Skip to main content
  • Home
  • login
  • Browse the archive

    swh mirror partner logo
swh logo
SoftwareHeritage
Software
Heritage
Mirror
Features
  • Search

  • Downloads

  • Save code now

  • Add forge now

  • Help


sort by:
RevisionAuthorDateMessageCommit Date
4af7930 Nick Mathewson08 September 2013, 00:40:59 UTCDo not include a timestamp in the ClientHello Random field. Instead, send random bytes. While the gmt_unix_time record was added in an ostensible attempt to mitigate the dangers of a bad RNG, its presence leaks the host's view of the current time in the clear. This minor leak can help fingerprint TLS instances across networks and protocols... and what's worse, it's doubtful thet the gmt_unix_time record does any good at all for its intended purpose, since: * It's quite possible to open two TLS connections in one second. * If the PRNG output is prone to repeat itself, ephemeral * handshakes (and who knows what else besides) are broken.16 September 2013, 17:44:10 UTC
13bca90 Rob Stradling12 September 2013, 21:05:17 UTCUpdate CHANGES.16 September 2013, 14:17:37 UTC
c9a6dda Rob Stradling10 September 2013, 10:06:55 UTCTidy up comments.16 September 2013, 14:07:52 UTC
f4a5197 Rob Stradling10 September 2013, 10:03:29 UTCUse TLS version supplied by client when fingerprinting Safari.16 September 2013, 14:07:52 UTC
937f125 Rob Stradling10 September 2013, 10:00:57 UTCFix compilation with no-ec and/or no-tlsext.16 September 2013, 14:07:52 UTC
4b61f6d Rob Stradling09 September 2013, 11:52:41 UTCDon't prefer ECDHE-ECDSA ciphers when the client appears to be Safari on OS X. OS X 10.8..10.8.3 has broken support for ECDHE-ECDSA ciphers.16 September 2013, 14:07:51 UTC
d5bff72 Ben Laurie16 September 2013, 14:05:21 UTCRemove AVX and VIS3 support.16 September 2013, 14:05:21 UTC
3b4be00 Andy Polyakov19 May 2013, 19:55:30 UTCgcm128.c: update from master (add AVX and VIS3 support).16 September 2013, 13:14:56 UTC
125c2ed Andy Polyakov05 November 2012, 17:03:39 UTCcrypto/modes: even more strict aliasing fixes [and fix bug in cbc128.c from previous cbc128.c commit].16 September 2013, 13:12:25 UTC
09da955 Andy Polyakov05 November 2012, 10:04:02 UTCcbc128.c: fix strict aliasing warning.16 September 2013, 13:11:53 UTC
cc53b38 Bodo Moeller16 September 2013, 12:47:56 UTCSync CHANGES and NEWS files.16 September 2013, 12:47:56 UTC
0aeeae0 Bodo Moeller16 September 2013, 11:03:27 UTCFix overly lenient comparisons: - EC_GROUP_cmp shouldn't consider curves equal just because the curve name is the same. (They really *should* be the same in this case, but there's an EC_GROUP_set_curve_name API, which could be misused.) - EC_POINT_cmp shouldn't return 0 for ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED or EC_R_INCOMPATIBLE_OBJECTS errors because in a cmp API, 0 indicates equality (not an error). Reported by: king cope (cherry picked from commit 312a46791ab465cfa3bf26764361faed0e5df014)16 September 2013, 11:09:27 UTC
00c991f Andy Polyakov15 September 2013, 20:07:49 UTCcrypto/armcap.c: fix typo in rdtsc subroutine. PR: 3125 Submitted by: Kyle McMartin (cherry picked from commit 8e52a9063a8a016bdac780005256994d26f9c2f9)15 September 2013, 20:11:34 UTC
55856a7 Dr. Stephen Henson20 August 2013, 15:33:02 UTCCorrect ECDSA example. (cherry picked from commit 3a918ea2bbf4175d9461f81be1403d3781b2c0dc)20 August 2013, 16:30:38 UTC
