1. 31 8月, 2016 1 次提交
  2. 06 7月, 2016 1 次提交
  3. 16 6月, 2016 1 次提交
  4. 18 5月, 2016 3 次提交
  5. 29 4月, 2016 1 次提交
  6. 09 3月, 2016 1 次提交
  7. 06 2月, 2016 1 次提交
  8. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  9. 18 12月, 2015 1 次提交
  10. 17 12月, 2015 1 次提交
    • R
      Rename some BUF_xxx to OPENSSL_xxx · 7644a9ae
      Rich Salz 提交于
      Rename BUF_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
      to OPENSSL_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
      Add #define's for the old names.
      Add CRYPTO_{memdup,strndup}, called by OPENSSL_{memdup,strndup} macros.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      7644a9ae
  11. 02 12月, 2015 1 次提交
  12. 10 11月, 2015 1 次提交
  13. 04 9月, 2015 1 次提交
  14. 03 9月, 2015 1 次提交
  15. 14 5月, 2015 1 次提交
  16. 05 5月, 2015 1 次提交
    • R
      Use safer sizeof variant in malloc · b4faea50
      Rich Salz 提交于
      For a local variable:
              TYPE *p;
      Allocations like this are "risky":
              p = OPENSSL_malloc(sizeof(TYPE));
      if the type of p changes, and the malloc call isn't updated, you
      could get memory corruption.  Instead do this:
              p = OPENSSL_malloc(sizeof(*p));
      Also fixed a few memset() calls that I noticed while doing this.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      b4faea50
  17. 01 5月, 2015 1 次提交
  18. 29 4月, 2015 1 次提交
  19. 06 2月, 2015 1 次提交
  20. 22 1月, 2015 1 次提交
  21. 18 8月, 2014 1 次提交
  22. 14 7月, 2014 1 次提交
  23. 10 3月, 2010 1 次提交
    • D
      PR: 2188 · b17bdc77
      Dr. Stephen Henson 提交于
      Submitted By: Jaroslav Imrich <jaroslav.imrich@disig.sk>
      
      Add "missing" functions to get and set prompt constructor.
      b17bdc77
  24. 16 2月, 2009 1 次提交
  25. 27 7月, 2005 1 次提交
  26. 17 5月, 2005 1 次提交
  27. 31 3月, 2005 1 次提交
  28. 27 12月, 2003 1 次提交
    • R
      Use BUF_strlcpy() instead of strcpy(). · d420ac2c
      Richard Levitte 提交于
      Use BUF_strlcat() instead of strcat().
      Use BIO_snprintf() instead of sprintf().
      In some cases, keep better track of buffer lengths.
      This is part of a large change submitted by Markus Friedl <markus@openbsd.org>
      d420ac2c
  29. 13 1月, 2003 1 次提交
  30. 05 12月, 2002 1 次提交
  31. 13 11月, 2002 1 次提交
  32. 02 9月, 2001 1 次提交
    • G
      Make the necessary changes to work with the recent "ex_data" overhaul. · 79aa04ef
      Geoff Thorpe 提交于
      See the commit log message for that for more information.
      
      NB: X509_STORE_CTX's use of "ex_data" support was actually misimplemented
      (initialisation by "memset" won't/can't/doesn't work). This fixes that but
      requires that X509_STORE_CTX_init() be able to handle errors - so its
      prototype has been changed to return 'int' rather than 'void'. All uses of
      that function throughout the source code have been tracked down and
      adjusted.
      79aa04ef
  33. 13 8月, 2001 1 次提交
    • G
      The indexes returned by ***_get_ex_new_index() functions are used when · b7727ee6
      Geoff Thorpe 提交于
      setting stack (actually, array) values in ex_data. So only increment the
      global counters if the underlying CRYPTO_get_ex_new_index() call succeeds.
      This change doesn't make "ex_data" right (see the comment at the head of
      ex_data.c to know why), but at least makes the source code marginally less
      frustrating.
      b7727ee6
  34. 11 7月, 2001 1 次提交
  35. 05 7月, 2001 1 次提交
  36. 24 6月, 2001 2 次提交
  37. 23 6月, 2001 1 次提交