summaryrefslogtreecommitdiffstats
path: root/lib/libssl/src (follow)
Commit message (Collapse)AuthorAgeFilesLines
* more fixes from 0.9.7c, ok deraadt, clodermarkus2003-09-302-4/+11
|
* security fix from http://www.openssl.org/news/secadv_20030930.txtmarkus2003-09-303-2/+11
| | | | see also http://cvs.openssl.org/chngview?cn=11471
* Revert BN_cmp() change. Its arguments are const. Spotted by miod@.otto2003-09-291-3/+0
| | | | ok deraadt@
* Return immediately if argument to BN_sub_word is zero.otto2003-09-251-0/+3
| | | | ok markus@ deraadt@
* Use BN_is_zero(), not x->top == 0 to test if a BN is zero.otto2003-09-251-3/+3
| | | | ok markus@ deraadt@
* Add extra calls to bn_fix_top() in BN_cmp(), since some functions mayotto2003-09-251-0/+3
| | | | | | leave an invalid BN. ok markus@ deraadt@
* Off-by-ones, from aaron@miod2003-09-222-2/+2
|
* You shall NOT BREAK THE TREEderaadt2003-08-251-3/+0
|
* Setup /dev/crypto early (SSL_library_init) to make sure it's actually donejason2003-08-251-0/+3
| | | | for all applications; ok markus and deraadt
* Do not produce a corrupt BIGNUM when adding 0 to 0 using BN_add_word().otto2003-08-211-0/+3
| | | | ok markus@
* support AES with 192 and 256 bit keys, too.markus2003-08-071-58/+60
| | | | tested with kern.cryptodevallowsoft=1; ok deraadt@
* Remove some double semicolons (hmm, do two semis equal a maxi?).millert2003-08-066-6/+6
| | | | I've skipped the GNU stuff for now. From Patrick Latifi.
* the thederaadt2003-06-214-4/+4
|
* obsoletemarkus2003-06-135-1618/+0
|
* nuke term 3, since we're all in ~deraadt/terms and I clued in now.beck2003-06-031-3/+0
|
* merge 0.9.7b with local changes; crank majors for libssl/libcryptomarkus2003-05-12398-4105/+5928
|
* import 0.9.7b (without idea and rc5)markus2003-05-11118-280/+6678
|
* don't cast pointer to integer, use intptr_t stuff off inttypes.h insteadpvalchev2003-05-011-2/+3
| | | | ok millert
* string cleaning; ok teduderaadt2003-04-262-16/+20
|
* managment -> management;jmc2003-04-261-1/+1
| | | | ok mickey@
* remove printf("bar\n");markus2003-04-081-1/+0
|
* sprintf->snprintf. deraadt@ suggestions and okho2003-04-067-36/+49
|
* Trivial sprintf() -> snprintf() changes. ok deraadt@ho2003-04-0513-47/+65
|
* oopsderaadt2003-04-041-1/+1
|
* incorrect bounds limit; spotted by hoderaadt2003-04-041-6/+8
|
* more strcpy & sprintf murder; ho okderaadt2003-04-0410-41/+42
|
* Correct off-by-one error in previous commit. millert@ ok.ho2003-04-031-2/+3
|
* str{cat,cpy}/sprintf cleanup. markus@, deraadt@ okho2003-04-039-26/+32
|
* Remove crypt macro, it conflicts with unistd.hhin2003-04-031-0/+2
| | | | ok markus@
* Fix for Klima-Pokorny-Rosa attack on RSA in SSL/TLS, seemarkus2003-03-191-13/+12
| | | | http://marc.theaimsgroup.com/?l=bugtraq&m=104811162730834&w=2
* update to official patch from openssl.org; ok deraadt@, millert@markus2003-03-172-26/+28
|
* Less strcpy/strcat/sprintf. tdeval@ ok.ho2003-03-168-36/+43
|
* Enforce blinding on RSA operations involving private keys.ho2003-03-152-4/+27
| | | | From http://www.openssl.org/~geoff, modified to be enabled at all times.
* DSAparams_print_pf() -> DSAparams_print_fp()cedric2003-02-281-1/+1
| | | | ok deraadt@
* check for size < 0 when allocating memory, from openssl (-r1.34)markus2003-02-211-0/+6
|
* security fix from openssl 0.9.7a:markus2003-02-191-16/+31
| | | | | | | | In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked via timing by performing a MAC computation even if incorrrect block cipher padding has been found. This is a countermeasure against active attacks where the attacker has to distinguish between bad padding and a MAC verification error. (CAN-2003-0078)
* delete duplicate line; jason@ackley.net, 3090deraadt2003-02-121-1/+0
|
* spellingderaadt2003-01-041-1/+1
|
* typo; torh@bogus.netmarkus2002-12-161-1/+1
|
* From Andrushock, s/sucess/success/gmillert2002-12-091-1/+1
|
* remove rc5markus2002-09-251-109/+0
|
* pull in fix from openssl-0.9.7-stable-SNAP-20020921:markus2002-09-231-16/+5
| | | | | | *) Don't impose a 16-byte length minimum on session IDs in ssl/s3_clnt.c (the SSL 3.0 and TLS 1.0 specifications allow any length up to 32 bytes). [Bodo Moeller]
* use arc4random instead of /dev/arandom,markus2002-09-171-30/+11
| | | | allows RAND_poll after chroot, ok deraadt, fgsch
* undo local change, HMAC_Init() already does HMAC_CTX_init if(key && md)markus2002-09-171-1/+0
|
* add -elapsed to usage() for USE_TOD, toomarkus2002-09-161-1/+1
|
* sync with 0.9.7-beta3markus2002-09-161-0/+4
|
* remove old filesmarkus2002-09-166-1680/+0
|
* remove generated file (from -beta3)markus2002-09-161-180/+0
|
* merge with openssl-0.9.7-stable-SNAP-20020911,markus2002-09-1487-833/+1827
| | | | | new minor for libcrypto (_X509_REQ_print_ex) tested by miod@, pb@
* import openssl-0.9.7-stable-SNAP-20020911 (without idea)markus2002-09-1229-28/+5521
|