index
:
delta/openssl.git
BRANCH_ASN1
BRANCH_OpenSSL_0_9_8k
BRANCH_VMS_64BIT
BRANCH_WIN64
BRANCH_engine
OpenSSL-engine-0_9_6-stable
OpenSSL-fips-0_9_7-stable
OpenSSL-fips-0_9_8-stable
OpenSSL-fips-1_2-stable
OpenSSL-fips-2_0-stable
OpenSSL-fips2-0_9_7-stable
OpenSSL-rfc3820-0_9_7-stable
OpenSSL_0_9_6-stable
OpenSSL_0_9_7-stable
OpenSSL_0_9_8-stable
OpenSSL_0_9_8fg-stable
OpenSSL_1_0_0-stable
OpenSSL_1_0_1-stable
OpenSSL_1_0_2-stable
OpenTLS
SSLeay
baserock/morph
master
origin
summary
refs
log
tree
commit
diff
log msg
author
committer
range
Commit message (
Expand
)
Author
Age
Files
Lines
*
fix leak
HEAD
origin
master
steve
2012-03-22
1
-0
/
+1
*
Submitted by: Markus Friedl <mfriedl@gmail.com>
steve
2012-03-22
1
-2
/
+14
*
use client version when deciding whether to send supported signature algorith...
steve
2012-03-21
1
-1
/
+1
*
e_padlock-x86[_64].pl: better understanding of prefetch errata and proper
appro
2012-03-19
2
-78
/
+204
*
eng_all.c: revert previous "disable Padlock" commit, which was unjustified.
appro
2012-03-19
2
-2
/
+3
*
Always use SSLv23_{client,server}_method in s_client.c and s_server.c,
steve
2012-03-18
2
-16
/
+0
*
vpaes-x86_64.pl: out-of-date Apple assembler fails to calculate
appro
2012-03-17
1
-1
/
+1
*
bsaes-x86_64.pl: optimize key conversion.
appro
2012-03-16
1
-39
/
+79
*
bsaes-armv7.pl: optmize Sbox and key conversion.
appro
2012-03-16
1
-46
/
+41
*
oops, revert unrelated patches
steve
2012-03-14
4
-125
/
+12
*
update FAQ, NEWS
steve
2012-03-14
6
-13
/
+139
*
ghash-x86.pl: omit unreferenced rem_8bit from no-sse2 build.
appro
2012-03-13
1
-13
/
+13
*
ssl/t1_enc.c: pay attention to EVP_CIPH_FLAG_CUSTOM_CIPHER.
appro
2012-03-13
1
-1
/
+4
*
x86_64-xlate.pl: remove old kludge.
appro
2012-03-13
1
-6
/
+2
*
corrected fix to PR#2711 and also cover mime_param_cmp
steve
2012-03-12
1
-3
/
+4
*
Fix for CMS/PKCS7 MMA. If RSA decryption fails use a random key and
steve
2012-03-12
6
-38
/
+139
*
update NEWS
steve
2012-03-12
1
-0
/
+44
*
PR: 2744
steve
2012-03-11
2
-0
/
+43
*
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
steve
2012-03-09
2
-13
/
+62
*
PR: 2756
steve
2012-03-09
3
-23
/
+27
*
check return value of BIO_write in PKCS7_decrypt
steve
2012-03-08
1
-1
/
+5
*
New ctrls to retrieve supported signature algorithms and curves and
steve
2012-03-06
11
-24
/
+197
*
PR: 2755
steve
2012-03-06
4
-2
/
+29
*
PR: 2748
steve
2012-03-06
2
-5
/
+4
*
don't do loop check for single self signed certificate
steve
2012-03-05
1
-0
/
+3
*
Configure: make no-whirlpool work.
appro
2012-03-03
1
-1
/
+3
*
bsaes-armv7.pl: change preferred contact.
appro
2012-03-03
1
-1
/
+1
*
Add bit-sliced AES for ARM NEON. This initial version is effectively
appro
2012-03-03
1
-0
/
+987
*
PR: 2743
steve
2012-02-29
1
-0
/
+1
*
PR: 2742
steve
2012-02-29
1
-3
/
+7
*
Fix memory leak cause by race condition when creating public keys.
steve
2012-02-28
1
-1
/
+10
*
x86cpuid.pl: fix processor capability detection on pre-586.
appro
2012-02-28
1
-2
/
+3
*
PR: 2736
steve
2012-02-27
1
-2
/
+1
*
PR: 2737
steve
2012-02-27
1
-1
/
+1
*
PR: 2739
steve
2012-02-27
2
-2
/
+6
*
PR: 2735
steve
2012-02-27
1
-20
/
+51
*
free headers after use in error message
steve
2012-02-27
1
-1
/
+1
*
Detect symmetric crypto errors in PKCS7_decrypt.
steve
2012-02-27
1
-2
/
+17
*
Configure: I remove adding of -D_XPG4_2 -D__EXTENSIONS__ in sctp builds for
appro
2012-02-26
1
-8
/
+0
*
seed.c: incredibly enough seed.c can fail to compile on Solaris with certain
appro
2012-02-26
1
-0
/
+4
*
PR: 2730
steve
2012-02-25
2
-1
/
+8
*
ABI fixes from 1.0.1-stable
steve
2012-02-23
1
-6
/
+7
*
PR: 2711
steve
2012-02-23
1
-0
/
+4
*
PR: 2696
steve
2012-02-23
1
-8
/
+55
*
PR: 2727
steve
2012-02-23
1
-1
/
+2
*
ABI compliance fixes.
steve
2012-02-22
4
-74
/
+70
*
SSL export fixes (from Adam Langley) [original from 1.0.1]
steve
2012-02-22
5
-46
/
+55
*
initialise i if n == 0
steve
2012-02-22
1
-0
/
+2
*
Add new APIs EC_curve_nist2nid and EC_curve_nid2nist which convert
steve
2012-02-21
6
-2
/
+71
*
Fix bug in CVE-2011-4619: check we have really received a client hello
steve
2012-02-16
2
-8
/
+14
[next]