83a3af9 Michael Tuexen13 August 2013, 17:53:19 UTCDTLS message_sequence number wrong in rehandshake ServerHello This fix ensures that * A HelloRequest is retransmitted if not responded by a ClientHello * The HelloRequest "consumes" the sequence number 0. The subsequent ServerHello uses the sequence number 1. * The client also expects the sequence number of the ServerHello to be 1 if a HelloRequest was received earlier. This patch fixes the RFC violation. (cherry picked from commit b62f4daac00303280361924b9cc19b3e27528b15)13 August 2013, 17:55:41 UTC
76bf0cf Michael Tuexen08 August 2013, 12:28:55 UTCDTLS handshake fix. Reported by: Prashant Jaikumar <rmstar@gmail.com> Fix handling of application data received before a handshake. (cherry picked from commit 0c75eeacd3285b395dc75b65c3e6fe6ffbef59f0)08 August 2013, 12:32:11 UTC
7cf0529 Dr. Stephen Henson12 July 2013, 16:35:08 UTCFix verify loop with CRL checking. PR #3090 Reported by: Franck Youssef <fry@open.ch> If no new reason codes are obtained after checking a CRL exit with an error to avoid repeatedly checking the same CRL. This will only happen if verify errors such as invalid CRL scope are overridden in a callback. (cherry picked from commit 4b26645c1a71cf9ce489e4f79fc836760b670ffe)06 August 2013, 15:08:09 UTC
6c03af1 Kaspar Brand06 August 2013, 15:01:47 UTCFix for PEM_X509_INFO_read_bio. PR: 3028 Fix bug introduced in PEM_X509_INFO_bio which wouldn't process RSA keys correctly if they appeared first. (cherry picked from commit 5ae8d6bcbaff99423a2608559d738a3fcf7ed6dc)06 August 2013, 15:05:19 UTC
5cd1aa4 Andy Polyakov03 August 2013, 14:56:58 UTCcrypto/evp/e_aes.c: fix logical pre-processor bug and formatting. Bug would emerge when XTS is added to bsaes-armv7.pl. Pointed out by Ard Biesheuvel of Linaro. (cherry picked from commit 044f63086051d7542fa9485a1432498c39c4d8fa)03 August 2013, 15:08:43 UTC
04b80f4 Andy Polyakov31 July 2013, 21:53:49 UTCcrypto/sha/asm/sha1-x86_64.pl: comply with Win64 ABI.31 July 2013, 21:53:49 UTC
591c55a Andy Polyakov30 June 2013, 21:55:55 UTCconfig: fix executable format detection on latest FreeBSD. Submitted by: Bryan Drewery PR: 3075 (cherry picked from commit c256e69d3f3acd0794ae9c1f353f4093bd4c8878)30 June 2013, 22:00:20 UTC
cd26938 Andy Polyakov18 June 2013, 08:37:00 UTCPA-RISC assembler pack: switch to bve in 64-bit builds. PR: 3074 (cherry picked from commit 02450ec69dda7815ba1e7bd74eb30f0ae1eb3042)30 June 2013, 21:15:53 UTC
25370e9 Dr. Stephen Henson12 June 2013, 20:16:31 UTCTypo: don't call RAND_cleanup during app startup. (cherry picked from commit 90e7f983b573c3f3c722a02db4491a1b1cd87e8c)12 June 2013, 20:18:47 UTC
cdb6c48 Dr. Stephen Henson30 May 2013, 20:39:50 UTCDon't use RC2 with PKCS#12 files in FIPS mode.30 May 2013, 20:39:50 UTC
04b727b Dr. Stephen Henson05 May 2013, 12:34:03 UTCFix PSS signature printing. Fix PSS signature printing: consistently use 0x prefix for hex values for padding length and trailer fields. (cherry picked from commit deb24ad53147f5a8dd63416224a5edd7bbc0e74a)05 May 2013, 13:03:30 UTC
cbd93a0 Dr. Stephen Henson03 May 2013, 11:31:47 UTCReencode with X509_CRL_ctx_sign too. (cherry picked from commit 96940f4f2d0300c033379a87db0ff19e598c6264)03 May 2013, 12:06:18 UTC
b9e84f0 Dr. Stephen Henson02 May 2013, 11:18:46 UTCReencode certificates in X509_sign_ctx. Reencode certificates in X509_sign_ctx as well as X509_sign. This was causing a problem in the x509 application when it modified an existing certificate. (cherry picked from commit c6d8adb8a45186617e0a8e2c09469bd164b92b31)02 May 2013, 11:24:56 UTC
