index
:
delta/openssl-new.git
1.0.2-aead
BRANCH_ASN1
BRANCH_OpenSSL_0_9_8k
BRANCH_VMS_64BIT
BRANCH_WIN64
BRANCH_engine
OpenSSL-engine-0_9_6-stable
OpenSSL-fips-0_9_7-stable
OpenSSL-fips-0_9_8-stable
OpenSSL-fips-1_2-stable
OpenSSL-fips-2_0-dev
OpenSSL-fips-2_0-stable
OpenSSL-fips2-0_9_7-stable
OpenSSL-rfc3820-0_9_7-stable
OpenSSL_0_9_6-stable
OpenSSL_0_9_7-stable
OpenSSL_0_9_8-stable
OpenSSL_0_9_8fg-stable
OpenSSL_1_0_0-stable
OpenSSL_1_0_1-stable
OpenSSL_1_0_2-stable
OpenSSL_1_1_0-stable
OpenSSL_1_1_1-stable
OpenTLS
SSLeay
baserock/OpenSSL_1_0_1g
baserock/OpenSSL_1_0_2-stable
baserock/larswirzenius/morph
baserock/morph
baserock/pedroalvarez/power-port
baserock/ps/proto-web-system
eliminate-ssl-ctrl
master
openssl-3.0
openssl-3.1
rsalz-monolith
rt4526
supplemental-data-api-2
tls1.3-draft-18
tls1.3-draft-19
github.com: openssl/openssl.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
Commit message (
Expand
)
Author
Age
Files
Lines
*
Fix stack corruption in ui_read
openssl-3.0
Bernd Edlinger
2023-05-17
3
-3
/
+53
*
Fixed EVP_PKEY_CTX_set_ec_paramgen_curve_nid() for SM2 in ENGINEs
Yuan, Shuai
2023-05-15
2
-1
/
+43
*
CMP client: fix checking new cert enrolled with oldcert and without private key
Dr. David von Oheimb
2023-05-12
8
-36
/
+75
*
CMP client: fix error response on -csr without private key, also in docs
Dr. David von Oheimb
2023-05-12
10
-22
/
+77
*
apps/openssl.cnf: fix reference to insta.ca.crt
Dr. David von Oheimb
2023-05-12
2
-4
/
+4
*
provider: return error if buf too small when getting ec pubkey param
Yi Li
2023-05-12
2
-1
/
+23
*
Fix typos found by codespell
Dimitri Papadopoulos
2023-05-12
10
-24
/
+24
*
Clarify documentation of SSL_SESSION_dup
Watson Ladd
2023-05-12
1
-2
/
+4
*
Clear ownership when duplicating sessions
Watson Ladd
2023-05-12
2
-2
/
+5
*
Fixed TLS1.3 handshake issue for legacy engine API.
Yuan, Shuai
2023-05-11
1
-0
/
+4
*
CMP app: fix deallocated host/port fields in APP_HTTP_TLS_INFO
Dr. David von Oheimb
2023-05-10
1
-3
/
+9
*
CMP app and app_http_tls_cb(): pick the right TLS hostname (also without port)
Dr. David von Oheimb
2023-05-10
2
-3
/
+7
*
Fix a typo found by codespell in a Makefile variable
Dimitri Papadopoulos
2023-05-10
1
-1
/
+1
*
DLTS → DTLS
Dimitri Papadopoulos
2023-05-10
1
-1
/
+1
*
Fix memory leak in engine_cleanup_add_first()
Kovalev Vasiliy
2023-05-09
1
-2
/
+3
*
aes-gcm-armv8_64 asm support bigdian
JerryDevis
2023-05-09
1
-206
/
+581
*
Prevent a fuzzing timeout in the conf fuzzer
Matt Caswell
2023-05-08
1
-0
/
+17
*
Fix the padlock engine
Bernd Edlinger
2023-05-05
1
-2
/
+13
*
Fix broken links on asym_cipher manpages
Ladislav Marko
2023-05-04
1
-3
/
+2
*
Add negative integer check when using ASN1_BIT_STRING
mlitre
2023-05-04
1
-0
/
+6
*
rand: trust user supplied entropy when configured without a random source
Pauli
2023-05-03
1
-0
/
+6
*
param->ctrl translation: Fix evp_pkey_ctx_setget_params_to_ctrl()
Richard Levitte
2023-05-01
1
-0
/
+1
*
param->ctrl translation: Fix fix_ec_paramgen_curve_nid()
Richard Levitte
2023-05-01
1
-1
/
+14
*
Avoid generating RSA keys with p < q
rkarmaka98
2023-04-28
1
-0
/
+9
*
Improve documentation of -no_ssl3, -no_tls1, -no_tls1_1, -no_tls1_2, -no_tls1...
