94f4166 | Dr. Stephen Henson | 24 February 2014, 13:51:34 UTC | Prepare for 1.0.2-beta1 release | 24 February 2014, 13:51:34 UTC |
a74c9c9 | Dr. Stephen Henson | 24 February 2014, 13:50:38 UTC | OpenSSL 1.0.2 is now in beta | 24 February 2014, 13:50:38 UTC |
d2a3c44 | Dr. Stephen Henson | 24 February 2014, 13:50:38 UTC | make update | 24 February 2014, 13:50:38 UTC |
a129850 | Andy Polyakov | 24 February 2014, 12:18:40 UTC | config: recognize ARMv8/AArch64 target. (cherry picked from commit d099f0ed6ca518052bb167b31e999e1e7734eebf) | 24 February 2014, 12:21:14 UTC |
c3f5d3d | Dr. Stephen Henson | 23 February 2014, 13:46:52 UTC | Only set current certificate to valid values. When setting the current certificate check that it has a corresponding private key. (cherry picked from commit 358d352aa244b4f2ef655bccff6658d92d5ce03c) | 23 February 2014, 13:49:21 UTC |
c5ea65b | Dr. Stephen Henson | 23 February 2014, 12:00:18 UTC | New chain building flags. New flags to build certificate chains. The can be used to rearrange the chain so all an application needs to do is add all certificates in arbitrary order and then build the chain to check and correct them. Add verify error code when building chain. Update docs. (cherry picked from commit 13dc3ce9ab483cade378bcf3844c92bacd817316) | 23 February 2014, 13:49:21 UTC |
58b86e4 | Dr. Stephen Henson | 21 February 2014, 19:42:03 UTC | Option to set current cert to server certificate. (cherry picked from commit daddd9a950e491c31f9500d5e570bc7eb96b2823) | 23 February 2014, 13:49:21 UTC |
a466be6 | Ben Laurie | 23 February 2014, 11:21:39 UTC | Fix typo. | 23 February 2014, 11:21:39 UTC |
60327ce | Ben Laurie | 23 February 2014, 11:21:28 UTC | Add debug flag. | 23 February 2014, 11:21:28 UTC |
2d4d962 | Andy Polyakov | 21 February 2014, 11:14:04 UTC | aes/asm/aesni-x86[_64].pl: minor Atom-specific performance tweak. (cherry picked from commit 214368ffee5736836e2dbb80a16a4fbd85f0eaf9) | 21 February 2014, 11:15:07 UTC |
6b3b6be | Andy Polyakov | 21 February 2014, 11:12:25 UTC | ssl/ssl_cert.c: DANE update. | 21 February 2014, 11:12:25 UTC |
7743be3 | Dr. Stephen Henson | 20 February 2014, 22:57:24 UTC | make update | 20 February 2014, 22:57:24 UTC |
b709f8e | Dr. Stephen Henson | 20 February 2014, 22:37:33 UTC | fix WIN32 warnings | 20 February 2014, 22:41:06 UTC |
c74ce24 | Rob Stradling | 20 February 2014, 21:41:12 UTC | Show the contents of the RFC6962 Signed Certificate Timestamp List Certificate/OCSP Extensions. Add the RFC6962 OIDs to the objects table. (backport from master branch) | 20 February 2014, 21:43:54 UTC |
612566e | Dr. Stephen Henson | 18 February 2014, 22:20:30 UTC | Don't use CRYPTO_AES_CTR if it isn't defined. (cherry picked from commit 6ecbc2bb62835a401ad6efe240d469a23b21755b) | 18 February 2014, 22:21:41 UTC |
3ecce3d | Dr. Stephen Henson | 15 February 2014, 19:48:05 UTC | Don't use getcwd in non-copy builds. (cherry picked from commit f3a39032601fab2c704f03338e378592d3b4e262) | 15 February 2014, 20:17:59 UTC |
71eca86 | Dr. Stephen Henson | 15 February 2014, 20:16:13 UTC | Don't override $srcd for non copy builds. | 15 February 2014, 20:16:13 UTC |
