- 06 5月, 2014 1 次提交
-
-
由 Tim Hudson 提交于
-
- 05 5月, 2014 1 次提交
-
-
由 Geoff Thorpe 提交于
Signed-off-by: NGeoff Thorpe <geoff@openssl.org>
-
- 04 5月, 2014 6 次提交
-
-
由 Andy Polyakov 提交于
[MD5 is hardly relevant, just cleaning up repository]
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
sha/asm/sha256-armv4.pl: add ARMv8 code path.
-
由 Andy Polyakov 提交于
-
由 David Ramos 提交于
PR: 3338
-
- 02 5月, 2014 1 次提交
-
-
由 Geoff Thorpe 提交于
Even though the meat of dso_vms.c is compiled out on non-VMS builds, the (pre-)compiler still traverses some of the macro handling. This trips up at least one non-VMS build configuration, so this commit makes the skip-VMS case more robust. Signed-off-by: NGeoff Thorpe <geoff@openssl.org>
-
- 01 5月, 2014 2 次提交
-
-
由 Jeff Trawick 提交于
RT: 3304
-
由 Matt Caswell 提交于
-
- 30 4月, 2014 2 次提交
-
-
由 Geoff Thorpe 提交于
It's not clear whether this inconsistency could lead to an actual computation error, but it involved a BIGNUM being passed around the montgomery logic in an inconsistent state. This was found using flags -DBN_DEBUG -DBN_DEBUG_RAND, and working backwards from this assertion in 'ectest'; ectest: bn_mul.c:960: BN_mul: Assertion `(_bnum2->top == 0) || (_bnum2->d[_bnum2->top - 1] != 0)' failed Signed-off-by: NGeoff Thorpe <geoff@openssl.org>
-
由 Ben Laurie 提交于
-
- 28 4月, 2014 1 次提交
-
-
由 Matt Caswell 提交于
-
- 27 4月, 2014 3 次提交
-
-
由 Matt Caswell 提交于
-
由 Matt Caswell 提交于
-
由 Chris Rorvick 提交于
Signed-off-by: NChris Rorvick <chris@rorvick.com>
-
- 26 4月, 2014 5 次提交
-
-
由 mancha 提交于
Specify -f is for compilation flags. Add -d to synopsis section. Closes #77.
-
由 mancha 提交于
Fix eckey_priv_encode to return an error on failure of i2d_ECPrivateKey.
-
由 Geoff Thorpe 提交于
-
由 Geoff Thorpe 提交于
There are certainly many more constifiable strings in the various interfaces, which I hope to get to eventually. Signed-off-by: NGeoff Thorpe <geoff@openssl.org>
-
由 Geoff Thorpe 提交于
Gets rid of this; defined(@array) is deprecated at ../util/mkerr.pl line 792. (Maybe you should just omit the defined()?) defined(@array) is deprecated at ../util/mkerr.pl line 800. (Maybe you should just omit the defined()?) Signed-off-by: NGeoff Thorpe <geoff@openssl.org>
-
- 25 4月, 2014 2 次提交
-
-
由 Mark J. Cox 提交于
to keep up to date with releases. Reported because http://www.openssl.org/support/faq.html#MISC1 was out of date
-
由 Geoff Thorpe 提交于
o_time.h was removed in commit ff49a944, which breaks "make update" unless mkdir.pl is updated accordingly. Signed-off-by: NGeoff Thorpe <geoff@openssl.org>
-
- 24 4月, 2014 3 次提交
-
-
由 Steve Marquess 提交于
-
由 Andy Polyakov 提交于
algorithm suggested in following paper: Câmara, D.; Gouvêa, C. P. L.; López, J. & Dahab, R.: Fast Software Polynomial Multiplication on ARM Processors using the NEON Engine. http://conradoplg.cryptoland.net/files/2010/12/mocrysen13.pdf
-
由 Andy Polyakov 提交于
-
- 23 4月, 2014 1 次提交
-
-
由 Ben Laurie 提交于
-
- 22 4月, 2014 1 次提交
-
-
由 Ben Laurie 提交于
-
- 21 4月, 2014 1 次提交
-
-
由 Kaspar Brand 提交于
Fix typo that stopped SSL_CTX_get_{first,next}_certificate from working.
-
- 16 4月, 2014 3 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
When looking for an extension we need to set the last found position to -1 to properly search all extensions. PR#3309.
-
由 Dr. Stephen Henson 提交于
-
- 11 4月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 09 4月, 2014 3 次提交
-
-
由 Dr. Stephen Henson 提交于
Keep copy of any host, path and port values allocated by OCSP_parse_url and free as necessary.
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 08 4月, 2014 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Treat a zero length passed to ssleay_rand_add a no op: the existing logic zeroes the md value which is very bad. OpenSSL itself never does this internally and the actual call doesn't make sense as it would be passing zero bytes of entropy. Thanks to Marcus Meissner <meissner@suse.de> for reporting this bug. (cherry picked from commit 5be1ae28ef3c4bdec95b94f14e0e939157be550a)
-
由 Dr. Stephen Henson 提交于
A missing bounds check in the handling of the TLS heartbeat extension can be used to reveal up to 64k of memory to a connected client or server. Thanks for Neel Mehta of Google Security for discovering this bug and to Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for preparing the fix (CVE-2014-0160) (cherry picked from commit 96db9023b881d7cd9f379b0c154650d6c108e9a3)
-
- 07 4月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-