Skip to main content
  • Home
  • login
  • Browse the archive

    swh mirror partner logo
swh logo
SoftwareHeritage
Software
Heritage
Mirror
Features
  • Search

  • Downloads

  • Save code now

  • Add forge now

  • Help

swh:1:snp:dc2a5002442a00b1c0eda7c65d04ea7455e166cd
  • Code
  • Branches (204)
  • Releases (207)
    • Branches
    • Releases
    • HEAD
    • refs/heads/OpenSSL-engine-0_9_6-stable
    • refs/heads/OpenSSL-fips-0_9_7-stable
    • refs/heads/OpenSSL-fips-0_9_8-stable
    • refs/heads/OpenSSL-fips-1_2-stable
    • refs/heads/OpenSSL-fips-2_0-dev
    • refs/heads/OpenSSL-fips-2_0-stable
    • refs/heads/OpenSSL-fips2-0_9_7-stable
    • refs/heads/OpenSSL_0_9_6-stable
    • refs/heads/OpenSSL_0_9_7-stable
    • refs/heads/OpenSSL_0_9_8-stable
    • refs/heads/OpenSSL_0_9_8fg-stable
    • refs/heads/OpenSSL_1_0_0-stable
    • refs/heads/OpenSSL_1_0_1-stable
    • refs/heads/OpenSSL_1_0_2-stable
    • refs/heads/OpenSSL_1_1_0-stable
    • refs/heads/OpenSSL_1_1_1-stable
    • refs/heads/SSLeay
    • refs/heads/feature/dtls-1.3
    • refs/heads/feature/ech
    • refs/heads/feature/quic-server
    • refs/heads/master
    • refs/heads/openssl-3.0
    • refs/heads/openssl-3.1
    • refs/heads/openssl-3.2
    • refs/heads/openssl-3.3
    • refs/heads/openssl-3.4
    • refs/heads/tls1.3-draft-18
    • refs/heads/tls1.3-draft-19
    • refs/tags/AFTER_COMPAQ_PATCH
    • refs/tags/BEFORE_COMPAQ_PATCH
    • refs/tags/BEFORE_engine
    • refs/tags/BEN_FIPS_TEST_1
    • refs/tags/BEN_FIPS_TEST_2
    • refs/tags/BEN_FIPS_TEST_3
    • refs/tags/BEN_FIPS_TEST_4
    • refs/tags/BEN_FIPS_TEST_5
    • refs/tags/BEN_FIPS_TEST_6
    • refs/tags/BEN_FIPS_TEST_7
    • refs/tags/BEN_FIPS_TEST_8
    • refs/tags/FIPS_098_TEST_1
    • refs/tags/FIPS_098_TEST_2
    • refs/tags/FIPS_098_TEST_3
    • refs/tags/FIPS_098_TEST_4
    • refs/tags/FIPS_098_TEST_5
    • refs/tags/FIPS_098_TEST_6
    • refs/tags/FIPS_098_TEST_7
    • refs/tags/FIPS_098_TEST_8
    • refs/tags/FIPS_TEST_10
    • refs/tags/FIPS_TEST_9
    • refs/tags/LEVITTE_after_const
    • refs/tags/LEVITTE_before_const
    • refs/tags/OpenSSL-engine-0_9_6
    • refs/tags/OpenSSL-engine-0_9_6-beta1
    • refs/tags/OpenSSL-engine-0_9_6-beta2
    • refs/tags/OpenSSL-engine-0_9_6-beta3
    • refs/tags/OpenSSL-engine-0_9_6a
    • refs/tags/OpenSSL-engine-0_9_6a-beta1
    • refs/tags/OpenSSL-engine-0_9_6a-beta2
    • refs/tags/OpenSSL-engine-0_9_6a-beta3
    • refs/tags/OpenSSL-engine-0_9_6b
    • refs/tags/OpenSSL-engine-0_9_6c
    • refs/tags/OpenSSL-engine-0_9_6d
    • refs/tags/OpenSSL-engine-0_9_6d-beta1
    • refs/tags/OpenSSL-engine-0_9_6e
    • refs/tags/OpenSSL-engine-0_9_6f
    • refs/tags/OpenSSL-engine-0_9_6g
    • refs/tags/OpenSSL-engine-0_9_6h
    • refs/tags/OpenSSL-engine-0_9_6i
    • refs/tags/OpenSSL-engine-0_9_6j
    • refs/tags/OpenSSL-engine-0_9_6k
    • refs/tags/OpenSSL-engine-0_9_6l
    • refs/tags/OpenSSL-engine-0_9_6m
    • refs/tags/OpenSSL-fips-1_2_0
    • refs/tags/OpenSSL-fips-1_2_1
    • refs/tags/OpenSSL-fips-1_2_2
    • refs/tags/OpenSSL-fips-1_2_3
    • refs/tags/OpenSSL-fips-2_0
    • refs/tags/OpenSSL-fips-2_0-pl1
    • refs/tags/OpenSSL-fips-2_0-rc1
    • refs/tags/OpenSSL-fips-2_0-rc2
    • refs/tags/OpenSSL-fips-2_0-rc3
    • refs/tags/OpenSSL-fips-2_0-rc4
    • refs/tags/OpenSSL-fips-2_0-rc5
    • refs/tags/OpenSSL-fips-2_0-rc6
    • refs/tags/OpenSSL-fips-2_0-rc7
    • refs/tags/OpenSSL-fips-2_0-rc8
    • refs/tags/OpenSSL-fips-2_0-rc9
    • refs/tags/OpenSSL-fips-2_0_1
    • refs/tags/OpenSSL_0_9_1c
    • refs/tags/OpenSSL_0_9_2b
    • refs/tags/OpenSSL_0_9_3
    • refs/tags/OpenSSL_0_9_3a
    • refs/tags/OpenSSL_0_9_3beta1
    • refs/tags/OpenSSL_0_9_3beta2
    • refs/tags/OpenSSL_0_9_4
    • refs/tags/OpenSSL_0_9_5
    • refs/tags/OpenSSL_0_9_5a
    • refs/tags/OpenSSL_0_9_5a-beta1
    • refs/tags/OpenSSL_0_9_5a-beta2
    • refs/tags/OpenSSL_0_9_5beta1
    • refs/tags/OpenSSL_0_9_5beta2
    • refs/tags/OpenSSL_0_9_6
    • refs/tags/OpenSSL_0_9_6-beta1
    • refs/tags/OpenSSL_0_9_6-beta2
    • refs/tags/OpenSSL_0_9_6-beta3
    • refs/tags/OpenSSL_0_9_6a
    • refs/tags/OpenSSL_0_9_6a-beta1
    • refs/tags/OpenSSL_0_9_6a-beta2
    • refs/tags/OpenSSL_0_9_6a-beta3