dd1e3bd | Dr. Stephen Henson | 15 February 2014, 18:19:35 UTC | recognise multiblock | 15 February 2014, 18:19:35 UTC |
c55fef7 | Dr. Stephen Henson | 15 February 2014, 17:16:19 UTC | Add /fixed flag for FIPS links where appropriate. | 15 February 2014, 17:16:19 UTC |
eb70d44 | Dr. Stephen Henson | 15 February 2014, 01:27:56 UTC | Remove duplicate statement. (cherry picked from commit 5a7652c3e585e970e5b778074c92e617e48fde38) | 15 February 2014, 01:29:24 UTC |
b335b54 | Klaus-Peter Junghanns | 28 January 2014, 21:16:22 UTC | Add support for aes-128/192/256-ctr to the cryptodev engine. This can be used to speed up SRTP with libsrtp, e.g. on TI omap/sitara based devices. (cherry picked from commit be2c4d9bd9e81030c547a34216ae2d8e5c888190) | 15 February 2014, 00:06:43 UTC |
a8eeedb | Kurt Roeckx | 23 December 2013, 18:45:26 UTC | Use defaults bits in req when not given If you use "-newkey rsa" it's supposed to read the default number of bits from the config file. However the value isn't used to generate the key, but it does print it's generating such a key. The set_keygen_ctx() doesn't call EVP_PKEY_CTX_set_rsa_keygen_bits() and you end up with the default set in pkey_rsa_init() (1024). Afterwards the number of bits gets read from the config file, but nothing is done with that anymore. We now read the config first and use the value from the config file when no size is given. PR: 2592 (cherry picked from commit 3343220327664680420d4068e1fbe46d2236f1b0) | 14 February 2014, 22:35:15 UTC |
b3d8de7 | Kurt Roeckx | 23 December 2013, 18:41:28 UTC | Fix additional pod errors with numbered items. (cherry picked from commit e547c45f1c74e976656c042ec9d873f6eea0e756) | 14 February 2014, 22:35:15 UTC |
0413ea5 | Scott Schaefer | 23 December 2013, 18:28:30 UTC | Fix various spelling errors (cherry picked from commit 2b4ffc659eabec29f76821f0ac624a2b8c19e4c7) | 14 February 2014, 22:35:15 UTC |
2f6fba6 | Scott Schaefer | 23 December 2013, 18:01:38 UTC | Document pkcs12 -password behavior apps/pkcs12.c accepts -password as an argument. The document author almost certainly meant to write "-password, -passin". However, that is not correct, either. Actually the code treats -password as equivalent to -passin, EXCEPT when -export is also specified, in which case -password as equivalent to -passout. (cherry picked from commit 856c6dfb09d69fc82ada2611c6cd792dfc60e355) | 14 February 2014, 22:35:15 UTC |
d69acce | Dr. Stephen Henson | 14 February 2014, 17:49:08 UTC | Fix error discrepancy with 1.0.1 | 14 February 2014, 17:50:20 UTC |
aff78bb | Andy Polyakov | 14 February 2014, 16:43:31 UTC | ssl/s3_pkt.c: detect RAND_bytes error in multi-block. (cherry picked from commit 701134320a94908d8c0ac513741cab41e215a7b5) | 14 February 2014, 16:45:33 UTC |
104c032 | Andy Polyakov | 14 February 2014, 16:24:12 UTC | x86[_64]cpuid.pl: add low-level RDSEED. (cherry picked from commit f4d456408d9d7bca31f34765d1a05fbd9fa55826) | 14 February 2014, 16:25:14 UTC |
b347341 | Andy Polyakov | 14 February 2014, 16:06:15 UTC | aes/asm/aesni-x86_64.pl: further optimization for Atom Silvermont. Improve CBC decrypt and CTR by ~13/16%, which adds up to ~25/33% improvement over "pre-Silvermont" version. [Add performance table to aesni-x86.pl]. (cherry picked from commit 5599c7331b90d9d29c9914c2a95c16d91485415a) | 14 February 2014, 16:17:39 UTC |
