index
:
openssl
master
openssl
Fast-forward packages
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
crypto
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
feat: support the aAissuingDistributionPoint X.509v3 extension
Jonathan M. Wilbur
12 hours
3
-0
/
+172
*
Support CLI and API setting of provider configuration parameters
Viktor Dukhovni
12 hours
2
-14
/
+22
*
Work around to get llvm-mingw working on aarch64
Alexandr Nedvedicky
12 hours
1
-0
/
+9
*
Move rodata to .rodata section for armv8
Alexey Moksyakov
13 hours
3
-22
/
+46
*
provider_deactivate(): Check return value of CRYPTO_atomic_add()
onexyoung
19 hours
1
-1
/
+8
*
Workaround for RSA on AArch64 Big Endian
Nikolay Nikolaev
3 days
1
-0
/
+2
*
Remove non-existing error code.
Peter Bierma
3 days
1
-1
/
+0
*
Synchronize openssl.txt with comperr.h
Peter Bierma
3 days
1
-5
/
+5
*
Finishing touch to perlasm update to make it work on OpenBSD
sashan
4 days
2
-6
/
+42
*
Make it able to run asm code on OpenBSD (arm64)
Theo Buehler
4 days
12
-73
/
+164
*
LoongArch: we should access global symbol by la.global instead of
Wang Xin
4 days
1
-1
/
+1
*
Fix premature reuse of qp's in rcu locks
Neil Horman
4 days
2
-6
/
+19
*
Tweak case of [fs] variant letter in SLH-DSA algorithms
Viktor Dukhovni
7 days
3
-144
/
+144
*
Update error codes in "crypto/err/openssl.txt"
Michael Baentsch
9 days
1
-2
/
+1
*
Fix the use of OPENSSL_HTTP_PROXY / OPENSSL_HTTPS_PROXY
Richard Levitte
9 days
1
-1
/
+1
*
Free data if sk_OPENSSL_STRING_push fails.
Frederik Wedel-Heinen
10 days
1
-1
/
+5
*
Return NULL from ossl_lib_ctx_get_concrete() when it is uninitialized
Frederik Wedel-Heinen
10 days
2
-4
/
+16
*
Check returns of various sk_*_push functions
Frederik Wedel-Heinen
10 days
2
-2
/
+4
*
Pass functions with correct signatures to the evp_generic_fetch_xxx methods
Frederik Wedel-Heinen
10 days
7
-34
/
+104
*
Some PQ-related CSOR OIDs
Viktor Dukhovni
11 days
4
-9
/
+242
*
Fix potential memory leak in PKCS12_add_key_ex()
Niels Dossche
11 days
1
-1
/
+3
*
Clean up ASN1_STRING comment and improve example in docs
Job Snijders
11 days
1
-4
/
+4
*
Fix CMS encryption with key agreement when originator set
Jakub Zelenka
12 days
3
-51
/
+62
*
Optimize x86/aarch64 MD5 implementation
Jonathan Swinney
12 days
2
-67
/
+66
*
Avoid leaking memory when realloc fails
Frederik Wedel-Heinen
2025-01-03
1
-2
/
+1
*
feat: support the allowedAttributeAssignments X.509v3 extension
Jonathan M. Wilbur
2025-01-02
4
-1
/
+132
*
Fix potential memory leak in BIO_get_accept_socket()
Niels Dossche
2025-01-02
2
-2
/
+7
*
core_namemap.c: Use OPENSSL_STRING instead of defining STRING type
Tomas Mraz
2024-12-31
1
-12
/
+11
*
X509_ACERT_sign_ctx(): Remove superfluous reference
ryuishii
2024-12-26
1
-1
/
+1
*
Add CMS_NO_SIGNING_TIME flag to CMS_sign(), CMS_add1_signer()
Peter Juhasz
2024-12-26
2
-1
/
+13
*
feat: support the attributeMappings X.509v3 extension
Jonathan M. Wilbur
2024-12-23
4
-1
/
+120
*
Take into account no_store when pushing algorithm
Dmitry Belyavskiy
2024-12-20
1
-1
/
+1
*
ossl_i2c_ASN1_BIT_STRING(): Fix a possible heap buffer overflow
Andrey Tsygunka
2024-12-20
1
-18
/
+23
*
Check whether ctx->pctx != NULL
otherddn1978
2024-12-17
1
-4
/
+8
*
feat: add EVP APIs for cipher pipelining
Ramkumar
2024-12-17
4
-7
/
+188
*
Fix breakage on arm64_32 platforms
Tomas Mraz
2024-12-13
1
-2
/
+3
*
Extension of OPENSSL_ia32cap to accommodate additional CPUID bits
Elizarova, Alina
2024-12-13
7
-32
/
+107
*
feat: support the timeSpecification X.509v3 extension
Jonathan M. Wilbur
2024-12-11
4
-1
/
+601
*
dh_cms_set_peerkey(): Fix the incorrect condition
Shakti Shah
2024-12-11
1
-1
/
+1
*
Add function to mix in an additional input into a RAND_POOL
Tomas Mraz
2024-12-10
3
-36
/
+78
*
Fix potential use-after-free in REF_PRINT_COUNT
Neil Horman
2024-12-10
17
-26
/
+26
*
ossl_cms_get1_crls_ex(): Avoid doublefree if CRL up ref fails
Tomas Mraz
2024-12-10
1
-2
/
+4
*
Revert the behavior change of CMS_get1_certs() and CMS_get1_crls()
Tomas Mraz
2024-12-10
3
-19
/
+54
*
Code & comments changes to make them in consistent
willmafh
2024-12-06
3
-9
/
+16
*
one more empty line for code style consistency
willmafh
2024-12-06
1
-0
/
+1
*
Change all one's complement to ones' complement for consistency
willmafh
2024-12-06
2
-4
/
+4
*
BN_secure_new function indentation correction
willmafh
2024-12-06
1
-7
/
+7
*
Delete redundant parentheses for code consistency
willmafh
2024-12-06
1
-1
/
+1
*
fips: zeroization of ECX public keys
Joachim Vandersmissen
2024-12-03
1
-0
/
+3
*
Avoid NULL dereference with PKCS7_OP_SET_DETACHED_SIGNATURE
Tomas Mraz
2024-12-02
1
-0
/
+5
[next]