Rev. | 日時 | 作者 |
---|---|---|
12ad22d OpenSSL_1_0_2-stable | 2019-12-20 22:10:12 | Matt Caswell |
Prepare for 1.0.2v-dev |
||
e818b74 OpenSSL_1_0_2u | 2019-12-20 22:09:21 | Matt Caswell |
Prepare for 1.0.2u release |
||
7e0b689 | 2019-12-20 18:33:50 | Matt Caswell |
Update copyright year |
||
b10ccf7 | 2019-12-20 02:28:18 | Matt Caswell |
Updates NEWS for new release |
||
4975571 | 2019-12-05 09:26:16 | Bernd Edlinger |
Add a CHANGES entry for CVE-2019-1551 |
||
ec8fcae | 2019-12-05 06:57:18 | Bernd Edlinger |
Improve the overflow handling in rsaz_512_sqr |
||
f1c5eea | 2019-12-05 06:57:16 | Andy Polyakov |
Fix an overflow bug in rsaz_512_sqr |
||
b39c047 | 2019-10-28 22:20:02 | Matt Caswell |
Fix an s_server arbitrary file read issue on Windows |
||
0159a1b | 2019-10-16 22:01:58 | Cesar Pereida Garcia |
[crypto/asn1/x_bignum.c] Explicit test against NULL |
||
4e545c6 | 2019-10-15 21:28:36 | Nicola Tuveri |
[ec_asn1.c] Avoid injecting seed when built-in matches |
||
1c10029 | 2019-09-13 13:37:50 | Bernd Edlinger |
Fix no-asm build in windows |
||
fc437d8 | 2019-09-13 03:02:06 | Bernd Edlinger |
Remove known to fail versions from matrix |
||
a1ff24a | 2019-09-10 22:37:06 | Matt Caswell |
Prepare for 1.0.2u-dev |
||
cd7c7fc OpenSSL_1_0_2t | 2019-09-10 22:36:07 | Matt Caswell |
Prepare for 1.0.2t release |
||
c98ce13 | 2019-09-10 22:36:07 | Matt Caswell |
make update |
||
b5decf6 | 2019-09-10 22:34:22 | Matt Caswell |
Fix the NEWS file |
||
32ef049 | 2019-09-10 22:01:06 | Matt Caswell |
Update copyright year |
||
2608005 | 2019-09-10 20:09:49 | Matt Caswell |
Remove duplicate CHANGES entry |
||
e21f8cf | 2019-09-10 19:45:41 | Bernd Edlinger |
Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey |
||
8bf7d77 | 2019-09-10 18:55:08 | Matt Caswell |
Update CHANGES and NEWS for the new release |
||
66fd724 | 2019-09-10 00:57:57 | Nicola Tuveri |
[ec] Match built-in curves on EC_GROUP_new_from_ecparameters |
||
21c856b | 2019-09-09 16:34:44 | Billy Brumley |
[crypto/ec] for ECC parameters with NULL or zero cofactor, compute it |
||
adaebd8 | 2019-09-09 16:16:47 | Cesar Pereida Garcia |
[crypto/rsa] Fix multiple SCA vulnerabilities during RSA key validation. |
||
6a7bad0 | 2019-09-08 08:12:04 | Dr. Matthias St. Pierre |
Configure: clang: add -Wno-unknown-warning-option |
||
920e37e | 2019-09-06 22:55:42 | Nicola Tuveri |
[ec/ecp_nistp*.c] restyle: use {} around `else` too |
||
e3679b1 | 2019-09-06 22:51:58 | Nicola Tuveri |
[ec/ecp_nistp*.c] remove flip_endian() |
||
bde4a00 | 2019-09-06 22:37:57 | Nicola Tuveri |
Uniform bn_bn2binpad() and bn_bn2lebinpad() implementations |
||
853950f | 2019-09-06 22:37:57 | Nicola Tuveri |
Make BN_num_bits() consttime upon BN_FLG_CONSTTIME |
||
2e9d293 | 2019-09-06 21:56:45 | Nicola Tuveri |
Fix a SCA leak using BN_bn2bin() |
||
55611d5 | 2019-08-27 17:25:51 | Cesar Pereida Garcia |
Fix SCA vulnerability when using PVK and MSBLOB key formats |