c00f8d6 | Dr. Stephen Henson | 25 February 2010, 00:01:38 UTC | Include self-signed flag in certificates by checking SKID/AKID as well as issuer and subject names. Although this is an incompatible change it should have little impact in pratice because self-issued certificates that are not self-signed are rarely encountered. (cherry picked from commit b1efb7161f409c81178b9aa95583db3390f90b1b) | 14 February 2014, 15:27:30 UTC |
b07e4f2 | Dr. Stephen Henson | 14 February 2014, 15:07:01 UTC | Include TA in checks/callback with partial chains. When a chain is complete and ends in a trusted root checks are also performed on the TA and the callback notified with ok==1. For consistency do the same for chains where the TA is not self signed. (cherry picked from commit 385b3486661628f3f806205752bf968b8114b347) | 14 February 2014, 15:12:53 UTC |
ced6dc5 | Dr. Stephen Henson | 14 February 2014, 13:38:26 UTC | Add cert_self_signed function to simplify verify (from master) | 14 February 2014, 15:12:52 UTC |
bf2d129 | Dr. Stephen Henson | 14 February 2014, 13:33:43 UTC | Simplify X509_STORE_CTX_get1_chain (from master). | 14 February 2014, 15:12:52 UTC |
d59d0b7 | Andy Polyakov | 13 February 2014, 16:03:14 UTC | ssl/ssl[3].h: retain binary compatibility. | 13 February 2014, 16:03:14 UTC |
dbd512e | Andy Polyakov | 13 February 2014, 14:23:36 UTC | Configure: restore binary compatibility in darwin64-x86_64-cc. (and remove duplicates). | 13 February 2014, 14:23:36 UTC |
fcc6f69 | Andy Polyakov | 13 February 2014, 13:39:55 UTC | evp/e_aes_cbc_hmac_sha*.c: improve cache locality. (cherry picked from commit 9587429fa07a34066107e926fbc8708220f058fa) | 13 February 2014, 13:41:10 UTC |
7078d93 | Andy Polyakov | 13 February 2014, 13:36:02 UTC | ghash-x86[_64].pl: ~15% improvement on Atom Silvermont (other processors unaffected). (cherry picked from commit 98e143f118aedc2fa79fa0ae90f1b039da106309) | 13 February 2014, 13:38:59 UTC |
a2317c3 | Dr. Stephen Henson | 09 February 2014, 21:12:12 UTC | fix error discrepancy | 09 February 2014, 21:12:12 UTC |
75917fa | Dr. Stephen Henson | 09 February 2014, 19:59:54 UTC | Make upate. Revert libssl ordinals to OpenSSL 1.0.1 values first to tidy up and avoid entries for deleted functions. | 09 February 2014, 19:59:54 UTC |
295fd05 | Dr. Stephen Henson | 09 February 2014, 19:57:27 UTC | fix error number clash | 09 February 2014, 19:57:27 UTC |
8c4e09f | Ben Laurie | 09 February 2014, 19:31:07 UTC | Whitespace fixes. | 09 February 2014, 19:31:07 UTC |
e32cbae | Ben Laurie | 09 February 2014, 19:17:42 UTC | Merge branch '102_stable_tlsext_suppdata_changes' of git://github.com/scottdeboy/openssl into scottdeboy-102_stable_tlsext_suppdata_changes | 09 February 2014, 19:17:42 UTC |
f6fd8db | Scott Deboy | 09 February 2014, 16:26:04 UTC | Restore copyright symbol - ISO-8859-1 encoding for Configure file | 09 February 2014, 16:26:04 UTC |
d65db21 | Ben Laurie | 06 September 2013, 13:03:28 UTC | Const fix. | 09 February 2014, 16:07:16 UTC |
