- 15 5月, 2014 1 次提交
-
-
由 Michal Bozon 提交于
-
- 13 5月, 2014 5 次提交
-
-
由 Mike Frysinger 提交于
various link settings. PR#3332
-
由 Kurt Roeckx 提交于
-
由 Jean-Paul Calderone 提交于
-
由 Serguei E. Leontiev 提交于
Replace manual ASN.1 decoder with ASN1_get object. This will decode the tag and length properly and check against it does not exceed the supplied buffer length. PR#3335
-
由 Dr. Stephen Henson 提交于
-
- 12 5月, 2014 6 次提交
-
-
由 Andy Polyakov 提交于
"Teaser" means that it's not integrated yet and purpose of this commit is primarily informational, to exhibit design choices, such as how to handle alignment and endianness. In other words it's proof-of-concept code that EVP module will build upon.
-
由 Matt Caswell 提交于
-
由 Kurt Roeckx 提交于
-
由 Martin Brejcha 提交于
PR: 3327
-
由 Günther Noack 提交于
PR: 3317
-
由 Viktor Dukhovni 提交于
-
- 11 5月, 2014 2 次提交
-
-
由 Matt Caswell 提交于
-
由 Tim Hudson 提交于
-
- 10 5月, 2014 1 次提交
-
-
由 Matt Caswell 提交于
-
- 09 5月, 2014 4 次提交
-
-
由 Dr. Stephen Henson 提交于
If the key type does not match any CMS recipient type return an error instead of using a random key (MMA mitigation). This does not leak any useful information to an attacker. PR#3348
-
由 Geoff Thorpe 提交于
The "-unix <path>" argument allows s_server and s_client to use a unix domain socket in the filesystem instead of IPv4 ("-connect", "-port", "-accept", etc). If s_server exits gracefully, such as when "-naccept" is used and the requested number of SSL/TLS connections have occurred, then the domain socket file is removed. On ctrl-C, it is likely that the stale socket file will be left over, such that s_server would normally fail to restart with the same arguments. For this reason, s_server also supports an "-unlink" option, which will clean up any stale socket file before starting. If you have any reason to want encrypted IPC within an O/S instance, this concept might come in handy. Otherwise it just demonstrates that there is nothing about SSL/TLS that limits it to TCP/IP in any way. (There might also be benchmarking and profiling use in this path, as unix domain sockets are much lower overhead than connecting over local IP addresses). Signed-off-by: NGeoff Thorpe <geoff@openssl.org>
-
由 Tim Hudson 提交于
-
由 Tim Hudson 提交于
-
- 08 5月, 2014 2 次提交
-
-
由 Tim Hudson 提交于
-
由 Matt Caswell 提交于
-
- 07 5月, 2014 2 次提交
-
-
由 Geoff Thorpe 提交于
This patch resolves RT ticket #2608. Thanks to Robert Dugal for originally spotting this, and to David Ramos for noticing that the ball had been dropped. Signed-off-by: NGeoff Thorpe <geoff@openssl.org>
-
由 Geoff Thorpe 提交于
The lazy-initialisation of BN_MONT_CTX was serialising all threads, as noted by Daniel Sands and co at Sandia. This was to handle the case that 2 or more threads race to lazy-init the same context, but stunted all scalability in the case where 2 or more threads are doing unrelated things! We favour the latter case by punishing the former. The init work gets done by each thread that finds the context to be uninitialised, and we then lock the "set" logic after that work is done - the winning thread's work gets used, the losing threads throw away what they've done. Signed-off-by: NGeoff Thorpe <geoff@openssl.org>
-
- 06 5月, 2014 3 次提交
-
-
由 Dr. Stephen Henson 提交于
PR#3289 PR#3345
-
由 Dr. Stephen Henson 提交于
-
由 Tim Hudson 提交于
-
- 05 5月, 2014 1 次提交
-
-
由 Geoff Thorpe 提交于
Signed-off-by: NGeoff Thorpe <geoff@openssl.org>
-
- 04 5月, 2014 6 次提交
-
-
由 Andy Polyakov 提交于
[MD5 is hardly relevant, just cleaning up repository]
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
sha/asm/sha256-armv4.pl: add ARMv8 code path.
-
由 Andy Polyakov 提交于
-
由 David Ramos 提交于
PR: 3338
-
- 02 5月, 2014 1 次提交
-
-
由 Geoff Thorpe 提交于
Even though the meat of dso_vms.c is compiled out on non-VMS builds, the (pre-)compiler still traverses some of the macro handling. This trips up at least one non-VMS build configuration, so this commit makes the skip-VMS case more robust. Signed-off-by: NGeoff Thorpe <geoff@openssl.org>
-
- 01 5月, 2014 2 次提交
-
-
由 Jeff Trawick 提交于
RT: 3304
-
由 Matt Caswell 提交于
-
- 30 4月, 2014 2 次提交
-
-
由 Geoff Thorpe 提交于
It's not clear whether this inconsistency could lead to an actual computation error, but it involved a BIGNUM being passed around the montgomery logic in an inconsistent state. This was found using flags -DBN_DEBUG -DBN_DEBUG_RAND, and working backwards from this assertion in 'ectest'; ectest: bn_mul.c:960: BN_mul: Assertion `(_bnum2->top == 0) || (_bnum2->d[_bnum2->top - 1] != 0)' failed Signed-off-by: NGeoff Thorpe <geoff@openssl.org>
-
由 Ben Laurie 提交于
-
- 28 4月, 2014 1 次提交
-
-
由 Matt Caswell 提交于
-
- 27 4月, 2014 1 次提交
-
-
由 Matt Caswell 提交于
-