    • refs/tags/OpenSSL_0_9_6b
    • refs/tags/OpenSSL_0_9_6c
    • refs/tags/OpenSSL_0_9_6d
    • refs/tags/OpenSSL_0_9_6d-beta1
    • refs/tags/OpenSSL_0_9_6e
    • refs/tags/OpenSSL_0_9_6f
    • refs/tags/OpenSSL_0_9_6g
    • refs/tags/OpenSSL_0_9_6h
    • refs/tags/OpenSSL_0_9_6i
    • refs/tags/OpenSSL_0_9_6j
    • refs/tags/OpenSSL_0_9_6k
    • refs/tags/OpenSSL_0_9_6l
    • refs/tags/OpenSSL_0_9_6m
    • refs/tags/OpenSSL_0_9_7
    • refs/tags/OpenSSL_0_9_7-beta1
    • refs/tags/OpenSSL_0_9_7-beta2
    • refs/tags/OpenSSL_0_9_7-beta3
    • refs/tags/OpenSSL_0_9_7-beta4
    • refs/tags/OpenSSL_0_9_7-beta5
    • refs/tags/OpenSSL_0_9_7-beta6
    • refs/tags/OpenSSL_0_9_7a
    • refs/tags/OpenSSL_0_9_7b
    • refs/tags/OpenSSL_0_9_7c
    • refs/tags/OpenSSL_0_9_7d
    • refs/tags/OpenSSL_0_9_7e
    • refs/tags/OpenSSL_0_9_7f
    • refs/tags/OpenSSL_0_9_7g
    • refs/tags/OpenSSL_0_9_7h
    • refs/tags/OpenSSL_0_9_7i
    • refs/tags/OpenSSL_0_9_7j
    • refs/tags/OpenSSL_0_9_7k
    • refs/tags/OpenSSL_0_9_7l
    • refs/tags/OpenSSL_0_9_7m
    • refs/tags/OpenSSL_0_9_8
    • refs/tags/OpenSSL_0_9_8-beta1
    • refs/tags/OpenSSL_0_9_8-beta2
    • refs/tags/OpenSSL_0_9_8-beta3
    • refs/tags/OpenSSL_0_9_8-beta4
    • refs/tags/OpenSSL_0_9_8-beta5
    • refs/tags/OpenSSL_0_9_8-beta6
    • refs/tags/OpenSSL_0_9_8a
    • refs/tags/OpenSSL_0_9_8b
    • refs/tags/OpenSSL_0_9_8c
    • refs/tags/OpenSSL_0_9_8d
    • refs/tags/OpenSSL_0_9_8e
    • refs/tags/OpenSSL_0_9_8f
    • refs/tags/OpenSSL_0_9_8g
    • refs/tags/OpenSSL_0_9_8h
    • refs/tags/OpenSSL_0_9_8i
    • refs/tags/OpenSSL_0_9_8j
    • refs/tags/OpenSSL_0_9_8k
    • refs/tags/OpenSSL_0_9_8l
    • refs/tags/OpenSSL_0_9_8m
    • refs/tags/OpenSSL_0_9_8m-beta1
    • refs/tags/OpenSSL_0_9_8n
    • refs/tags/OpenSSL_0_9_8o
    • refs/tags/OpenSSL_0_9_8p
    • refs/tags/OpenSSL_0_9_8q
    • refs/tags/OpenSSL_0_9_8r
    • refs/tags/OpenSSL_0_9_8s
    • refs/tags/OpenSSL_0_9_8t
    • refs/tags/OpenSSL_0_9_8u
    • refs/tags/OpenSSL_0_9_8v
    • refs/tags/OpenSSL_0_9_8w
    • refs/tags/OpenSSL_0_9_8x
    • refs/tags/OpenSSL_1_0_0
    • refs/tags/OpenSSL_1_0_0-beta1
    • refs/tags/OpenSSL_1_0_0-beta2
    • refs/tags/OpenSSL_1_0_0-beta3
    • refs/tags/OpenSSL_1_0_0-beta4
    • refs/tags/OpenSSL_1_0_0-beta5
    • refs/tags/OpenSSL_1_0_0a
    • refs/tags/OpenSSL_1_0_0b
    • refs/tags/OpenSSL_1_0_0c
    • refs/tags/OpenSSL_1_0_0d
    • refs/tags/OpenSSL_1_0_0e
    • refs/tags/OpenSSL_1_0_0f
    • refs/tags/OpenSSL_1_0_0g
    • refs/tags/OpenSSL_1_0_0h
    • refs/tags/OpenSSL_1_0_0i
    • refs/tags/OpenSSL_1_0_0j
    • refs/tags/OpenSSL_1_0_1
    • refs/tags/OpenSSL_1_0_1-beta1
    • refs/tags/OpenSSL_1_0_1-beta2
    • refs/tags/OpenSSL_1_0_1-beta3
    • refs/tags/OpenSSL_1_0_1a
    • refs/tags/OpenSSL_1_0_1b
    • refs/tags/OpenSSL_1_0_1c
    • refs/tags/OpenSSL_FIPS_1_0
    • refs/tags/SSLeay_0_8_1b
    • refs/tags/SSLeay_0_9_0b
    • refs/tags/SSLeay_0_9_1b
    • refs/tags/STATE_after_zlib
    • refs/tags/STATE_before_zlib
    • refs/tags/rsaref
    • openssl-3.4.0-alpha1
    • openssl-3.3.2
    • openssl-3.3.1
    • openssl-3.3.0-beta1
    • openssl-3.3.0-alpha1
    • openssl-3.3.0
    • openssl-3.2.3
    • openssl-3.2.2
    • openssl-3.2.1
    • openssl-3.2.0-beta1
    • openssl-3.2.0-alpha2
    • openssl-3.2.0-alpha1
    • openssl-3.2.0
    • openssl-3.1.7
    • openssl-3.1.6
    • openssl-3.1.5
    • openssl-3.1.4
    • openssl-3.1.3
    • openssl-3.1.2
    • openssl-3.1.1
    • openssl-3.1.0-beta1
    • openssl-3.1.0-alpha1
    • openssl-3.1.0
    • openssl-3.0.9
    • openssl-3.0.8
    • openssl-3.0.7
    • openssl-3.0.6
    • openssl-3.0.5
    • openssl-3.0.4
    • openssl-3.0.3
    • openssl-3.0.2
    • openssl-3.0.15
    • openssl-3.0.14
    • openssl-3.0.13
    • openssl-3.0.12
    • openssl-3.0.11
    • openssl-3.0.10
    • openssl-3.0.1
    • openssl-3.0.0-beta2
    • openssl-3.0.0-beta1
    • openssl-3.0.0-alpha9
    • openssl-3.0.0-alpha8
    • openssl-3.0.0-alpha7
    • openssl-3.0.0-alpha6
    • openssl-3.0.0-alpha5
    • openssl-3.0.0-alpha4
    • openssl-3.0.0-alpha3
    • openssl-3.0.0-alpha2
    • openssl-3.0.0-alpha17
    • openssl-3.0.0-alpha16
    • openssl-3.0.0-alpha15