8acf1ff | Ben Laurie | 01 August 2013, 11:33:15 UTC | More cleanup. (cherry picked from commit 5eda213ebe382009c2f37a8eade5cbcdae6017ed) Conflicts: apps/s_client.c apps/s_server.c | 09 February 2014, 16:07:04 UTC |
8b41df4 | Ben Laurie | 01 August 2013, 10:14:23 UTC | Make it build. (cherry picked from commit a6a48e87bc469f37ed1c53d0e4d22faaa0a5adf3) Conflicts: ssl/s3_clnt.c ssl/t1_lib.c | 09 February 2014, 16:02:40 UTC |
c32ebef | Scott Deboy | 09 February 2014, 15:49:44 UTC | Reverting 1.0.2-only changes supporting the prior authz RFC5878-based tests from commit 835d104f46c4448a27844a9309de456c7972a943 | 09 February 2014, 15:49:44 UTC |
ed0dc93 | Ben Laurie | 09 February 2014, 12:18:16 UTC | Add new asm modules. | 09 February 2014, 12:18:16 UTC |
5a32dd8 | Scott Deboy | 05 February 2014, 02:48:59 UTC | Don't break out of the custom extension callback loop - continue instead The contract for custom extension callbacks has changed - all custom extension callbacks are triggered | 09 February 2014, 00:19:30 UTC |
130ebe3 | Ben Laurie | 04 February 2014, 23:16:46 UTC | Fix whitespace, new-style comments. | 09 February 2014, 00:19:30 UTC |
7612511 | Scott Deboy | 04 February 2014, 21:08:43 UTC | Re-add alert variables removed during rebase Whitespace fixes (cherry picked from commit e9add063b50e8a460d5636055156d2760c2fe29f) Conflicts: ssl/s3_clnt.c | 09 February 2014, 00:19:01 UTC |
19a28a8 | Scott Deboy | 07 November 2013, 09:08:29 UTC | Updating DTCP authorization type to expected value | 09 February 2014, 00:18:11 UTC |
fc21321 | Scott Deboy | 12 September 2013, 19:03:40 UTC | Update custom TLS extension and supplemental data 'generate' callbacks to support sending an alert. If multiple TLS extensions are expected but not received, the TLS extension and supplemental data 'generate' callbacks are the only chance for the receive-side to trigger a specific TLS alert during the handshake. Removed logic which no-op'd TLS extension generate callbacks (as the generate callbacks need to always be called in order to trigger alerts), and updated the serverinfo-specific custom TLS extension callbacks to track which custom TLS extensions were received by the client, where no-ops for 'generate' callbacks are appropriate. (cherry picked from commit ac20719d994729970eb3b775c7bffa81f0e9f960) Conflicts: ssl/t1_lib.c | 09 February 2014, 00:17:24 UTC |
7198c5a | Trevor Perrin | 14 September 2013, 01:31:48 UTC | Redo deletion of some serverinfo code that supplemental data code mistakenly reinstated. | 09 February 2014, 00:15:10 UTC |
40632f6 | Scott Deboy | 01 August 2013, 18:54:09 UTC | Free generated supp data after handshake completion, add comment regarding use of num_renegotiations in TLS and supp data generation callbacks (cherry picked from commit 67c408cee9b01a7c8c7ca002d36b4f8c0612b08c) Conflicts: apps/s_client.c apps/s_server.c | 09 February 2014, 00:14:23 UTC |