29a5467 Andy Polyakov13 April 2013, 18:57:37 UTCcrypto/modes/modes_lcl.h: let STRICT_ALIGNMENT be on ARMv7. While ARMv7 in general is capable of unaligned access, not all instructions actually are. And trouble is that compiler doesn't seem to differentiate those capable and incapable of unaligned access. Side effect is that kernel goes into endless loop retrying same instruction triggering unaligned trap. Problem was observed in xts128.c and ccm128.c modules. It's possible to resolve it by using (volatile u32*) casts, but letting STRICT_ALIGNMENT be feels more appropriate. (cherry picked from commit 3bdd80521a81d50ade4214053cd9b293f920a77b)13 April 2013, 19:19:31 UTC
0e9dd38 Dr. Stephen Henson08 April 2013, 17:03:12 UTCSet s->d1 to NULL after freeing it. (cherry picked from commit 04638f2fc335a6dc2af8e5d556d36e29c261dcd2)08 April 2013, 17:40:28 UTC
79dabcc Dr. Stephen Henson31 March 2013, 16:42:46 UTCTypo. (cherry picked from commit 0ded2a06891a4d5a207d8f29aa9a89a755158170)31 March 2013, 16:43:58 UTC
944bc29 Dr. Stephen Henson28 March 2013, 14:28:06 UTCCall RAND_cleanup in openssl application.28 March 2013, 14:28:06 UTC
03e1b3a Matt Caswell26 March 2013, 15:39:50 UTCMake binary curve ASN.1 work in FIPS mode. Don't check for binary curves by checking methods: the values will be different in FIPS mode as they are redirected to the validated module version. (cherry picked from commit 94782e0e9c28bd872107b8f814f4db68c9fbf5ab)26 March 2013, 16:58:40 UTC
9c95ff9 Dr. Stephen Henson19 March 2013, 13:46:28 UTCDisable compression for DTLS. The only standard compression method is stateful and is incompatible with DTLS. (cherry picked from commit e14b8410ca882da8e9579a2d928706f894c8e1ae)19 March 2013, 13:47:29 UTC
96b680f Andy Polyakov04 March 2013, 19:05:04 UTCx86cpuid.pl: make it work with older CPUs. PR: 3005 (cherry picked from commit 5702e965d759dde8a098d8108660721ba2b93a7d)18 March 2013, 18:50:23 UTC
9ab3ce1 Andy Polyakov18 March 2013, 18:29:41 UTCe_aes_cbc_hmac_sha1.c: fix rare bad record mac on AES-NI plaforms. PR: 3002 (cherry picked from commit 5c60046553716fcf160718f59160493194f212dc)18 March 2013, 18:35:48 UTC
3972dbe Michael Tuexen18 March 2013, 14:30:38 UTCAvoid unnecessary fragmentation. (cherry picked from commit 80ccc66d7eedb2d06050130c77c482ae1584199a)18 March 2013, 14:33:09 UTC
85615e3 Dr. Stephen Henson18 March 2013, 14:19:40 UTCEncode INTEGER correctly. If an ASN1_INTEGER structure is allocated but not explicitly set encode it as zero: don't generate an invalid zero length INTEGER. (cherry picked from commit 1643edc63c3e15b6db5a15a728bc288f2cc2bbc7)18 March 2013, 14:21:56 UTC
f4cfc34 Dr. Stephen Henson18 March 2013, 14:00:13 UTCMerge branch 'OpenSSL_1_0_1-stable' of ../openssl into OpenSSL_1_0_1-stable18 March 2013, 14:00:13 UTC
24f599a Dr. Stephen Henson18 March 2013, 13:58:32 UTCTypo. (cherry picked from commit 1546fb780bc11556a18d70c5fb29af4a9d5beaff)18 March 2013, 13:59:44 UTC
bca0d7f Andy Polyakov01 March 2013, 21:36:36 UTCx86_64-gf2m.pl: fix typo. (cherry picked from commit 342dbbbe4eb82b6e12163965a12f580c2deb03ad)01 March 2013, 21:38:11 UTC
bc4ae2c Andy Polyakov01 March 2013, 20:43:10 UTCx86_64-gf2m.pl: add missing Windows build fix for #2963. PR: 3004 (cherry picked from commit 7c43601d4424575d589f028aed0d5a4ae337527f)01 March 2013, 20:58:08 UTC
ef4b9f0 Andy Polyakov16 February 2013, 10:38:46 UTCbn_nist.c: cumulative update from master. PR: 2981, 283716 February 2013, 10:40:35 UTC