    • openssl-3.0.0-alpha14
    • openssl-3.0.0-alpha13
    • openssl-3.0.0-alpha12
    • openssl-3.0.0-alpha11
    • openssl-3.0.0-alpha10
    • openssl-3.0.0-alpha1
    • openssl-3.0.0
    • master-pre-reformat
    • master-pre-auto-reformat
    • master-post-reformat
    • master-post-auto-reformat
    • OpenSSL_1_1_1w
    • OpenSSL_1_1_1v
    • OpenSSL_1_1_1u
    • OpenSSL_1_1_1t
    • OpenSSL_1_1_1s
    • OpenSSL_1_1_1r
    • OpenSSL_1_1_1q
    • OpenSSL_1_1_1p
    • OpenSSL_1_1_1o
    • OpenSSL_1_1_1n
    • OpenSSL_1_1_1m
    • OpenSSL_1_1_1l
    • OpenSSL_1_1_1k
    • OpenSSL_1_1_1j
    • OpenSSL_1_1_1i
    • OpenSSL_1_1_1h
    • OpenSSL_1_1_1g
    • OpenSSL_1_1_1f
    • OpenSSL_1_1_1e
    • OpenSSL_1_1_1d
    • OpenSSL_1_1_1c
    • OpenSSL_1_1_1b
    • OpenSSL_1_1_1a
    • OpenSSL_1_1_1-pre9
    • OpenSSL_1_1_1-pre8
    • OpenSSL_1_1_1-pre7
    • OpenSSL_1_1_1-pre6
    • OpenSSL_1_1_1-pre5
    • OpenSSL_1_1_1-pre4
    • OpenSSL_1_1_1-pre3
    • OpenSSL_1_1_1-pre2
    • OpenSSL_1_1_1-pre1
    • OpenSSL_1_1_1
    • OpenSSL_1_1_0l
    • OpenSSL_1_1_0k
    • OpenSSL_1_1_0j
    • OpenSSL_1_1_0i
    • OpenSSL_1_1_0h
    • OpenSSL_1_1_0g
    • OpenSSL_1_1_0f
    • OpenSSL_1_1_0e
    • OpenSSL_1_1_0d
    • OpenSSL_1_1_0c
    • OpenSSL_1_1_0b
    • OpenSSL_1_1_0a
    • OpenSSL_1_1_0-pre6
    • OpenSSL_1_1_0-pre5
    • OpenSSL_1_1_0-pre4
    • OpenSSL_1_1_0-pre3
    • OpenSSL_1_1_0-pre2
    • OpenSSL_1_1_0-pre1
    • OpenSSL_1_1_0
    • OpenSSL_1_0_2u
    • OpenSSL_1_0_2t
    • OpenSSL_1_0_2s
    • OpenSSL_1_0_2r
    • OpenSSL_1_0_2q
    • OpenSSL_1_0_2p
    • OpenSSL_1_0_2o
    • OpenSSL_1_0_2n
    • OpenSSL_1_0_2m
    • OpenSSL_1_0_2l
    • OpenSSL_1_0_2k
    • OpenSSL_1_0_2j
    • OpenSSL_1_0_2i
    • OpenSSL_1_0_2h
    • OpenSSL_1_0_2g
    • OpenSSL_1_0_2f
    • OpenSSL_1_0_2e
    • OpenSSL_1_0_2d
    • OpenSSL_1_0_2c
    • OpenSSL_1_0_2b
    • OpenSSL_1_0_2a
    • OpenSSL_1_0_2-pre-reformat
    • OpenSSL_1_0_2-pre-auto-reformat
    • OpenSSL_1_0_2-post-reformat
    • OpenSSL_1_0_2-post-auto-reformat
    • OpenSSL_1_0_2-beta3
    • OpenSSL_1_0_2-beta2
    • OpenSSL_1_0_2-beta1
    • OpenSSL_1_0_2
    • OpenSSL_1_0_1u
    • OpenSSL_1_0_1t
    • OpenSSL_1_0_1s
    • OpenSSL_1_0_1r
    • OpenSSL_1_0_1q
    • OpenSSL_1_0_1p
    • OpenSSL_1_0_1o
    • OpenSSL_1_0_1n
    • OpenSSL_1_0_1m
    • OpenSSL_1_0_1l
    • OpenSSL_1_0_1k
    • OpenSSL_1_0_1j
    • OpenSSL_1_0_1i
    • OpenSSL_1_0_1h
    • OpenSSL_1_0_1g
    • OpenSSL_1_0_1f
    • OpenSSL_1_0_1e
    • OpenSSL_1_0_1d
    • OpenSSL_1_0_1-pre-reformat
    • OpenSSL_1_0_1-pre-auto-reformat
    • OpenSSL_1_0_1-post-reformat
    • OpenSSL_1_0_1-post-auto-reformat
    • OpenSSL_1_0_0t
    • OpenSSL_1_0_0s
    • OpenSSL_1_0_0r
    • OpenSSL_1_0_0q
    • OpenSSL_1_0_0p
    • OpenSSL_1_0_0o
    • OpenSSL_1_0_0n
    • OpenSSL_1_0_0m
    • OpenSSL_1_0_0l
    • OpenSSL_1_0_0k
    • OpenSSL_1_0_0-pre-reformat
    • OpenSSL_1_0_0-pre-auto-reformat
    • OpenSSL_1_0_0-post-reformat
    • OpenSSL_1_0_0-post-auto-reformat
    • OpenSSL_0_9_8zh
    • OpenSSL_0_9_8zg
    • OpenSSL_0_9_8zf
    • OpenSSL_0_9_8ze
    • OpenSSL_0_9_8zd
    • OpenSSL_0_9_8zc
    • OpenSSL_0_9_8zb
    • OpenSSL_0_9_8za
    • OpenSSL_0_9_8y
    • OpenSSL_0_9_8-pre-reformat
    • OpenSSL_0_9_8-pre-auto-reformat
    • OpenSSL_0_9_8-post-reformat
    • OpenSSL_0_9_8-post-auto-reformat
    • OpenSSL-fips-2_0_9
    • OpenSSL-fips-2_0_8
    • OpenSSL-fips-2_0_7
    • OpenSSL-fips-2_0_6
    • OpenSSL-fips-2_0_5
    • OpenSSL-fips-2_0_4
    • OpenSSL-fips-2_0_3
    • OpenSSL-fips-2_0_2
    • OpenSSL-fips-2_0_16
    • OpenSSL-fips-2_0_15
    • OpenSSL-fips-2_0_14
    • OpenSSL-fips-2_0_13
    • OpenSSL-fips-2_0_12
    • OpenSSL-fips-2_0_11
    • OpenSSL-fips-2_0_10
Permalinks

To reference or cite the objects present in the Software Heritage archive, permalinks based on SoftWare Hash IDentifiers (SWHIDs) must be used.
Select below a type of object currently browsed in order to display its associated SWHID and permalink.

  • revision
  • snapshot
  • release
revision badge
swh:1:rev:94f416601754dbe65e287f8e1eca01fa32f74a7a
snapshot badge
swh:1:snp:dc2a5002442a00b1c0eda7c65d04ea7455e166cd
release badge
swh:1:rel:1ba59a85c9f3a117f116627c814b1b1427715b94