038bec7 | Scott Deboy | 18 June 2013, 21:34:38 UTC | Add callbacks supporting generation and retrieval of supplemental data entries, facilitating RFC 5878 (TLS auth extensions) Removed prior audit proof logic - audit proof support was implemented using the generic TLS extension API Tests exercising the new supplemental data registration and callback api can be found in ssltest.c. Implemented changes to s_server and s_client to exercise supplemental data callbacks via the -auth argument, as well as additional flags to exercise supplemental data being sent only during renegotiation. (cherry picked from commit 36086186a9b90cdad0d2cd0a598a10f03f8f4bcc) Conflicts: Configure apps/s_client.c apps/s_server.c ssl/ssl.h ssl/ssl3.h ssl/ssltest.c | 09 February 2014, 00:12:15 UTC |
f407eec | Dr. Stephen Henson | 06 February 2014, 14:31:09 UTC | make update | 06 February 2014, 14:31:09 UTC |
bd618be | Dr. Stephen Henson | 06 February 2014, 14:28:49 UTC | update default depflags | 06 February 2014, 14:28:49 UTC |
e2884b3 | Andy Polyakov | 08 October 2013, 21:41:31 UTC | Configure: recognize experimental-multiblock. (cherry picked from commit 2d752737c53d0cf4953c11551d6d2a9df3655329) | 06 February 2014, 14:26:01 UTC |
c41e242 | Dr. Stephen Henson | 06 February 2014, 13:57:26 UTC | Return previous compression methods when setting them. (cherry picked from commit b45e874d7c4a8fdac7ec10cff43f21d02e75d511) | 06 February 2014, 13:58:18 UTC |
9578319 | Andy Polyakov | 05 February 2014, 20:43:17 UTC | ssl/s3_pkt.c: add multi-block processing [from master]. | 05 February 2014, 20:43:17 UTC |
16eaca2 | Andy Polyakov | 05 February 2014, 19:36:11 UTC | config: recognize little-endian Linux PPC64. | 05 February 2014, 19:36:11 UTC |
3bff195 | Dr. Stephen Henson | 05 February 2014, 18:55:37 UTC | Oops, get selection logic right. (cherry picked from commit 3880579240d476d21f68fd01a391dd325920f479) | 05 February 2014, 18:57:23 UTC |
41cf2d2 | Andy Polyakov | 05 February 2014, 18:52:38 UTC | evp/e_aes_cbc_hmac_sha[1|256].c: add multi-block implementations [from master]. | 05 February 2014, 18:52:38 UTC |
e0d4272 | Dr. Stephen Henson | 05 February 2014, 16:56:58 UTC | Return per-certificate chain if extra chain is NULL. If an application calls the macro SSL_CTX_get_extra_chain_certs return either the old "shared" extra certificates or those associated with the current certificate. This means applications which call SSL_CTX_use_certificate_chain_file and retrieve the additional chain using SSL_CTX_get_extra_chain_certs will still work. An application which only wants to check the shared extra certificates can call the new macro SSL_CTX_get_extra_chain_certs_only (cherry picked from commit a51f767645c117667d337f77fe1dd9c0a66d8410) | 05 February 2014, 17:06:56 UTC |
41c373f | Andy Polyakov | 05 February 2014, 13:33:44 UTC | [aesni|sha*]-mb-x86_64.pl: add multi-block assembly modules [from master]. | 05 February 2014, 13:33:44 UTC |
7f6e09b | Dr. Stephen Henson | 03 February 2014, 14:13:04 UTC | Add quotes as CC can contain spaces. PR#3253 | 03 February 2014, 14:13:04 UTC |
e2f0680 | Dr. Stephen Henson | 02 February 2014, 02:51:30 UTC | New ctrl to set current certificate. New ctrl sets current certificate based on certain criteria. Currently two options: set the first valid certificate as current and set the next valid certificate as current. Using these an application can iterate over all certificates in an SSL_CTX or SSL structure. (cherry picked from commit 0f78819c8ccb7c526edbe90d5b619281366ce75c) | 02 February 2014, 23:12:06 UTC |
