index
:
delta/openssl-new.git
1.0.2-aead
BRANCH_ASN1
BRANCH_OpenSSL_0_9_8k
BRANCH_VMS_64BIT
BRANCH_WIN64
BRANCH_engine
OpenSSL-engine-0_9_6-stable
OpenSSL-fips-0_9_7-stable
OpenSSL-fips-0_9_8-stable
OpenSSL-fips-1_2-stable
OpenSSL-fips-2_0-dev
OpenSSL-fips-2_0-stable
OpenSSL-fips2-0_9_7-stable
OpenSSL-rfc3820-0_9_7-stable
OpenSSL_0_9_6-stable
OpenSSL_0_9_7-stable
OpenSSL_0_9_8-stable
OpenSSL_0_9_8fg-stable
OpenSSL_1_0_0-stable
OpenSSL_1_0_1-stable
OpenSSL_1_0_2-stable
OpenSSL_1_1_0-stable
OpenSSL_1_1_1-stable
OpenTLS
SSLeay
baserock/OpenSSL_1_0_1g
baserock/OpenSSL_1_0_2-stable
baserock/larswirzenius/morph
baserock/morph
baserock/pedroalvarez/power-port
baserock/ps/proto-web-system
eliminate-ssl-ctrl
master
openssl-3.0
openssl-3.1
rsalz-monolith
rt4526
supplemental-data-api-2
tls1.3-draft-18
tls1.3-draft-19
github.com: openssl/openssl.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
crypto
Commit message (
Expand
)
Author
Age
Files
Lines
*
Do not create DSA keys without parameters by decoder
Tomas Mraz
2023-02-07
1
-0
/
+24
*
Fix NULL deference when validating FFC public key.
slontis
2023-02-07
1
-0
/
+9
*
Do not dereference PKCS7 object data if not set
Tomas Mraz
2023-02-07
1
-4
/
+12
*
Fix a UAF resulting from a bug in BIO_new_NDEF
Matt Caswell
2023-02-07
1
-8
/
+32
*
Avoid dangling ptrs in header and data params for PEM_read_bio_ex
Matt Caswell
2023-02-07
1
-0
/
+2
*
Fix Timing Oracle in RSA decryption
Dmitry Belyavskiy
2023-02-07
5
-91
/
+715
*
Fix type confusion in nc_match_single()
Viktor Dukhovni
2023-02-07
1
-14
/
+31
*
Fix SM4-XTS build failure on Mac mini M1
Xu Yizhou
2023-02-06
2
-8
/
+19
*
SM4 AESE optimization for ARMv8
Xu Yizhou
2023-02-02
3
-1
/
+2005
*
Fix incomplete check on EVP_CIPHER_param_to_asn1()
ndossche
2023-02-02
1
-1
/
+1
*
Fix a potential memory leak in crypto/provider_child.c
Ruili Fang
2023-02-01
1
-1
/
+3
*
Do not include sparse_array.o in libssl with no-shared
Tomas Mraz
2023-01-31
1
-1
/
+3
*
Avoid duplicating symbols in legacy.a with some build options
Tomas Mraz
2023-01-31
15
-20
/
+16
*
Fix incomplete check on X509V3_add1_i2d()
ndossche
2023-01-31
1
-2
/
+2
*
Enable AES optimisation on Apple Silicon M2-based systems
Tom Cosgrove
2023-01-30
1
-1
/
+2
*
Implement BIO_s_dgram_mem() reusing the BIO_s_dgram_pair() code
Tomas Mraz
2023-01-27
1
-76
/
+263
*
Revert "Give BIO_s_mem() the ability to support datagrams"
Tomas Mraz
2023-01-27
1
-118
/
+8
*
Fix Coverity 1520485: logically dead code
Pauli
2023-01-26
1
-4
/
+0
*
OSSL_HTTP_REQ_CTX_nbio(): use OSSL_TRACE_STRING() for msg body where it makes...