08f8933 Nick Alcock15 February 2013, 17:44:11 UTCFix POD errors to stop make install_docs dying with pod2man 2.5.0+ podlators 2.5.0 has switched to dying on POD syntax errors. This means that a bunch of long-standing erroneous POD in the openssl documentation now leads to fatal errors from pod2man, halting installation. Unfortunately POD constraints mean that you have to sort numeric lists in ascending order if they start with 1: you cannot do 1, 0, 2 even if you want 1 to appear first. I've reshuffled such (alas, I wish there were a better way but I don't know of one). (cherry picked from commit 5cc270774258149235f69e1789b3370f57b0e27b)15 February 2013, 18:40:09 UTC
4195837 Andy Polyakov16 May 2011, 18:11:45 UTCcms-test.pl: make it work with not-so-latest perl. (cherry picked from commit 9c437e2faded18b4ef6499d7041c65d6e216955b)14 February 2013, 15:39:33 UTC
9fe4603 David Woodhouse12 February 2013, 14:55:32 UTCCheck DTLS_BAD_VER for version number. The version check for DTLS1_VERSION was redundant as DTLS1_VERSION > TLS1_1_VERSION, however we do need to check for DTLS1_BAD_VER for compatibility. PR:2984 (cherry picked from commit d980abb22e22661e98e5cee33d760ab0c7584ecc)12 February 2013, 15:16:05 UTC
147dbb2 Dr. Stephen Henson11 February 2013, 18:24:03 UTCFix for SSL_get_certificate Now we set the current certificate to the one used by a server there is no need to call ssl_get_server_send_cert which will fail if we haven't sent a certificate yet.11 February 2013, 18:24:03 UTC
cbf9b4a Dr. Stephen Henson11 February 2013, 18:17:50 UTCFix in ssltest is no-ssl2 configured11 February 2013, 18:17:50 UTC
625a553 Dr. Stephen Henson11 February 2013, 16:35:10 UTCupdate CHANGES11 February 2013, 16:35:10 UTC
3151e32 Dr. Stephen Henson11 February 2013, 16:14:11 UTCprepare for next version11 February 2013, 16:14:11 UTC
46ebd9e Dr. Stephen Henson11 February 2013, 15:15:58 UTCuse 10240 for record size Workaround for non-compliant tar files sometimes created by "make dist".11 February 2013, 15:21:21 UTC
f66db68 Dr. Stephen Henson11 February 2013, 11:57:46 UTCprepare for release11 February 2013, 11:57:46 UTC
0c4b72e Dr. Stephen Henson11 February 2013, 11:48:42 UTCUpdate NEWS11 February 2013, 11:54:10 UTC
f88dbb8 Lutz Jaenicke11 February 2013, 10:29:05 UTCFAQ/README: we are now using Git instead of CVS11 February 2013, 10:29:05 UTC
1113fc3 Andy Polyakov11 February 2013, 09:39:50 UTCsparccpuid.S: work around emulator bug on T1. (cherry picked from commit 3caeef94bd045608af03b061643992e3afd9c445)11 February 2013, 09:41:57 UTC
0898147 Andy Polyakov09 February 2013, 18:52:07 UTCssl/*: fix linking errors with no-srtp.09 February 2013, 18:52:07 UTC
4d8da30 Andy Polyakov09 February 2013, 18:50:34 UTCssl/s3_[clnt|srvr].c: fix warnings.09 February 2013, 18:50:34 UTC
579f3a6 Andy Polyakov08 February 2013, 20:30:52 UTCs3_cbc.c: make CBC_MAC_ROTATE_IN_PLACE universal. (cherry picked from commit f93a41877d8d7a287debb7c63d7b646abaaf269c)08 February 2013, 20:37:07 UTC
47061af Andy Polyakov08 February 2013, 15:59:26 UTCs3_cbc.c: get rid of expensive divisions [from master]. (cherry picked from commit e9baceab5a385e570706ca98dec768b2d89d1ac6)08 February 2013, 16:00:46 UTC
13e2253 Andy Polyakov08 February 2013, 08:43:01 UTCe_aes_cbc_hmac_sha1.c: fine-tune cache line alignment. With previous commit it also ensures that valgrind is happy.08 February 2013, 08:45:09 UTC
26bc56d Ben Laurie26 January 2013, 15:01:48 UTCAdd clang target.08 February 2013, 00:17:43 UTC
496681c Ben Laurie19 January 2013, 15:12:08 UTCRemove extraneous brackets (clang doesn't like them).08 February 2013, 00:17:43 UTC
746c6f3 Andy Polyakov07 February 2013, 22:03:49 UTCe_aes_cbc_hmac_sha1.c: align calculated MAC at cache line.07 February 2013, 22:04:31 UTC
8545f73 Andy Polyakov07 February 2013, 21:47:05 UTCssl/[d1|s3]_pkt.c: harmomize orig_len handling.07 February 2013, 21:47:05 UTC