1180833 | Dr. Stephen Henson | 20 October 2013, 21:31:00 UTC | Fix various typos. (cherry picked from commit f3efeaad540b000779277b4fc49a239529ee616e) | 02 February 2014, 23:12:06 UTC |
130eed0 | Dr. Stephen Henson | 18 December 2013, 13:28:44 UTC | Update demo. (cherry picked from commit 88c21c47a3d187d4f8c4e87e3c6088198cb08a99) | 02 February 2014, 23:06:16 UTC |
2ded873 | Dr. Stephen Henson | 20 October 2013, 21:34:14 UTC | Update demos/bio/README (cherry picked from commit ea131a0644bcebeaa5e911217aadbc9dac241fec) | 02 February 2014, 23:05:52 UTC |
b1ae02e | Dr. Stephen Henson | 20 October 2013, 21:21:09 UTC | Modify sample accept.cnf (cherry picked from commit d80b0eeee59fa48f2506fe103de1b52ef6de3f4f) | 02 February 2014, 23:05:34 UTC |
3814170 | Dr. Stephen Henson | 18 October 2013, 15:28:38 UTC | Add demo for SSL server using SSL_CONF. (cherry picked from commit ebd14bfce9ef6b4bf41129a329823130d1002f42) | 02 February 2014, 23:05:15 UTC |
984a304 | Ben Laurie | 02 February 2014, 15:22:10 UTC | Add extension free function. | 02 February 2014, 15:22:47 UTC |
2ad673c | Andy Polyakov | 01 February 2014, 23:17:38 UTC | engines/e_capi.c: TCHAR support (cumilative update from master). | 01 February 2014, 23:17:38 UTC |
0693dd9 | Andy Polyakov | 01 February 2014, 23:09:17 UTC | modes/asm/ghash-s390x.pl: +15% performance improvement on z10. (cherry picked from commit d162584b1154153d997fed18a9df2e60771fe06c) | 01 February 2014, 23:10:41 UTC |
9071b36 | Andy Polyakov | 01 February 2014, 23:05:02 UTC | Add AES-NI+SHA256 stitch registrations (from master). | 01 February 2014, 23:05:02 UTC |
eb6af20 | Andy Polyakov | 18 December 2012, 18:19:54 UTC | dso/dso_win32.c: fix compiler warning. (cherry picked from commit 0a2d5003df1a9ecf801ac3b4a5cb7dda85449315) | 01 February 2014, 22:32:19 UTC |
8087969 | Andy Polyakov | 01 February 2014, 22:27:49 UTC | crypto/cryptlib.c: remove stdio dependency (update from master). | 01 February 2014, 22:27:49 UTC |
cb437c6 | Andy Polyakov | 01 February 2014, 22:14:33 UTC | camellia/asm/cmll-x86_64.pl: fix symptomless bugs (update from master). | 01 February 2014, 22:14:33 UTC |
40b0d07 | Ben Laurie | 01 February 2014, 21:53:09 UTC | Remove redundant accessor (you can do the same thing, and more, with X509_ALGOR_[gs]et0()). | 01 February 2014, 22:03:40 UTC |
41235f3 | Andy Polyakov | 18 December 2012, 18:07:20 UTC | util/pl/VC-32.pl fix typo. (cherry picked from commit fb0a520897778ebeebe9aaaf116f207a838ebb3f) | 01 February 2014, 21:55:25 UTC |
130c15e | Andy Polyakov | 18 December 2012, 09:42:31 UTC | util/pl/VC-32.pl: refresh, switch to ws2, add crypt32, fix typo (based on suggestions from Pierre Delaage). (cherry picked from commit 668bcfd5ca237fdf6fbef1ab463697a4a48caf39) Resolved conflicts: util/pl/VC-32.pl | 01 February 2014, 21:53:24 UTC |
2cc5142 | Andy Polyakov | 19 January 2013, 20:23:13 UTC | Improve WINCE support. Submitted by: Pierre Delaage (cherry picked from commit a006fef78e56b078549a80f4bb4518b6a02eba84) Resolved conflicts: crypto/bio/bss_dgram.c ssl/d1_lib.c util/pl/VC-32.pl | 01 February 2014, 21:48:56 UTC |
