summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* | | | Fix printf format string. ok markus@otto2004-01-141-1/+1
| | | |
* | | | Break up the colon-separated path to -I into two -I args so the treemillert2003-11-191-2/+2
| | | | | | | | | | | | | | | | can build with perl 5.8.2. Ok markus@
* | | | use bn_asm_vax.S (from netbsd); test + ok by miodmarkus2003-11-1810-15/+533
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | use asm code for i386, except for the CBC code, because it is not clean PIC code. add <machime/asm.h> support to x86unix.pl tested by: nick (on 30386), henning, djm, tedu, jmc and more; no shlib minor crank necessary, only internal symbols changed.
* | | | remove obsolete filesmarkus2003-11-137-5326/+0
| | | |
* | | | crank minor for ERR_release_err_state_tablemarkus2003-11-111-1/+1
| | | |
* | | | merge 0.9.7c; minor bugsfixes;markus2003-11-1182-264/+700
| | | | | | | | | | | | | | | | | | | | API addition: ERR_release_err_state_table [make includes before you build libssl/libcrypto]
* | | | This commit was generated by cvs2git to track changes on a CVS vendormarkus2003-11-113-2/+620
|\| | | | | | | | | | | branch.
| * | | import 0.9.7cmarkus2003-11-1188-266/+1326
| | | |
* | | | don't destroy old pointer if realloc fails; from Daniel Lucq; ok deraadt@markus2003-10-251-3/+7
| | | |
* | | | Correct some off-by-ones. They currently don't matter, but thiscloder2003-10-012-6/+6
| | | | | | | | | | | | | | | | | | | | is for future safety and consistency. OK krw@, markus@
* | | | more fixes from 0.9.7c, ok deraadt, clodermarkus2003-09-304-8/+22
| | | |
* | | | security fix from http://www.openssl.org/news/secadv_20030930.txtmarkus2003-09-303-2/+11
| | | | | | | | | | | | | | | | see also http://cvs.openssl.org/chngview?cn=11471
* | | | Revert BN_cmp() change. Its arguments are const. Spotted by miod@.otto2003-09-291-3/+0
| | | | | | | | | | | | | | | | ok deraadt@
* | | | Return immediately if argument to BN_sub_word is zero.otto2003-09-251-0/+3
| | | | | | | | | | | | | | | | ok markus@ deraadt@
* | | | Use BN_is_zero(), not x->top == 0 to test if a BN is zero.otto2003-09-251-3/+3
| | | | | | | | | | | | | | | | ok markus@ deraadt@
* | | | Add extra calls to bn_fix_top() in BN_cmp(), since some functions mayotto2003-09-251-0/+3
| | | | | | | | | | | | | | | | | | | | | | | | leave an invalid BN. ok markus@ deraadt@
* | | | Off-by-ones, from aaron@miod2003-09-222-2/+2
| | | |
* | | | You shall NOT BREAK THE TREEderaadt2003-08-252-6/+0
| | | |
* | | | Setup /dev/crypto early (SSL_library_init) to make sure it's actually donejason2003-08-252-0/+6
| | | | | | | | | | | | | | | | for all applications; ok markus and deraadt
* | | | Do not produce a corrupt BIGNUM when adding 0 to 0 using BN_add_word().otto2003-08-211-0/+3
| | | | | | | | | | | | | | | | ok markus@
* | | | support AES with 192 and 256 bit keys, too.markus2003-08-071-58/+60
| | | | | | | | | | | | | | | | tested with kern.cryptodevallowsoft=1; ok deraadt@
* | | | Remove some double semicolons (hmm, do two semis equal a maxi?).millert2003-08-067-7/+7
| | | | | | | | | | | | | | | | I've skipped the GNU stuff for now. From Patrick Latifi.
