Age | Commit message (Collapse) | Author | |
---|---|---|---|
2012-05-16 | ppccap.c: assume no features under 32-bit AIX kernel [from HEAD]. | Andy Polyakov | |
PR: 2810 | |||
2012-05-11 | PR: 2813 | Dr. Stephen Henson | |
Reported by: Constantine Sapuntzakis <csapuntz@gmail.com> Fix possible deadlock when decoding public keys. | |||
2012-05-10 | prepare for next version | Dr. Stephen Henson | |
2012-05-10 | prepare for 1.0.1c releaseOpenSSL_1_0_1c | Dr. Stephen Henson | |
2012-05-10 | Reported by: Solar Designer of Openwall | Dr. Stephen Henson | |
Make sure tkeylen is initialised properly when encrypting CMS messages. | |||
2012-04-27 | ppccpuid.pl: branch hints in OPENSSL_cleanse impact small block performance | Andy Polyakov | |
of digest algorithms, mosty SHA, on Power7. Mystery of century, why SHA, why slower algorithm are affected more... [from HEAD]. PR: 2794 Submitted by: Ashley Lai | |||
2012-04-26 | prepare for next version | Dr. Stephen Henson | |
2012-04-26 | make updateOpenSSL_1_0_1b | Dr. Stephen Henson | |
2012-04-26 | prepare for 1.0.1b release | Dr. Stephen Henson | |
2012-04-22 | correct error code | Dr. Stephen Henson | |
2012-04-20 | e_rc4_hmac_md5.c: reapply commit#21726, which was erroneously omitted. | Andy Polyakov | |
PR: 2797, 2792 | |||
2012-04-20 | call OPENSSL_init when calling FIPS_mode too | Dr. Stephen Henson | |
2012-04-20 | make ciphers work again for FIPS builds | Dr. Stephen Henson | |
2012-04-19 | e_rc4_hmac_md5.c: last commit was inappropriate for non-x86[_64] platforms | Andy Polyakov | |
[from HEAD]. PR: 2792 | |||
2012-04-19 | update for next version | Dr. Stephen Henson | |
2012-04-19 | prepare for 1.0.1a releaseOpenSSL_1_0_1a | Dr. Stephen Henson | |
2012-04-19 | Check for potentially exploitable overflows in asn1_d2i_read_bio | Dr. Stephen Henson | |
BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer in CRYPTO_realloc_clean. Thanks to Tavis Ormandy, Google Security Team, for discovering this issue and to Adam Langley <agl@chromium.org> for fixing it. (CVE-2012-2110) | |||
2012-04-18 | only call FIPS_cipherinit in FIPS mode | Dr. Stephen Henson | |
2012-04-18 | e_rc4_hmac_md5.c: update from HEAD, fixes crash on legacy Intel CPUs. | Andy Polyakov | |
PR: 2792 | |||
2012-04-16 | OPENSSL_NO_SOCK fixes [from HEAD]. | Andy Polyakov | |
PR: 2791 Submitted by: Ben Noordhuis | |||
2012-04-16 | Minor compatibility fixes [from HEAD]. | Andy Polyakov | |
PR: 2790 Submitted by: Alexei Khlebnikov | |||
2012-04-15 | e_aes_cbc_hmac_sha1.c: handle zero-length payload and engage empty frag | Andy Polyakov | |
countermeasure [from HEAD]. PR: 2778 | |||
2012-04-12 | s390x asm pack: fix typos. | Andy Polyakov | |
2012-04-11 | oops, macro not present in OpenSSL 1.0.2 | Dr. Stephen Henson | |
2012-04-11 | fix reset fix | Dr. Stephen Henson | |
2012-04-11 | make reinitialisation work for CMAC | Dr. Stephen Henson | |
2012-04-09 | aes-s390x.pl: fix crash in AES_set_decrypt_key in linux32-s390x build [from ↵ | Andy Polyakov | |
HEAD]. | |||
2012-04-05 | aes-armv4.pl: make it more foolproof [inspired by aes-s390x.pl in 1.0.1]. | Andy Polyakov | |
2012-04-05 | aes-s390x.pl: fix endless loop in linux32-s390x build. | Andy Polyakov | |
2012-03-31 | modes_lcl.h: make it work on i386 [from HEAD]. | Andy Polyakov | |
PR: 2780 | |||
2012-03-31 | vpaes-x86[_64].pl: handle zero length in vpaes_cbc_encrypt [from HEAD]. | Andy Polyakov | |
PR: 2775 | |||
2012-03-30 | bn/bn_gf2m.c: make new BN_GF2m_mod_inv work with BN_DEBUG_RAND [from HEAD]. | Andy Polyakov | |
2012-03-29 | perlasm/x86masm.pl: fix last fix [from HEAD]. | Andy Polyakov | |
2012-03-29 | ans1/tasn_prn.c: avoid bool in variable names [from HEAD]. | Andy Polyakov | |
PR: 2776 | |||
2012-03-22 | fix leak | Dr. Stephen Henson | |
2012-03-22 | Submitted by: Markus Friedl <mfriedl@gmail.com> | Dr. Stephen Henson | |
Fix memory leaks in 'goto err' cases. | |||
2012-03-22 | update version to 1.0.1a-dev | Dr. Stephen Henson | |
2012-03-16 | bsaes-x86_64.pl: optimize key conversion [from HEAD]. | Andy Polyakov | |
2012-03-14 | prepare for 1.0.1 release | Dr. Stephen Henson | |
2012-03-13 | x86_64-xlate.pl: remove old kludge. | Andy Polyakov | |
PR: 2435,2440 | |||
2012-03-12 | corrected fix to PR#2711 and also cover mime_param_cmp | Dr. Stephen Henson | |
2012-03-12 | Fix for CMS/PKCS7 MMA. If RSA decryption fails use a random key and | Dr. Stephen Henson | |
continue with symmetric decryption process to avoid leaking timing information to an attacker. Thanks to Ivan Nestlerode <inestlerode@us.ibm.com> for discovering this issue. (CVE-2012-0884) | |||
2012-03-08 | check return value of BIO_write in PKCS7_decrypt | Dr. Stephen Henson | |
2012-03-06 | PR: 2755 | Dr. Stephen Henson | |
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reduce MTU after failed transmissions. | |||
2012-03-01 | For OpenVMS, use inttypes.h instead of stdint.h | Richard Levitte | |
2012-02-29 | PR: 2742 | Dr. Stephen Henson | |
Reported by: Dmitry Belyavsky <beldmit@gmail.com> If resigning with detached content in CMS just copy data across. | |||
2012-02-28 | Fix memory leak cause by race condition when creating public keys. | Dr. Stephen Henson | |
Thanks to Ivan Nestlerode <inestlerode@us.ibm.com> for reporting this bug. | |||
2012-02-28 | x86cpuid.pl: fix processor capability detection on pre-586 [from HEAD]. | Andy Polyakov | |
2012-02-27 | PR: 2736 | Dr. Stephen Henson | |
Reported by: Remi Gacogne <rgacogne-bugs@coredump.fr> Preserve unused bits value in non-canonicalised ASN1_STRING structures by using ASN1_STRING_copy which preseves flags. | |||
2012-02-27 | PR: 2737 | Dr. Stephen Henson | |
Submitted by: Remi Gacogne <rgacogne-bugs@coredump.fr> Fix double free in PKCS12_parse if we run out of memory. |