sort by:
RevisionAuthorDateMessageCommit Date
94f4166 Dr. Stephen Henson24 February 2014, 13:51:34 UTCPrepare for 1.0.2-beta1 release24 February 2014, 13:51:34 UTC
a74c9c9 Dr. Stephen Henson24 February 2014, 13:50:38 UTCOpenSSL 1.0.2 is now in beta24 February 2014, 13:50:38 UTC
d2a3c44 Dr. Stephen Henson24 February 2014, 13:50:38 UTCmake update24 February 2014, 13:50:38 UTC
a129850 Andy Polyakov24 February 2014, 12:18:40 UTCconfig: recognize ARMv8/AArch64 target. (cherry picked from commit d099f0ed6ca518052bb167b31e999e1e7734eebf)24 February 2014, 12:21:14 UTC
c3f5d3d Dr. Stephen Henson23 February 2014, 13:46:52 UTCOnly set current certificate to valid values. When setting the current certificate check that it has a corresponding private key. (cherry picked from commit 358d352aa244b4f2ef655bccff6658d92d5ce03c)23 February 2014, 13:49:21 UTC
c5ea65b Dr. Stephen Henson23 February 2014, 12:00:18 UTCNew chain building flags. New flags to build certificate chains. The can be used to rearrange the chain so all an application needs to do is add all certificates in arbitrary order and then build the chain to check and correct them. Add verify error code when building chain. Update docs. (cherry picked from commit 13dc3ce9ab483cade378bcf3844c92bacd817316)23 February 2014, 13:49:21 UTC
58b86e4 Dr. Stephen Henson21 February 2014, 19:42:03 UTCOption to set current cert to server certificate. (cherry picked from commit daddd9a950e491c31f9500d5e570bc7eb96b2823)23 February 2014, 13:49:21 UTC
a466be6 Ben Laurie23 February 2014, 11:21:39 UTCFix typo.23 February 2014, 11:21:39 UTC
60327ce Ben Laurie23 February 2014, 11:21:28 UTCAdd debug flag.23 February 2014, 11:21:28 UTC
2d4d962 Andy Polyakov21 February 2014, 11:14:04 UTCaes/asm/aesni-x86[_64].pl: minor Atom-specific performance tweak. (cherry picked from commit 214368ffee5736836e2dbb80a16a4fbd85f0eaf9)21 February 2014, 11:15:07 UTC
6b3b6be Andy Polyakov21 February 2014, 11:12:25 UTCssl/ssl_cert.c: DANE update.21 February 2014, 11:12:25 UTC
7743be3 Dr. Stephen Henson20 February 2014, 22:57:24 UTCmake update20 February 2014, 22:57:24 UTC
b709f8e Dr. Stephen Henson20 February 2014, 22:37:33 UTCfix WIN32 warnings20 February 2014, 22:41:06 UTC
c74ce24 Rob Stradling20 February 2014, 21:41:12 UTCShow the contents of the RFC6962 Signed Certificate Timestamp List Certificate/OCSP Extensions. Add the RFC6962 OIDs to the objects table. (backport from master branch)20 February 2014, 21:43:54 UTC
612566e Dr. Stephen Henson18 February 2014, 22:20:30 UTCDon't use CRYPTO_AES_CTR if it isn't defined. (cherry picked from commit 6ecbc2bb62835a401ad6efe240d469a23b21755b)18 February 2014, 22:21:41 UTC
3ecce3d Dr. Stephen Henson15 February 2014, 19:48:05 UTCDon't use getcwd in non-copy builds. (cherry picked from commit f3a39032601fab2c704f03338e378592d3b4e262)15 February 2014, 20:17:59 UTC
71eca86 Dr. Stephen Henson15 February 2014, 20:16:13 UTCDon't override $srcd for non copy builds.15 February 2014, 20:16:13 UTC
dd1e3bd Dr. Stephen Henson15 February 2014, 18:19:35 UTCrecognise multiblock15 February 2014, 18:19:35 UTC
c55fef7 Dr. Stephen Henson15 February 2014, 17:16:19 UTCAdd /fixed flag for FIPS links where appropriate.15 February 2014, 17:16:19 UTC
eb70d44 Dr. Stephen Henson15 February 2014, 01:27:56 UTCRemove duplicate statement. (cherry picked from commit 5a7652c3e585e970e5b778074c92e617e48fde38)15 February 2014, 01:29:24 UTC
b335b54 Klaus-Peter Junghanns28 January 2014, 21:16:22 UTCAdd support for aes-128/192/256-ctr to the cryptodev engine. This can be used to speed up SRTP with libsrtp, e.g. on TI omap/sitara based devices. (cherry picked from commit be2c4d9bd9e81030c547a34216ae2d8e5c888190)15 February 2014, 00:06:43 UTC
a8eeedb Kurt Roeckx23 December 2013, 18:45:26 UTCUse defaults bits in req when not given If you use "-newkey rsa" it's supposed to read the default number of bits from the config file. However the value isn't used to generate the key, but it does print it's generating such a key. The set_keygen_ctx() doesn't call EVP_PKEY_CTX_set_rsa_keygen_bits() and you end up with the default set in pkey_rsa_init() (1024). Afterwards the number of bits gets read from the config file, but nothing is done with that anymore. We now read the config first and use the value from the config file when no size is given. PR: 2592 (cherry picked from commit 3343220327664680420d4068e1fbe46d2236f1b0)14 February 2014, 22:35:15 UTC