Dr. David von Oheimb
2023-01-26
1
-31
/
+54
*
add OSSL_TRACE_STRING(), OSSL_TRACE_STRING_MAX, and OSSL_trace_string()
Dr. David von Oheimb
2023-01-26
1
-0
/
+25
*
Fix incomplete checks for EVP_CIPHER_asn1_to_param
Niels Dossche
2023-01-25
3
-3
/
+3
*
APPS: generated certs bear X.509 V3, unless -x509v1 option of req app is given
Dr. David von Oheimb
2023-01-24
1
-0
/
+6
*
X509{,_CRL,_REVOKED}_{set,sign}*(): fix 'modified' field and return values
Dr. David von Oheimb
2023-01-24
3
-47
/
+64
*
set_trace_data(): prevent double free on OPENSSL_strdup() failure
Dr. David von Oheimb
2023-01-24
1
-5
/
+9
*
Fix corruption when searching for CRLs in hashed directories
Hugo Landau
2023-01-24
1
-3
/
+13
*
X509_V_ERR_INVALID_PURPOSE: fix misleading text; Fix omission in X509_VERIFY_...
Dr. David von Oheimb
2023-01-23
1
-1
/
+1
*
cmp_client.c: fix handling of total_timeout for RR and GENM transactions
Dr. David von Oheimb
2023-01-23
1
-12
/
+10
*
cmp_client_test.c: add tests for end_time being initialized for RR/GENM
Dr. David von Oheimb
2023-01-23
2
-5
/
+9
*
Fix incorrect check on RAND_bytes_ex() in generate_q_fips186_4()
Niels Dossche
2023-01-23
1
-1
/
+1
*
bn2bin(): Don't accept len < 0
Richard Levitte
2023-01-20
1
-0
/
+4
*
bin2bn(): When len==0, just return a zero BIGNUM
Richard Levitte
2023-01-20
1
-0
/
+9
*
Correct property EBNF for unquoted strings
Pauli
2023-01-20
1
-18
/
+0
*
Fix incorrect error return value in i2r_ADMISSION_SYNTAX()
Niels Dossche
2023-01-19
1
-1
/
+1
*
remove unused macro in cast_local.h and des_local.h
zhangzhilei
2023-01-17
2
-60
/
+0
*
PKCS12 - Add additional libctx and propq support.
slontis
2023-01-16
8
-17
/
+128
*
Fix big-endian issue in chacha20 SVE implementation on aarch64
fangming.fang
2023-01-16
1
-9
/
+16
*
Limit size of modulus for bn_mul_mont and BN_mod_exp_mont_consttime
Bernd Edlinger
2023-01-14
3
-8
/
+48
*
Revert "Limit size of modulus for BN_mod_exp_mont_consttime()"
Bernd Edlinger
2023-01-14
1
-9
/
+0
*
QUIC: Enable building with QUIC support disabled
Hugo Landau
2023-01-13
2
-0
/
+15
*
Add BIO poll descriptors
Hugo Landau
2023-01-13
2
-0
/
+20
*
Support all five EdDSA instances from RFC 8032
James Muir
2023-01-13
4
-59
/
+100
*
Make RSA_generate_multi_prime_key() not segfault if e is NULL.
slontis
2023-01-12
1
-6
/
+7
*
remove unused macro in rc2_local.h and rc5_local.h
zhangzhilei
2023-01-12
2
-127
/
+0
*
Do not check definition of a macro and use it in a single condition
Tomas Mraz
2023-01-12
1
-2
/
+3
*
OSSL_PARAM_BLD and BIGNUM; ensure at least one byte is allocated
Richard Levitte
2023-01-11
1
-0
/
+4
*
In OSSL_PARAM_set_BN(), make sure that the data_size field is at least 1
Richard Levitte
2023-01-11
1
-0
/
+3
*
info.c: Fix typos in seed macro name and description string
Greg McLearn
2023-01-10
1
-2
/
+2
*
rsaz_exp_x2.c: Remove unused ALIGN64 macro
Tomas Mraz
2023-01-09
1
-8
/
+0
*
rsaz_exp_x2.c: Avoid potential undefined behavior with strict aliasing
Tomas Mraz
2023-01-09
1
-4
/
+12
*
Revert "Fix an occasional CI failure due to unaligned access"
Tomas Mraz
2023-01-09
1
-9
/
+7
[next]