rkarmaka98
2023-04-28
1
-0
/
+2
*
http proxy handling: Use ossl_safe_getenv() instead of getenv()
Mukesh Bharsakle
2023-04-28
1
-5
/
+4
*
ASN1_OCTET_STRING_new() calls ASN1_STRING_type_new(V_ASN1_OCTET_STRING)
Vladimir Kotal
2023-04-28
1
-1
/
+1
*
fix aes-xts bug on aarch64 big-endian env.
Liu-ErMeng
2023-04-28
2
-12
/
+25
*
APPS/cmp: prevent HTTP client failure on -rspin option with too few filenames
Dr. David von Oheimb
2023-04-28
3
-42
/
+94
*
Correct the CHANGES entry for CVE-2023-1255
Tomas Mraz
2023-04-26
1
-3
/
+3
*
Fix regression of no-posix-io builds
Tomas Mraz
2023-04-25
1
-3
/
+11
*
Bump actions/setup-python from 4.5.0 to 4.6.0
dependabot[bot]
2023-04-21
1
-1
/
+1
*
Fix checking return code of EVP_PKEY_get_int_param at check_curve
Petr Mikhalicin
2023-04-21
1
-1
/
+1
*
aesv8-armx.pl: Avoid buffer overrread in AES-XTS decryption
Tomas Mraz
2023-04-20
3
-1
/
+16
*
Configurations/descrip.mms.tmpl: Fix a few typos
Richard Levitte
2023-04-18
1
-7
/
+3
*
CMP cert_response(): add missing rejection status on client rejecting new cert
Dr. David von Oheimb
2023-04-18
1
-0
/
+1
*
cmp_client_test.c: add tests for errors reported by server on subsequent requ...
Dr. David von Oheimb
2023-04-18
5
-30
/
+73
*
ossl_cmp_mock_srv_new.pod: correct/update names of internal test support func...
Dr. David von Oheimb
2023-04-18
1
-9
/
+9
*
OSSL_CMP_SRV_process_request(): fix recipNonce on error in subsequent request...
Dr. David von Oheimb
2023-04-18
1
-7
/
+13
*
cmp_ctx.c: fix wrong comments on OSSL_CMP_CTX_set1_{recipient,issuer}
Dr. David von Oheimb
2023-04-18
1
-2
/
+2
*
CMP check_transactionID_or_nonce(): fix reason code on unmatched recipNonce
Dr. David von Oheimb
2023-04-18
1
-1
/
+0
*
ossl_cmp_msg_check_update(): fix two wrong error return values (-1 instead of 0)
Dr. David von Oheimb
2023-04-18
1
-6
/
+6
*
test_get_libctx(): prevent crash when called with NULL provider arg
Dr. David von Oheimb
2023-04-18
1
-1
/
+1
*
crypto/cmp: fix CertReqId to use in p10cr transactions acc. to RFC 4210
Dr. David von Oheimb
2023-04-18
8
-44
/
+61
*
bn_local: remove unused `PTR_SIZE_INT` definition
Alois Klink
2023-04-18
1
-18
/
+0
*
bn_nist: remove unused type-punning union `u`
Alois Klink
2023-04-18
1
-21
/
+12
*
bn_nist: replace pointer bit-fiddling with ternary
Alois Klink
2023-04-18
1
-45
/
+19
*
adding provider_unload functions for cmp_ tests
Danny Carpenter
2023-04-16
4
-0
/
+8
*
List also non-fetchable hashes in openssl dgst -list
GauriSpears
2023-04-14
1
-2
/
+5
*
Fix the LCM computation in the RSA multiprime key check
Tomas Mraz
2023-04-13
3
-7
/
+69
[next]