b3d8de7 Kurt Roeckx23 December 2013, 18:41:28 UTCFix additional pod errors with numbered items. (cherry picked from commit e547c45f1c74e976656c042ec9d873f6eea0e756)14 February 2014, 22:35:15 UTC
0413ea5 Scott Schaefer23 December 2013, 18:28:30 UTCFix various spelling errors (cherry picked from commit 2b4ffc659eabec29f76821f0ac624a2b8c19e4c7)14 February 2014, 22:35:15 UTC
2f6fba6 Scott Schaefer23 December 2013, 18:01:38 UTCDocument pkcs12 -password behavior apps/pkcs12.c accepts -password as an argument. The document author almost certainly meant to write "-password, -passin". However, that is not correct, either. Actually the code treats -password as equivalent to -passin, EXCEPT when -export is also specified, in which case -password as equivalent to -passout. (cherry picked from commit 856c6dfb09d69fc82ada2611c6cd792dfc60e355)14 February 2014, 22:35:15 UTC
d69acce Dr. Stephen Henson14 February 2014, 17:49:08 UTCFix error discrepancy with 1.0.114 February 2014, 17:50:20 UTC
aff78bb Andy Polyakov14 February 2014, 16:43:31 UTCssl/s3_pkt.c: detect RAND_bytes error in multi-block. (cherry picked from commit 701134320a94908d8c0ac513741cab41e215a7b5)14 February 2014, 16:45:33 UTC
104c032 Andy Polyakov14 February 2014, 16:24:12 UTCx86[_64]cpuid.pl: add low-level RDSEED. (cherry picked from commit f4d456408d9d7bca31f34765d1a05fbd9fa55826)14 February 2014, 16:25:14 UTC
b347341 Andy Polyakov14 February 2014, 16:06:15 UTCaes/asm/aesni-x86_64.pl: further optimization for Atom Silvermont. Improve CBC decrypt and CTR by ~13/16%, which adds up to ~25/33% improvement over "pre-Silvermont" version. [Add performance table to aesni-x86.pl]. (cherry picked from commit 5599c7331b90d9d29c9914c2a95c16d91485415a)14 February 2014, 16:17:39 UTC
c00f8d6 Dr. Stephen Henson25 February 2010, 00:01:38 UTCInclude self-signed flag in certificates by checking SKID/AKID as well as issuer and subject names. Although this is an incompatible change it should have little impact in pratice because self-issued certificates that are not self-signed are rarely encountered. (cherry picked from commit b1efb7161f409c81178b9aa95583db3390f90b1b)14 February 2014, 15:27:30 UTC
b07e4f2 Dr. Stephen Henson14 February 2014, 15:07:01 UTCInclude TA in checks/callback with partial chains. When a chain is complete and ends in a trusted root checks are also performed on the TA and the callback notified with ok==1. For consistency do the same for chains where the TA is not self signed. (cherry picked from commit 385b3486661628f3f806205752bf968b8114b347)14 February 2014, 15:12:53 UTC
ced6dc5 Dr. Stephen Henson14 February 2014, 13:38:26 UTCAdd cert_self_signed function to simplify verify (from master)14 February 2014, 15:12:52 UTC
bf2d129 Dr. Stephen Henson14 February 2014, 13:33:43 UTCSimplify X509_STORE_CTX_get1_chain (from master).14 February 2014, 15:12:52 UTC
d59d0b7 Andy Polyakov13 February 2014, 16:03:14 UTCssl/ssl[3].h: retain binary compatibility.13 February 2014, 16:03:14 UTC
dbd512e Andy Polyakov13 February 2014, 14:23:36 UTCConfigure: restore binary compatibility in darwin64-x86_64-cc. (and remove duplicates).13 February 2014, 14:23:36 UTC
fcc6f69 Andy Polyakov13 February 2014, 13:39:55 UTCevp/e_aes_cbc_hmac_sha*.c: improve cache locality. (cherry picked from commit 9587429fa07a34066107e926fbc8708220f058fa)13 February 2014, 13:41:10 UTC
7078d93 Andy Polyakov13 February 2014, 13:36:02 UTCghash-x86[_64].pl: ~15% improvement on Atom Silvermont (other processors unaffected). (cherry picked from commit 98e143f118aedc2fa79fa0ae90f1b039da106309)13 February 2014, 13:38:59 UTC
a2317c3 Dr. Stephen Henson09 February 2014, 21:12:12 UTCfix error discrepancy09 February 2014, 21:12:12 UTC
75917fa Dr. Stephen Henson09 February 2014, 19:59:54 UTCMake upate. Revert libssl ordinals to OpenSSL 1.0.1 values first to tidy up and avoid entries for deleted functions.09 February 2014, 19:59:54 UTC
295fd05 Dr. Stephen Henson09 February 2014, 19:57:27 UTCfix error number clash09 February 2014, 19:57:27 UTC