* | | | hit CLEANFILES also for cleandir targetderaadt2003-07-021-2/+2
| | | |
* | | | the thederaadt2003-06-214-4/+4
| | | |
* | | | obsoletemarkus2003-06-135-1618/+0
| | | |
* | | | nuke term 3, since we're all in ~deraadt/terms and I clued in now.beck2003-06-031-3/+0
| | | |
* | | | swap /usr/include/openssl and /usr/include/ssl, clean up the Makefilesmarkus2003-06-022-35/+25
| | | | | | | | | | | | | | | | get rid old include files; with itojun@ and tdeval@; ok itojun@, deraadt@
* | | | merge 0.9.7b with local changes; crank majors for libssl/libcryptomarkus2003-05-12483-4889/+7446
| | | |
* | | | This commit was generated by cvs2git to track changes on a CVS vendormarkus2003-05-1165-40/+6303
|\| | | | | | | | | | | branch.
| * | | import 0.9.7b (without idea and rc5)markus2003-05-11500-4277/+12804
| | | |
* | | | don't cast pointer to integer, use intptr_t stuff off inttypes.h insteadpvalchev2003-05-011-2/+3
| | | | | | | | | | | | | | | | ok millert
* | | | string cleaning; ok teduderaadt2003-04-262-16/+20
| | | |
* | | | managment -> management;jmc2003-04-261-1/+1
| | | | | | | | | | | | | | | | ok mickey@
* | | | remove printf("bar\n");markus2003-04-081-1/+0
| | | |
* | | | sprintf->snprintf. deraadt@ suggestions and okho2003-04-067-36/+49
| | | |
* | | | Trivial sprintf() -> snprintf() changes. ok deraadt@ho2003-04-0513-47/+65
| | | |
* | | | oopsderaadt2003-04-041-1/+1
| | | |
* | | | incorrect bounds limit; spotted by hoderaadt2003-04-041-6/+8
| | | |
* | | | more strcpy & sprintf murder; ho okderaadt2003-04-0410-41/+42
| | | |
* | | | Correct off-by-one error in previous commit. millert@ ok.ho2003-04-031-2/+3
| | | |
* | | | str{cat,cpy}/sprintf cleanup. markus@, deraadt@ okho2003-04-039-26/+32
| | | |
* | | | Remove crypt macro, it conflicts with unistd.hhin2003-04-031-0/+2
| | | | | | | | | | | | | | | | ok markus@
* | | | Fix for Klima-Pokorny-Rosa attack on RSA in SSL/TLS, seemarkus2003-03-192-26/+24
| | | | | | | | | | | | | | | | http://marc.theaimsgroup.com/?l=bugtraq&m=104811162730834&w=2
* | | | update to official patch from openssl.org; ok deraadt@, millert@markus2003-03-172-26/+28
| | | |
* | | | Less strcpy/strcat/sprintf. tdeval@ ok.ho2003-03-168-36/+43
| | | |
* | | | Enforce blinding on RSA operations involving private keys.ho2003-03-152-4/+27
| | | | | | | | | | | | | | | | From http://www.openssl.org/~geoff, modified to be enabled at all times.
* | | | jmc wrote a combination man page that covers all openssl(1) functionality,deraadt2003-03-051-2/+1
| | | | | | | | | | | | | | | | | | | | | | | | based on the pod files from openssl. This may need by-hand updating once in a while, but at least now people can read a real man page instead of the mess that the openssl team provides us with.
* | | | DSAparams_print_pf() -> DSAparams_print_fp()cedric2003-02-281-1/+1
| | | | | | | | | | | | | | | | ok deraadt@
* | | | check for size < 0 when allocating memory, from openssl (-r1.34)markus2003-02-211-0/+6
| | | |
* | | | security fix from openssl 0.9.7a:markus2003-02-192-32/+62
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked via timing by performing a MAC computation even if incorrrect block cipher padding has been found. This is a countermeasure against active attacks where the attacker has to distinguish between bad padding and a MAC verification error. (CAN-2003-0078)