d451ece | Andy Polyakov | 11 June 2012, 08:52:11 UTC | b_sock.c: make getsockopt work in cases when optlen is 64-bit value. (cherry picked from commit 80c42f3e0c34451dd7cfc65e07bc639759ef07d2) | 01 February 2014, 21:33:02 UTC |
1121ba1 | Andy Polyakov | 15 July 2012, 13:29:23 UTC | wp-mmx.pl: ~10% performance improvement. (cherry picked from commit ae007d4d09f2ed9940c6e581bab9290d78615506) | 01 February 2014, 21:27:07 UTC |
1fb039f | Andy Polyakov | 15 July 2012, 13:37:35 UTC | wp-x86_64.pl: ~10% performance improvement. (cherry picked from commit 701d593f7095db84459c76265349a83d30a4cae5) | 01 February 2014, 21:26:45 UTC |
3073927 | Andy Polyakov | 15 July 2012, 13:36:25 UTC | sha512-ia64.pl: 15-20% performance improvement. (cherry picked from commit 46a2b3387a3feb044527a58a89555029c809190d) | 01 February 2014, 21:21:57 UTC |
b6c2029 | Andy Polyakov | 22 April 2012, 21:18:30 UTC | objxref.pl: improve portability. (cherry picked from commit 71fa3bc5ece9121d1aa9bb513b5641e9ea605e14) | 01 February 2014, 21:17:36 UTC |
45d0102 | Adam Langley | 03 June 2013, 19:45:11 UTC | Add volatile qualifications to two blocks of inline asm to stop GCC from eliminating them as dead code. Both volatile and "memory" are used because of some concern that the compiler may still cache values across the asm block without it, and because this was such a painful debugging session that I wanted to ensure that it's never repeated. (cherry picked from commit 7753a3a68431aa81b82beea4c3f5374b41454679) | 01 February 2014, 21:01:46 UTC |
7e56902 | Andy Polyakov | 01 February 2014, 20:51:51 UTC | PPC assembly pack: ppc64-mont update from master. | 01 February 2014, 20:51:51 UTC |
50f1b47 | Andy Polyakov | 01 February 2014, 20:48:31 UTC | PPC assembly pack: jumbo update from master. Add Vector Permutation AES and little-endian support. | 01 February 2014, 20:48:31 UTC |
5572bc4 | Andy Polyakov | 01 February 2014, 20:27:46 UTC | crypto/aes/asm/aesni-x86[_64].pl: jumbo update from master. | 01 February 2014, 20:27:46 UTC |
729d334 | Andy Polyakov | 01 February 2014, 20:24:55 UTC | crypto/sha/asm/sha1-x86_64.pl: jumbo update from master. | 01 February 2014, 20:24:55 UTC |
cacdfcb | Ben Laurie | 01 February 2014, 18:29:26 UTC | Add more accessors. | 01 February 2014, 18:30:23 UTC |
519ad9b | Ben Laurie | 01 February 2014, 17:52:26 UTC | Add accessor for x509.cert_info. | 01 February 2014, 18:30:23 UTC |
7b2d785 | Ben Laurie | 29 January 2014, 16:57:32 UTC | Fix warning. | 29 January 2014, 16:57:32 UTC |
f2d678e | Dr. Stephen Henson | 29 January 2014, 00:59:35 UTC | Clarify docs. Remove reference to ERR_TXT_MALLOCED in the error library as that is only used internally. Indicate that returned error data must not be freed. | 29 January 2014, 00:59:35 UTC |
448e9b7 | Dr. Stephen Henson | 28 January 2014, 15:35:16 UTC | typo (cherry picked from commit cb2182676bdf652070bc272a3896d957763a4324) | 28 January 2014, 15:36:15 UTC |
2c4c986 | Dr. Stephen Henson | 28 January 2014, 15:15:26 UTC | Fix demo comment: 0.9.9 never released. (cherry picked from commit 717cc8589540b95122a652dee68e6a75b6262d93) | 28 January 2014, 15:17:32 UTC |