8c4e09f Ben Laurie09 February 2014, 19:31:07 UTCWhitespace fixes.09 February 2014, 19:31:07 UTC
e32cbae Ben Laurie09 February 2014, 19:17:42 UTCMerge branch '102_stable_tlsext_suppdata_changes' of git://github.com/scottdeboy/openssl into scottdeboy-102_stable_tlsext_suppdata_changes09 February 2014, 19:17:42 UTC
f6fd8db Scott Deboy09 February 2014, 16:26:04 UTCRestore copyright symbol - ISO-8859-1 encoding for Configure file09 February 2014, 16:26:04 UTC
d65db21 Ben Laurie06 September 2013, 13:03:28 UTCConst fix.09 February 2014, 16:07:16 UTC
8acf1ff Ben Laurie01 August 2013, 11:33:15 UTCMore cleanup. (cherry picked from commit 5eda213ebe382009c2f37a8eade5cbcdae6017ed) Conflicts: apps/s_client.c apps/s_server.c09 February 2014, 16:07:04 UTC
8b41df4 Ben Laurie01 August 2013, 10:14:23 UTCMake it build. (cherry picked from commit a6a48e87bc469f37ed1c53d0e4d22faaa0a5adf3) Conflicts: ssl/s3_clnt.c ssl/t1_lib.c09 February 2014, 16:02:40 UTC
c32ebef Scott Deboy09 February 2014, 15:49:44 UTCReverting 1.0.2-only changes supporting the prior authz RFC5878-based tests from commit 835d104f46c4448a27844a9309de456c7972a94309 February 2014, 15:49:44 UTC
ed0dc93 Ben Laurie09 February 2014, 12:18:16 UTCAdd new asm modules.09 February 2014, 12:18:16 UTC
5a32dd8 Scott Deboy05 February 2014, 02:48:59 UTCDon't break out of the custom extension callback loop - continue instead The contract for custom extension callbacks has changed - all custom extension callbacks are triggered09 February 2014, 00:19:30 UTC
130ebe3 Ben Laurie04 February 2014, 23:16:46 UTCFix whitespace, new-style comments.09 February 2014, 00:19:30 UTC
7612511 Scott Deboy04 February 2014, 21:08:43 UTCRe-add alert variables removed during rebase Whitespace fixes (cherry picked from commit e9add063b50e8a460d5636055156d2760c2fe29f) Conflicts: ssl/s3_clnt.c09 February 2014, 00:19:01 UTC
19a28a8 Scott Deboy07 November 2013, 09:08:29 UTCUpdating DTCP authorization type to expected value09 February 2014, 00:18:11 UTC
fc21321 Scott Deboy12 September 2013, 19:03:40 UTCUpdate custom TLS extension and supplemental data 'generate' callbacks to support sending an alert. If multiple TLS extensions are expected but not received, the TLS extension and supplemental data 'generate' callbacks are the only chance for the receive-side to trigger a specific TLS alert during the handshake. Removed logic which no-op'd TLS extension generate callbacks (as the generate callbacks need to always be called in order to trigger alerts), and updated the serverinfo-specific custom TLS extension callbacks to track which custom TLS extensions were received by the client, where no-ops for 'generate' callbacks are appropriate. (cherry picked from commit ac20719d994729970eb3b775c7bffa81f0e9f960) Conflicts: ssl/t1_lib.c09 February 2014, 00:17:24 UTC
7198c5a Trevor Perrin14 September 2013, 01:31:48 UTCRedo deletion of some serverinfo code that supplemental data code mistakenly reinstated.09 February 2014, 00:15:10 UTC
40632f6 Scott Deboy01 August 2013, 18:54:09 UTCFree generated supp data after handshake completion, add comment regarding use of num_renegotiations in TLS and supp data generation callbacks (cherry picked from commit 67c408cee9b01a7c8c7ca002d36b4f8c0612b08c) Conflicts: apps/s_client.c apps/s_server.c09 February 2014, 00:14:23 UTC
038bec7 Scott Deboy18 June 2013, 21:34:38 UTCAdd callbacks supporting generation and retrieval of supplemental data entries, facilitating RFC 5878 (TLS auth extensions) Removed prior audit proof logic - audit proof support was implemented using the generic TLS extension API Tests exercising the new supplemental data registration and callback api can be found in ssltest.c. Implemented changes to s_server and s_client to exercise supplemental data callbacks via the -auth argument, as well as additional flags to exercise supplemental data being sent only during renegotiation. (cherry picked from commit 36086186a9b90cdad0d2cd0a598a10f03f8f4bcc) Conflicts: Configure apps/s_client.c apps/s_server.c ssl/ssl.h ssl/ssl3.h ssl/ssltest.c09 February 2014, 00:12:15 UTC
f407eec Dr. Stephen Henson06 February 2014, 14:31:09 UTCmake update06 February 2014, 14:31:09 UTC
bd618be Dr. Stephen Henson06 February 2014, 14:28:49 UTCupdate default depflags06 February 2014, 14:28:49 UTC