32cc247 Dr. Stephen Henson07 February 2013, 21:06:37 UTCFix IV check and padding removal. Fix the calculation that checks there is enough room in a record after removing padding and optional explicit IV. (by Steve) For AEAD remove the correct number of padding bytes (by Andy)07 February 2013, 21:06:37 UTC
f306b87 Adam Langley06 February 2013, 16:05:40 UTCFix for EXP-RC2-CBC-MD5 MD5 should use little endian order. Fortunately the only ciphersuite affected is EXP-RC2-CBC-MD5 (TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5) which is a rarely used export grade ciphersuite.06 February 2013, 16:05:40 UTC
41cf07f Dr. Stephen Henson06 February 2013, 02:26:24 UTCprepare for next version06 February 2013, 02:26:24 UTC
62f4033 Dr. Stephen Henson04 February 2013, 23:12:58 UTCtypo04 February 2013, 23:12:58 UTC
f9f6a8f Dr. Stephen Henson04 February 2013, 22:40:10 UTCPrepare for release.04 February 2013, 22:40:10 UTC
df0d935 Dr. Stephen Henson04 February 2013, 22:39:37 UTCtypo04 February 2013, 22:39:37 UTC
0d589ac Dr. Stephen Henson04 February 2013, 21:29:41 UTCmake update04 February 2013, 21:29:41 UTC
35d732f Dr. Stephen Henson04 February 2013, 21:13:18 UTCFix error codes.04 February 2013, 21:13:18 UTC
896ddb9 Dr. Stephen Henson04 February 2013, 20:48:45 UTCReword NEWS entry.04 February 2013, 20:48:45 UTC
e630b3c Dr. Stephen Henson04 February 2013, 20:47:36 UTCUpdate NEWS04 February 2013, 20:47:36 UTC
f1ca56a Dr. Stephen Henson04 February 2013, 20:34:26 UTCAdd CHANGES entries.04 February 2013, 20:37:46 UTC
529d27e Andy Polyakov03 February 2013, 19:04:39 UTCe_aes_cbc_hmac_sha1.c: cleanse temporary copy of HMAC secret.03 February 2013, 19:04:39 UTC
b2226c6 Andy Polyakov09 November 2012, 13:58:40 UTCbn_word.c: fix overflow bug in BN_add_word. (cherry picked from commit 134c00659a1bc67ad35a1e4620e16bc4315e6e37)02 February 2013, 21:39:00 UTC
024de21 Andy Polyakov02 February 2013, 18:52:43 UTCx86_64 assembly pack: keep making Windows build more robust. PR: 2963 and a number of others (cherry picked from commit 4568182a8b8cbfd15cbc175189029ac547bd1762)02 February 2013, 21:26:20 UTC
125093b Andy Polyakov02 February 2013, 18:29:59 UTCe_aes_cbc_hmac_sha1.c: address the CBC decrypt timing issues. Address CBC decrypt timing issues and reenable the AESNI+SHA1 stitch.02 February 2013, 18:35:09 UTC
f3e99ea Ben Laurie01 February 2013, 19:04:26 UTCMerge remote-tracking branch 'origin/OpenSSL_1_0_1-stable' into OpenSSL_1_0_1-stable01 February 2013, 19:04:26 UTC
8bfd4c6 Andy Polyakov01 February 2013, 14:31:50 UTCssl/*: remove SSL3_RECORD->orig_len to restore binary compatibility. Kludge alert. This is arranged by passing padding length in unused bits of SSL3_RECORD->type, so that orig_len can be reconstructed.01 February 2013, 14:54:37 UTC
ec07246 Andy Polyakov01 February 2013, 14:31:50 UTCssl/*: remove SSL3_RECORD->orig_len to restore binary compatibility.01 February 2013, 14:34:09 UTC
04e45b5 Dr. Stephen Henson01 February 2013, 13:53:43 UTCDon't access EVP_MD_CTX internals directly.01 February 2013, 14:12:27 UTC
d537132 Andy Polyakov01 February 2013, 09:10:32 UTCs3/s3_cbc.c: allow for compilations with NO_SHA256|512.01 February 2013, 09:31:59 UTC
3626023 Andy Polyakov01 February 2013, 08:59:56 UTCssl/s3_cbc.c: md_state alignment portability fix. RISCs are picky and alignment granted by compiler for md_state can be insufficient for SHA512.01 February 2013, 09:31:52 UTC
