1. 31 7月, 2023 1 次提交
  2. 10 8月, 2021 1 次提交
  3. 27 2月, 2020 1 次提交
  4. 18 5月, 2018 1 次提交
  5. 21 3月, 2018 1 次提交
  6. 13 2月, 2018 1 次提交
  7. 10 2月, 2018 1 次提交
  8. 20 11月, 2017 1 次提交
  9. 12 10月, 2017 3 次提交
  10. 08 6月, 2017 1 次提交
    • R
      make error tables const and separate header file · 52df25cf
      Rich Salz 提交于
      Run perltidy on util/mkerr
      Change some mkerr flags, write some doc comments
      Make generated tables "const" when genearting lib-internal ones.
      Add "state" file for mkerr
      Renerate error tables and headers
      Rationalize declaration of ERR_load_XXX_strings
      Fix out-of-tree build
      Add -static; sort flags/vars for options.
      Also tweak code output
      Moved engines/afalg to engines (from master)
      Use -static flag
      Standard engine #include's of errors
      Don't linewrap err string tables unless necessary
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/3392)
      52df25cf
  11. 27 4月, 2017 1 次提交
  12. 04 4月, 2017 1 次提交
  13. 26 1月, 2017 1 次提交
  14. 21 7月, 2016 1 次提交
  15. 16 6月, 2016 1 次提交
  16. 06 6月, 2016 1 次提交
  17. 24 5月, 2016 1 次提交
  18. 18 5月, 2016 2 次提交
  19. 29 4月, 2016 1 次提交
  20. 09 4月, 2016 2 次提交
  21. 05 4月, 2016 2 次提交
  22. 21 3月, 2016 1 次提交
  23. 10 3月, 2016 1 次提交
  24. 08 3月, 2016 1 次提交
  25. 29 1月, 2016 1 次提交
  26. 28 1月, 2016 1 次提交
    • M
      Prevent small subgroup attacks on DH/DHE · b128abc3
      Matt Caswell 提交于
      Historically OpenSSL only ever generated DH parameters based on "safe"
      primes. More recently (in version 1.0.2) support was provided for
      generating X9.42 style parameter files such as those required for RFC
      5114 support. The primes used in such files may not be "safe". Where an
      application is using DH configured with parameters based on primes that
      are not "safe" then an attacker could use this fact to find a peer's
      private DH exponent. This attack requires that the attacker complete
      multiple handshakes in which the peer uses the same DH exponent.
      
      A simple mitigation is to ensure that y^q (mod p) == 1
      
      CVE-2016-0701
      
      Issue reported by Antonio Sanso.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      b128abc3
  27. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  28. 08 1月, 2016 1 次提交
  29. 02 12月, 2015 1 次提交
  30. 30 9月, 2015 1 次提交
    • R
      Make update / libeay.num fix · 75f648aa
      Rich Salz 提交于
      Looks like someone forgot to do a "make update" since crypto/ts/Makefile
      keeps changing.  So include that.
      
      Second is that the declare_dh_bn macro fools the libeay.num script.
      The declarations are only needed in one file (dh_rfc5114) so remove
      them from the header and put the "raw" declarations directly into that
      file.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      75f648aa
  31. 20 9月, 2015 1 次提交
  32. 11 9月, 2015 1 次提交
  33. 04 9月, 2015 1 次提交
  34. 31 7月, 2015 1 次提交
  35. 09 6月, 2015 1 次提交