e2884b3 Andy Polyakov08 October 2013, 21:41:31 UTCConfigure: recognize experimental-multiblock. (cherry picked from commit 2d752737c53d0cf4953c11551d6d2a9df3655329)06 February 2014, 14:26:01 UTC
c41e242 Dr. Stephen Henson06 February 2014, 13:57:26 UTCReturn previous compression methods when setting them. (cherry picked from commit b45e874d7c4a8fdac7ec10cff43f21d02e75d511)06 February 2014, 13:58:18 UTC
9578319 Andy Polyakov05 February 2014, 20:43:17 UTCssl/s3_pkt.c: add multi-block processing [from master].05 February 2014, 20:43:17 UTC
16eaca2 Andy Polyakov05 February 2014, 19:36:11 UTCconfig: recognize little-endian Linux PPC64.05 February 2014, 19:36:11 UTC
3bff195 Dr. Stephen Henson05 February 2014, 18:55:37 UTCOops, get selection logic right. (cherry picked from commit 3880579240d476d21f68fd01a391dd325920f479)05 February 2014, 18:57:23 UTC
41cf2d2 Andy Polyakov05 February 2014, 18:52:38 UTCevp/e_aes_cbc_hmac_sha[1|256].c: add multi-block implementations [from master].05 February 2014, 18:52:38 UTC
e0d4272 Dr. Stephen Henson05 February 2014, 16:56:58 UTCReturn per-certificate chain if extra chain is NULL. If an application calls the macro SSL_CTX_get_extra_chain_certs return either the old "shared" extra certificates or those associated with the current certificate. This means applications which call SSL_CTX_use_certificate_chain_file and retrieve the additional chain using SSL_CTX_get_extra_chain_certs will still work. An application which only wants to check the shared extra certificates can call the new macro SSL_CTX_get_extra_chain_certs_only (cherry picked from commit a51f767645c117667d337f77fe1dd9c0a66d8410)05 February 2014, 17:06:56 UTC
41c373f Andy Polyakov05 February 2014, 13:33:44 UTC[aesni|sha*]-mb-x86_64.pl: add multi-block assembly modules [from master].05 February 2014, 13:33:44 UTC
7f6e09b Dr. Stephen Henson03 February 2014, 14:13:04 UTCAdd quotes as CC can contain spaces. PR#325303 February 2014, 14:13:04 UTC
e2f0680 Dr. Stephen Henson02 February 2014, 02:51:30 UTCNew ctrl to set current certificate. New ctrl sets current certificate based on certain criteria. Currently two options: set the first valid certificate as current and set the next valid certificate as current. Using these an application can iterate over all certificates in an SSL_CTX or SSL structure. (cherry picked from commit 0f78819c8ccb7c526edbe90d5b619281366ce75c)02 February 2014, 23:12:06 UTC
1180833 Dr. Stephen Henson20 October 2013, 21:31:00 UTCFix various typos. (cherry picked from commit f3efeaad540b000779277b4fc49a239529ee616e)02 February 2014, 23:12:06 UTC
130eed0 Dr. Stephen Henson18 December 2013, 13:28:44 UTCUpdate demo. (cherry picked from commit 88c21c47a3d187d4f8c4e87e3c6088198cb08a99)02 February 2014, 23:06:16 UTC
2ded873 Dr. Stephen Henson20 October 2013, 21:34:14 UTCUpdate demos/bio/README (cherry picked from commit ea131a0644bcebeaa5e911217aadbc9dac241fec)02 February 2014, 23:05:52 UTC
b1ae02e Dr. Stephen Henson20 October 2013, 21:21:09 UTCModify sample accept.cnf (cherry picked from commit d80b0eeee59fa48f2506fe103de1b52ef6de3f4f)02 February 2014, 23:05:34 UTC
3814170 Dr. Stephen Henson18 October 2013, 15:28:38 UTCAdd demo for SSL server using SSL_CONF. (cherry picked from commit ebd14bfce9ef6b4bf41129a329823130d1002f42)02 February 2014, 23:05:15 UTC
984a304 Ben Laurie02 February 2014, 15:22:10 UTCAdd extension free function.02 February 2014, 15:22:47 UTC
2ad673c Andy Polyakov01 February 2014, 23:17:38 UTCengines/e_capi.c: TCHAR support (cumilative update from master).01 February 2014, 23:17:38 UTC
0693dd9 Andy Polyakov01 February 2014, 23:09:17 UTCmodes/asm/ghash-s390x.pl: +15% performance improvement on z10. (cherry picked from commit d162584b1154153d997fed18a9df2e60771fe06c)01 February 2014, 23:10:41 UTC
9071b36 Andy Polyakov01 February 2014, 23:05:02 UTCAdd AES-NI+SHA256 stitch registrations (from master).01 February 2014, 23:05:02 UTC
eb6af20 Andy Polyakov18 December 2012, 18:19:54 UTCdso/dso_win32.c: fix compiler warning. (cherry picked from commit 0a2d5003df1a9ecf801ac3b4a5cb7dda85449315)01 February 2014, 22:32:19 UTC