cab13fc Andy Polyakov01 February 2013, 08:55:43 UTCssl/s3_cbc.c: uint64_t portability fix. Break dependency on uint64_t. It's possible to declare bits as unsigned int, because TLS packets are limited in size and 32-bit value can't overflow.01 February 2013, 09:31:23 UTC
34ab3c8 Dr. Stephen Henson31 January 2013, 23:04:39 UTCtypo.31 January 2013, 23:04:39 UTC
25c93fd Dr. Stephen Henson31 January 2013, 17:04:41 UTCMerge branch 'ben/timing-1.0.1' into OpenSSL_1_0_1-stable31 January 2013, 17:04:41 UTC
428c106 Dr. Stephen Henson31 January 2013, 16:39:40 UTCUpdate NEWS31 January 2013, 16:39:40 UTC
81ce0e1 Dr. Stephen Henson31 January 2013, 15:19:00 UTCAdd ordinal for CRYPTO_memcmp: since this will affect multiple branches it needs to be in a "gap".31 January 2013, 15:31:57 UTC
b908e88 Dr. Stephen Henson29 January 2013, 14:44:36 UTCTiming fix mitigation for FIPS mode. We have to use EVP in FIPS mode so we can only partially mitigate timing differences. Make an extra call to EVP_DigestSignUpdate to hash additonal blocks to cover any timing differences caused by removal of padding.31 January 2013, 12:34:10 UTC
62e4506 Dr. Stephen Henson24 January 2013, 13:30:42 UTCDon't try and verify signatures if key is NULL (CVE-2013-0166) Add additional check to catch this in ASN1_item_verify too.29 January 2013, 16:49:24 UTC
014265e Ben Laurie28 January 2013, 18:24:55 UTCOops. Add missing file.28 January 2013, 18:24:55 UTC
9f27de1 Ben Laurie28 January 2013, 17:34:33 UTCUpdate DTLS code to match CBC decoding in TLS. This change updates the DTLS code to match the constant-time CBC behaviour in the TLS.28 January 2013, 17:34:33 UTC
6cb19b7 Ben Laurie28 January 2013, 17:33:18 UTCDon't crash when processing a zero-length, TLS >= 1.1 record. The previous CBC patch was bugged in that there was a path through enc() in s3_pkt.c/d1_pkt.c which didn't set orig_len. orig_len would be left at the previous value which could suggest that the packet was a sufficient length when it wasn't.28 January 2013, 17:33:18 UTC
e130841 Ben Laurie28 January 2013, 17:31:49 UTCMake CBC decoding constant time. This patch makes the decoding of SSLv3 and TLS CBC records constant time. Without this, a timing side-channel can be used to build a padding oracle and mount Vaudenay's attack. This patch also disables the stitched AESNI+SHA mode pending a similar fix to that code. In order to be easy to backport, this change is implemented in ssl/, rather than as a generic AEAD mode. In the future this should be changed around so that HMAC isn't in ssl/, but crypto/ as FIPS expects.28 January 2013, 17:31:49 UTC
2ee7988 Ben Laurie28 January 2013, 17:30:38 UTCAdd and use a constant-time memcmp. This change adds CRYPTO_memcmp, which compares two vectors of bytes in an amount of time that's independent of their contents. It also changes several MAC compares in the code to use this over the standard memcmp, which may leak information about the size of a matching prefix.28 January 2013, 17:30:38 UTC
ffcf4c6 Dr. Stephen Henson23 January 2013, 01:04:36 UTCDon't include comp.h in cmd_cd.c if OPENSSL_NO_COMP set23 January 2013, 01:07:23 UTC
b286a96 Andy Polyakov22 January 2013, 21:11:31 UTCx86_64 assembly pack: make Windows build more robust [from master]. PR: 2963 and a number of others22 January 2013, 21:54:04 UTC
2a2df2e Andy Polyakov22 January 2013, 20:13:37 UTCbn/asm/mips.pl: hardwire local call to bn_div_words.22 January 2013, 20:16:51 UTC
15481c5 Dr. Stephen Henson20 January 2013, 01:07:58 UTCDon't include comp.h if no-comp set.20 January 2013, 01:10:52 UTC
  • Newer
  • Older

ENEA — Copyright (C), ENEA. License: GNU AGPLv3+.
Legal notes  ::  JavaScript license information ::  Web API

back to top