- May 21, 2005
-
-
Andy Polyakov authored
-
Richard Levitte authored
http://www.opengroup.org/onlinepubs/007908799/xsh/compilation.html. Notified by David Wolfe <dwolfe5272@yahoo.com>
-
Andy Polyakov authored
-
Richard Levitte authored
-
Ben Laurie authored
-
Andy Polyakov authored
inspired by VC6 failure report. In addition abstain from taking screen snapshots when running in NT service context.
-
- May 20, 2005
-
-
Nils Larsch authored
-
- May 19, 2005
-
-
Nils Larsch authored
Submitted by: Goetz Babin-Ebell
-
Nils Larsch authored
-
Andy Polyakov authored
-
Richard Levitte authored
-
Nils Larsch authored
warning when using gcc 4.0
-
- May 18, 2005
-
-
Nils Larsch authored
-
Andy Polyakov authored
-
Andy Polyakov authored
PR: 1073
-
Andy Polyakov authored
compiled into *our* aplpications. That's because mingw is always consistent with itself. Having library-side code linked into .dll makes it possible to deploy the .dll with user-code compiled with another compiler [which is pretty much the whole point behind Applink].
-
Richard Levitte authored
-
Richard Levitte authored
The 0.9.8 branch is called OpenSSL_0_9_8-stable.
-
- May 17, 2005
-
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Nils Larsch authored
-
Andy Polyakov authored
-
Bodo Möller authored
PR: 1070
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
first everywhere in crypto and skip stdio.h and string.h [because it includes them].
-
- May 16, 2005
-
-
Andy Polyakov authored
-
Bodo Möller authored
-
Andy Polyakov authored
[most importantly] put back dependencies accidentaly eliminated in check-in #13342.
-
Andy Polyakov authored
-
Nils Larsch authored
- hide the EC_KEY structure definition in ec_lcl.c + add some functions to use/access the EC_KEY fields - change the way how method specific data (ecdsa/ecdh) is attached to a EC_KEY - add ECDSA_sign_ex and ECDSA_do_sign_ex functions with additional parameters for pre-computed values - rebuild libeay.num from 0.9.7
-
Bodo Möller authored
timing attacks. BN_FLG_EXP_CONSTTIME requests this algorithm, and this done by default for RSA/DSA/DH private key computations unless RSA_FLAG_NO_EXP_CONSTTIME/DSA_FLAG_NO_EXP_CONSTTIME/ DH_FLAG_NO_EXP_CONSTTIME is set. Submitted by: Matthew D Wood Reviewed by: Bodo Moeller
-
Bodo Möller authored
-
Bodo Möller authored
-
Andy Polyakov authored
-
- May 15, 2005
-
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Dr. Stephen Henson authored
-