8087969 Andy Polyakov01 February 2014, 22:27:49 UTCcrypto/cryptlib.c: remove stdio dependency (update from master).01 February 2014, 22:27:49 UTC
cb437c6 Andy Polyakov01 February 2014, 22:14:33 UTCcamellia/asm/cmll-x86_64.pl: fix symptomless bugs (update from master).01 February 2014, 22:14:33 UTC
40b0d07 Ben Laurie01 February 2014, 21:53:09 UTCRemove redundant accessor (you can do the same thing, and more, with X509_ALGOR_[gs]et0()).01 February 2014, 22:03:40 UTC
41235f3 Andy Polyakov18 December 2012, 18:07:20 UTCutil/pl/VC-32.pl fix typo. (cherry picked from commit fb0a520897778ebeebe9aaaf116f207a838ebb3f)01 February 2014, 21:55:25 UTC
130c15e Andy Polyakov18 December 2012, 09:42:31 UTCutil/pl/VC-32.pl: refresh, switch to ws2, add crypt32, fix typo (based on suggestions from Pierre Delaage). (cherry picked from commit 668bcfd5ca237fdf6fbef1ab463697a4a48caf39) Resolved conflicts: util/pl/VC-32.pl01 February 2014, 21:53:24 UTC
2cc5142 Andy Polyakov19 January 2013, 20:23:13 UTCImprove WINCE support. Submitted by: Pierre Delaage (cherry picked from commit a006fef78e56b078549a80f4bb4518b6a02eba84) Resolved conflicts: crypto/bio/bss_dgram.c ssl/d1_lib.c util/pl/VC-32.pl01 February 2014, 21:48:56 UTC
d451ece Andy Polyakov11 June 2012, 08:52:11 UTCb_sock.c: make getsockopt work in cases when optlen is 64-bit value. (cherry picked from commit 80c42f3e0c34451dd7cfc65e07bc639759ef07d2)01 February 2014, 21:33:02 UTC
1121ba1 Andy Polyakov15 July 2012, 13:29:23 UTCwp-mmx.pl: ~10% performance improvement. (cherry picked from commit ae007d4d09f2ed9940c6e581bab9290d78615506)01 February 2014, 21:27:07 UTC
1fb039f Andy Polyakov15 July 2012, 13:37:35 UTCwp-x86_64.pl: ~10% performance improvement. (cherry picked from commit 701d593f7095db84459c76265349a83d30a4cae5)01 February 2014, 21:26:45 UTC
3073927 Andy Polyakov15 July 2012, 13:36:25 UTCsha512-ia64.pl: 15-20% performance improvement. (cherry picked from commit 46a2b3387a3feb044527a58a89555029c809190d)01 February 2014, 21:21:57 UTC
b6c2029 Andy Polyakov22 April 2012, 21:18:30 UTCobjxref.pl: improve portability. (cherry picked from commit 71fa3bc5ece9121d1aa9bb513b5641e9ea605e14)01 February 2014, 21:17:36 UTC
45d0102 Adam Langley03 June 2013, 19:45:11 UTCAdd volatile qualifications to two blocks of inline asm to stop GCC from eliminating them as dead code. Both volatile and "memory" are used because of some concern that the compiler may still cache values across the asm block without it, and because this was such a painful debugging session that I wanted to ensure that it's never repeated. (cherry picked from commit 7753a3a68431aa81b82beea4c3f5374b41454679)01 February 2014, 21:01:46 UTC
7e56902 Andy Polyakov01 February 2014, 20:51:51 UTCPPC assembly pack: ppc64-mont update from master.01 February 2014, 20:51:51 UTC
50f1b47 Andy Polyakov01 February 2014, 20:48:31 UTCPPC assembly pack: jumbo update from master. Add Vector Permutation AES and little-endian support.01 February 2014, 20:48:31 UTC
5572bc4 Andy Polyakov01 February 2014, 20:27:46 UTCcrypto/aes/asm/aesni-x86[_64].pl: jumbo update from master.01 February 2014, 20:27:46 UTC
729d334 Andy Polyakov01 February 2014, 20:24:55 UTCcrypto/sha/asm/sha1-x86_64.pl: jumbo update from master.01 February 2014, 20:24:55 UTC
cacdfcb Ben Laurie01 February 2014, 18:29:26 UTCAdd more accessors.01 February 2014, 18:30:23 UTC
519ad9b Ben Laurie01 February 2014, 17:52:26 UTCAdd accessor for x509.cert_info.01 February 2014, 18:30:23 UTC
7b2d785 Ben Laurie29 January 2014, 16:57:32 UTCFix warning.29 January 2014, 16:57:32 UTC
f2d678e Dr. Stephen Henson29 January 2014, 00:59:35 UTCClarify docs. Remove reference to ERR_TXT_MALLOCED in the error library as that is only used internally. Indicate that returned error data must not be freed.29 January 2014, 00:59:35 UTC
448e9b7 Dr. Stephen Henson28 January 2014, 15:35:16 UTCtypo (cherry picked from commit cb2182676bdf652070bc272a3896d957763a4324)28 January 2014, 15:36:15 UTC
2c4c986 Dr. Stephen Henson28 January 2014, 15:15:26 UTCFix demo comment: 0.9.9 never released. (cherry picked from commit 717cc8589540b95122a652dee68e6a75b6262d93)28 January 2014, 15:17:32 UTC
  • Newer
  • Older

ENEA — Copyright (C), ENEA. License: GNU AGPLv3+.
Legal notes  ::  JavaScript license information ::  Web API

back to top