summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
* Fix no-ec2m in ec_curve.c (1.1.0)OpenSSL_1_1_0-stableNicola Tuveri2019-09-121-2/+2
* Prepare for 1.1.0m-devMatt Caswell2019-09-104-4/+12
* Prepare for 1.1.0l releaseOpenSSL_1_1_0lMatt Caswell2019-09-104-6/+6
* Update copyright yearMatt Caswell2019-09-1022-22/+22
* Remove duplicate CHANGES entry (1.1.0)Matt Caswell2019-09-102-13/+2
* Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkeyBernd Edlinger2019-09-105-5/+45
* Update CHANGES and NEWS for the new releaseMatt Caswell2019-09-102-1/+19
* Use BN_clear_free in DH_set0_keyBernd Edlinger2019-09-091-2/+2
* [ec] Match built-in curves on EC_GROUP_new_from_ecparametersNicola Tuveri2019-09-094-5/+236
* Configure: clang: add -Wno-unknown-warning-optionDr. Matthias St. Pierre2019-09-081-0/+1
* [test/recipes/30-test_evp_data] computing ECC cofactors: regression testBilly Brumley2019-09-071-0/+50
* [crypto/ec] for ECC parameters with NULL or zero cofactor, compute itBilly Brumley2019-09-074-8/+105
* [ec/ecp_nistp*.c] restyle: use {} around `else` tooNicola Tuveri2019-09-073-18/+18
* [ec/ecp_nistp*.c] remove flip_endian()Nicola Tuveri2019-09-073-84/+62
* Uniform BN_bn2binpad() and BN_bn2lebinpad() implementationsNicola Tuveri2019-09-071-20/+17
* Make BN_num_bits() consttime upon BN_FLG_CONSTTIMENicola Tuveri2019-09-071-0/+44
* Fix a SCA leak using BN_bn2bin()Nicola Tuveri2019-09-073-21/+15
* Fix a SCA leak in BN_generate_dsa_nonceBernd Edlinger2019-09-061-4/+1
* [crypto/asn1] Fix multiple SCA vulnerabilities during RSA key validation.Cesar Pereida Garcia2019-09-062-3/+20
* Fix SCA vulnerability when using PVK and MSBLOB key formatsCesar Pereida Garcia2019-08-271-0/+3
* Fix error handling in X509_chain_up_refBernd Edlinger2019-08-171-1/+9
* Makefile.shared: fix to allow strings and spaces in passed variablesRichard Levitte2019-07-271-58/+58
* Fix default installation paths on mingwRichard Levitte2019-07-254-1/+120
* Add value_barriers in constant time select functionsBernd Edlinger2019-07-191-1/+19
* Fix wrong lock claimed in x509 dir lookup.Krists Krilovs2019-07-151-2/+2
* Avoid NULL pointer dereference.Pauli2019-07-084-3/+19
* Prepare for 1.1.0l-devRichard Levitte2019-05-284-4/+12
* Prepare for 1.1.0k releaseOpenSSL_1_1_0kRichard Levitte2019-05-284-6/+6
* Update copyright yearRichard Levitte2019-05-2823-23/+23
* Add CHANGES and NEWS for 1.1.0kRichard Levitte2019-05-272-1/+32
* Change default RSA, DSA and DH size to 2048 bitKurt Roeckx2019-05-215-10/+16
* fixed public range check in ec_GF2m_simple_oct2pointShane Lontis2019-03-301-4/+5
* Modify the RSA_private_decrypt functions to check the padding inBernd Edlinger2019-03-223-48/+48
* Make err_clear_constant_time really constant timeBernd Edlinger2019-03-223-27/+25
* Clear the point S before freeing in ec_mul_consttimeBernd Edlinger2019-03-181-1/+1
* Clear the secret point in ecdh_simple_compute_keyBernd Edlinger2019-03-181-1/+1
* Fix memory overrun in rsa padding check functionsBernd Edlinger2019-03-073-41/+44
* Avoid an underflow in ecp_nistp521.cMatt Caswell2019-03-071-3/+8
* Test an overlong ChaCha20-Poly1305 nonceMatt Caswell2019-03-061-0/+8
* Prevent over long nonces in ChaCha20-Poly1305Matt Caswell2019-03-061-1/+3
* Clarify that SSL_shutdown() must not be called after a fatal errorMatt Caswell2019-02-262-5/+12
* Go into the error state if a fatal alert is sent or receivedMatt Caswell2019-02-264-3/+9
* Ensure bn_cmp_words can handle the case where n == 0Matt Caswell2019-02-251-0/+3
* apps/speed: fix segfault while looking up algorithm nameJeff Mahoney2019-02-241-1/+0
* Clear BN_FLG_CONSTTIME on BN_CTX_get()Nicola Tuveri2019-02-211-1/+3
* Test for constant-time flag leakage in BN_CTXNicola Tuveri2019-02-211-3/+108
* [test] unit test for field_inv function pointer in EC_METHODNicola Tuveri2019-02-203-0/+248
* SCA hardening for mod. field inversion in EC_GROUPBilly Brumley2019-02-2012-74/+214
* cygwin: drop explicit O_TEXTCorinna Vinschen2019-02-181-4/+5
* crypto/engine/eng_cryptodev.c: fix bignum<->crp conversionRichard Levitte2019-02-111-10/+4