次提交
-
-
由 Richard Levitte 提交于
There are header files in crypto/ that are used by a number of crypto/ submodules. Move those to crypto/include/internal and adapt the affected source code and Makefiles. The header files that got moved are: crypto/cryptolib.h crypto/md32_common.h Reviewed-by: NRich Salz <rsalz@openssl.org>
-
- 05 5月, 2015 1 次提交
-
-
由 Rich Salz 提交于
For a local variable: TYPE *p; Allocations like this are "risky": p = OPENSSL_malloc(sizeof(TYPE)); if the type of p changes, and the malloc call isn't updated, you could get memory corruption. Instead do this: p = OPENSSL_malloc(sizeof(*p)); Also fixed a few memset() calls that I noticed while doing this. Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 02 5月, 2015 1 次提交
-
-
由 Rich Salz 提交于
After the finale, the "real" final part. :) Do a recursive grep with "-B1 -w [a-zA-Z0-9_]*_free" to see if any of the preceeding lines are an "if NULL" check that can be removed. Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 24 3月, 2015 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NRich Salz <rsalz@openssl.org>
-
- 09 2月, 2015 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NAndy Polyakov <appro@openssl.org>
-
- 06 2月, 2015 1 次提交
-
-
由 Rich Salz 提交于
The mkstack.pl script now generates the entire safestack.h file. It generates output that follows the coding style. Also, removed all instances of the obsolete IMPLEMENT_STACK_OF macro. Reviewed-by: NAndy Polyakov <appro@openssl.org>
-
- 28 1月, 2015 1 次提交
-
-
由 Rich Salz 提交于
Remove support for SHA0 and DSS0 (they were broken), and remove the ability to attempt to build without SHA (it didn't work). For simplicity, remove the option of not building various SHA algorithms; you could argue that SHA_224/256/384/512 should be kept, since they're like crypto algorithms, but I decided to go the other way. So these options are gone: GENUINE_DSA OPENSSL_NO_SHA0 OPENSSL_NO_SHA OPENSSL_NO_SHA1 OPENSSL_NO_SHA224 OPENSSL_NO_SHA256 OPENSSL_NO_SHA384 OPENSSL_NO_SHA512 Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 22 1月, 2015 2 次提交
-
-
由 Matt Caswell 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
由 Matt Caswell 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 28 6月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
PR#3014
-
- 05 12月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 14 12月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 01 9月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
a delta CRL in addition to a full CRL. Check and search delta in addition to the base.
-
- 29 8月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Tidy CRL scoring system. Add new CRL path validation error.
-
- 21 8月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 04 8月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
fields.
-
- 07 9月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Fix additional gcc 4.2 value not used warnings.
-
- 03 10月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
create, free and set default CRL method.
-
- 21 9月, 2006 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
loaded. Add new function X509_CRL_get0_by_serial() to lookup a revoked entry to avoid the need to access the structure directly. Add new X509_CRL_METHOD to allow common CRL operations (verify, lookup) to be redirected.
-
- 10 9月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
based on subject name. New thread safe functions to retrieve matching STACK from X509_STORE. Cache some IDP components.
-
- 24 7月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 02 10月, 2005 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 01 10月, 2005 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 02 9月, 2005 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 09 12月, 2004 1 次提交
-
-
由 Dr. Stephen Henson 提交于
are performed.
-
- 05 10月, 2004 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 27 7月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
More linker bloat reorganisation: Split private key PEM and normal PEM handling. Private key handling needs to link in stuff like PKCS#8. Relocate the ASN1 *_dup() functions, to the relevant ASN1 modules using new macro IMPLEMENT_ASN1_DUP_FUNCTION. Previously these were all in crypto/x509/x_all.c along with every ASN1 BIO/fp function which linked in *every* ASN1 function if a single dup was used. Move the authority key id ASN1 structure to a separate file. This is used in the X509 routines and its previous location linked in all the v3 extension code. Also move ASN1_tag2bit to avoid linking in a_bytes.c which is now largely obsolete. So far under Linux stripped binary with single PEM_read_X509 is now 238K compared to 380K before these changes.
-
- 23 2月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
prototype hack. This unfortunately means that every ASN1_*_END construct cannot have a trailing ;
-
- 09 12月, 2000 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Merge from the ASN1 branch of new ASN1 code to main trunk. Lets see if the makes it to openssl-cvs :-)
-
- 02 6月, 2000 1 次提交
-
-
由 Richard Levitte 提交于
like Malloc, Realloc and especially Free conflict with already existing names on some operating systems or other packages. That is reason enough to change the names of the OpenSSL memory allocation macros to something that has a better chance of being unique, like prepending them with OPENSSL_. This change includes all the name changes needed throughout all C files.
-
- 01 6月, 2000 1 次提交
-
-
由 Geoff Thorpe 提交于
yet tighter, and also put some heat on the rest of the library by insisting (correctly) that compare callbacks used in stacks are prototyped with "const" parameters. This has led to a depth-first explosion of compiler warnings in the code where 1 constification has led to 3 or 4 more. Fortunately these have all been resolved to completion and the code seems cleaner as a result - in particular many of the _cmp() functions should have been prototyped with "const"s, and now are. There was one little problem however; X509_cmp() should by rights compare "const X509 *" pointers, and it is now declared as such. However, it's internal workings can involve recalculating hash values and extensions if they have not already been setup. Someone with a more intricate understanding of the flow control of X509 might be able to tighten this up, but for now - this seemed the obvious place to stop the "depth-first" constification of the code by using an evil cast (they have migrated all the way here from safestack.h). Fortunately, this is the only place in the code where this was required to complete these type-safety changes, and it's reasonably clear and commented, and seemed the least unacceptable of the options. Trying to take the constification further ends up exploding out considerably, and indeed leads directly into generalised ASN functions which are not likely to cooperate well with this.
-
- 29 1月, 2000 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 20 10月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
tolerated in certificates.
-
- 18 9月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 03 6月, 1999 1 次提交
-
-
由 Ben Laurie 提交于
-
- 30 5月, 1999 1 次提交
-
-
由 Ben Laurie 提交于
-