Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | more fixes from 0.9.7c, ok deraadt, cloder | 2003-09-30 | 2 | -4/+11 | |
| | |||||
* | security fix from http://www.openssl.org/news/secadv_20030930.txt | 2003-09-30 | 3 | -2/+11 | |
| | | | | see also http://cvs.openssl.org/chngview?cn=11471 | ||||
* | Revert BN_cmp() change. Its arguments are const. Spotted by miod@. | 2003-09-29 | 1 | -3/+0 | |
| | | | | ok deraadt@ | ||||
* | Return immediately if argument to BN_sub_word is zero. | 2003-09-25 | 1 | -0/+3 | |
| | | | | ok markus@ deraadt@ | ||||
* | Use BN_is_zero(), not x->top == 0 to test if a BN is zero. | 2003-09-25 | 1 | -3/+3 | |
| | | | | ok markus@ deraadt@ | ||||
* | Add extra calls to bn_fix_top() in BN_cmp(), since some functions may | 2003-09-25 | 1 | -0/+3 | |
| | | | | | | leave an invalid BN. ok markus@ deraadt@ | ||||
* | Off-by-ones, from aaron@ | 2003-09-22 | 2 | -2/+2 | |
| | |||||
* | You shall NOT BREAK THE TREE | 2003-08-25 | 1 | -3/+0 | |
| | |||||
* | Setup /dev/crypto early (SSL_library_init) to make sure it's actually done | 2003-08-25 | 1 | -0/+3 | |
| | | | | for all applications; ok markus and deraadt | ||||
* | Do not produce a corrupt BIGNUM when adding 0 to 0 using BN_add_word(). | 2003-08-21 | 1 | -0/+3 | |
| | | | | ok markus@ | ||||
* | support AES with 192 and 256 bit keys, too. | 2003-08-07 | 1 | -58/+60 | |
| | | | | tested with kern.cryptodevallowsoft=1; ok deraadt@ | ||||
* | Remove some double semicolons (hmm, do two semis equal a maxi?). | 2003-08-06 | 6 | -6/+6 | |
| | | | | I've skipped the GNU stuff for now. From Patrick Latifi. | ||||
* | the the | 2003-06-21 | 4 | -4/+4 | |
| | |||||
* | obsolete | 2003-06-13 | 5 | -1618/+0 | |
| | |||||
* | nuke term 3, since we're all in ~deraadt/terms and I clued in now. | 2003-06-03 | 1 | -3/+0 | |
| | |||||
* | merge 0.9.7b with local changes; crank majors for libssl/libcrypto | 2003-05-12 | 398 | -4105/+5928 | |
| | |||||
* | import 0.9.7b (without idea and rc5) | 2003-05-11 | 118 | -280/+6678 | |
| | |||||
* | don't cast pointer to integer, use intptr_t stuff off inttypes.h instead | 2003-05-01 | 1 | -2/+3 | |
| | | | | ok millert | ||||
* | string cleaning; ok tedu | 2003-04-26 | 2 | -16/+20 | |
| | |||||
* | managment -> management; | 2003-04-26 | 1 | -1/+1 | |
| | | | | ok mickey@ | ||||
* | remove printf("bar\n"); | 2003-04-08 | 1 | -1/+0 | |
| | |||||
* | sprintf->snprintf. deraadt@ suggestions and ok | 2003-04-06 | 7 | -36/+49 | |
| | |||||
* | Trivial sprintf() -> snprintf() changes. ok deraadt@ | 2003-04-05 | 13 | -47/+65 | |
| | |||||
* | oops | 2003-04-04 | 1 | -1/+1 | |
| | |||||
* | incorrect bounds limit; spotted by ho | 2003-04-04 | 1 | -6/+8 | |
| | |||||
* | more strcpy & sprintf murder; ho ok | 2003-04-04 | 10 | -41/+42 | |
| | |||||
* | Correct off-by-one error in previous commit. millert@ ok. | 2003-04-03 | 1 | -2/+3 | |
