index
:
openssl.git
OpenSSL_0_9_6-stable
OpenSSL_0_9_7-stable
OpenSSL_0_9_8-stable
OpenSSL_1_0_0-stable
OpenSSL_1_0_1-stable
OpenSSL_1_0_2-stable
OpenSSL_1_1_0-stable
feature/SSL_CTX_get_ciphers
fix-ssl_next_proto_validate
fix/EC_KEY_set_private_key-null
fix/x509-store-ex-data
fix/x509-store-remove-old
ky/bn-print-fix
ky/pem-read-fix-unsigned-cast
ky/ssl-fix-get-session-cb
master
topic/SSL_get_max_early_data-typofix
topic/X509_load_cert_crl_file-errorleakfix
topic/bn-bn2dec-fix
topic/chacha20-flags
topic/ec-group-get-ecparameters-memory-leak
topic/evp-chacha20-poly1305-cleanup-typofix
topic/evp-chacha20-poly1305-init-segv
topic/fix-asn1-integer-decode
topic/fix-config-parse-oid_section
rhe's working repository
about
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
crypto
/
rsa
/
rsa_ssl.c
Commit message (
Expand
)
Author
Age
Files
Lines
*
Identify and move common internal libcrypto header files
Richard Levitte
2015-05-14
1
-1
/
+1
*
Run util/openssl-format-source -v -c .
Matt Caswell
2015-01-22
1
-95
/
+88
*
remove OPENSSL_FIPSAPI
Dr. Stephen Henson
2014-12-08
1
-1
/
+1
*
Transfer error redirection to fips.h, add OPENSSL_FIPSAPI to source files
Dr. Stephen Henson
2011-02-03
1
-0
/
+2
*
We should check the eight bytes starting at p[-9] for rollback attack
Bodo Möller
2008-07-17
1
-1
/
+1
*
Constify the RSA library.
Richard Levitte
2000-11-06
1
-5
/
+5
*
Fix SSL 2.0 rollback checking: The previous implementation of the
Bodo Möller
2000-07-29
1
-1
/
+1
*
Check tlen size in all padding_check functions. As called within the rsa
Ulf Möller
2000-02-22
1
-0
/
+5
*
Precautions against using the PRNG uninitialized: RAND_bytes() now
Ulf Möller
2000-01-13
1
-2
/
+4
*
Change #include filenames from <foo.h> to <openssl.h>.
Bodo Möller
1999-04-23
1
-3
/
+3
*
Change functions to ANSI C.
Ulf Möller
1999-04-19
1
-11
/
+4
*
Import of old SSLeay release: SSLeay 0.9.1b (unreleased)
Ralf S. Engelschall
1998-12-21
1
-2
/
+3
*
Import of old SSLeay release: SSLeay 0.9.0b
Ralf S. Engelschall
1998-12-21
1
-0
/
+153