| | |||||
* | str{cat,cpy}/sprintf cleanup. markus@, deraadt@ ok | 2003-04-03 | 9 | -26/+32 | |
| | |||||
* | Remove crypt macro, it conflicts with unistd.h | 2003-04-03 | 1 | -0/+2 | |
| | | | | ok markus@ | ||||
* | Fix for Klima-Pokorny-Rosa attack on RSA in SSL/TLS, see | 2003-03-19 | 1 | -13/+12 | |
| | | | | http://marc.theaimsgroup.com/?l=bugtraq&m=104811162730834&w=2 | ||||
* | update to official patch from openssl.org; ok deraadt@, millert@ | 2003-03-17 | 2 | -26/+28 | |
| | |||||
* | Less strcpy/strcat/sprintf. tdeval@ ok. | 2003-03-16 | 8 | -36/+43 | |
| | |||||
* | Enforce blinding on RSA operations involving private keys. | 2003-03-15 | 2 | -4/+27 | |
| | | | | From http://www.openssl.org/~geoff, modified to be enabled at all times. | ||||
* | DSAparams_print_pf() -> DSAparams_print_fp() | 2003-02-28 | 1 | -1/+1 | |
| | | | | ok deraadt@ | ||||
* | check for size < 0 when allocating memory, from openssl (-r1.34) | 2003-02-21 | 1 | -0/+6 | |
| | |||||
* | security fix from openssl 0.9.7a: | 2003-02-19 | 1 | -16/+31 | |
| | | | | | | | | In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked via timing by performing a MAC computation even if incorrrect block cipher padding has been found. This is a countermeasure against active attacks where the attacker has to distinguish between bad padding and a MAC verification error. (CAN-2003-0078) | ||||
* | delete duplicate line; jason@ackley.net, 3090 | 2003-02-12 | 1 | -1/+0 | |
| | |||||
* | spelling | 2003-01-04 | 1 | -1/+1 | |
| | |||||
* | typo; torh@bogus.net | 2002-12-16 | 1 | -1/+1 | |
| | |||||
* | From Andrushock, s/sucess/success/g | 2002-12-09 | 1 | -1/+1 | |
| | |||||
* | remove rc5 | 2002-09-25 | 1 | -109/+0 | |
| | |||||
* | pull in fix from openssl-0.9.7-stable-SNAP-20020921: | 2002-09-23 | 1 | -16/+5 | |
| | | | | | | *) Don't impose a 16-byte length minimum on session IDs in ssl/s3_clnt.c (the SSL 3.0 and TLS 1.0 specifications allow any length up to 32 bytes). [Bodo Moeller] | ||||
* | use arc4random instead of /dev/arandom, | 2002-09-17 | 1 | -30/+11 | |
| | | | | allows RAND_poll after chroot, ok deraadt, fgsch | ||||
* | undo local change, HMAC_Init() already does HMAC_CTX_init if(key && md) | 2002-09-17 | 1 | -1/+0 | |
| | |||||
* | add -elapsed to usage() for USE_TOD, too | 2002-09-16 | 1 | -1/+1 | |
| | |||||
* | sync with 0.9.7-beta3 | 2002-09-16 | 1 | -0/+4 | |
| | |||||
* | remove old files | 2002-09-16 | 6 | -1680/+0 | |
| | |||||
* | remove generated file (from -beta3) | 2002-09-16 | 1 | -180/+0 | |
| | |||||
* | merge with openssl-0.9.7-stable-SNAP-20020911, | 2002-09-14 | 87 | -833/+1827 | |
| | | | | | new minor for libcrypto (_X509_REQ_print_ex) tested by miod@, pb@ | ||||
* | import openssl-0.9.7-stable-SNAP-20020911 (without idea) | 2002-09-12 | 29 | -28/+5521 | |
| |