#
b03817af |
| 19-Jul-2011 |
Pierre Joye |
- re apply the rng change specific to windows, long term it should be a std function but as this function was badly introduced in the 1st place, we have to fix the bad things here instead, pls do not
- re apply the rng change specific to windows, long term it should be a std function but as this function was badly introduced in the 1st place, we have to fix the bad things here instead, pls do not revert again, bad idea.
show more ...
|
#
69c3f8cb |
| 19-Jul-2011 |
Pierre Joye |
- re apply the rng change specific to windows, long term it should be a std function but as this function was badly introduced in the 1st place, we have to fix the bad things here instead, pls do not
- re apply the rng change specific to windows, long term it should be a std function but as this function was badly introduced in the 1st place, we have to fix the bad things here instead, pls do not revert again, bad idea.
show more ...
|
#
591e0e44 |
| 19-Jul-2011 |
Scott MacVicar |
Revert change to use a special Windows version of openssl_random_pseudo_bytes(). Lets discuss this on internals first. We're advertising something from the OpenSSL library and then subve
Revert change to use a special Windows version of openssl_random_pseudo_bytes(). Lets discuss this on internals first. We're advertising something from the OpenSSL library and then subverting it with another Windows OS call. What are the implications of this? Should we make this available in ext/standard/ instead?
show more ...
|
#
25fb1976 |
| 19-Jul-2011 |
Scott MacVicar |
Revert change to use a special Windows version of openssl_random_pseudo_bytes(). Lets discuss this on internals first. We're advertising something from the OpenSSL library and then subve
Revert change to use a special Windows version of openssl_random_pseudo_bytes(). Lets discuss this on internals first. We're advertising something from the OpenSSL library and then subverting it with another Windows OS call. What are the implications of this? Should we make this available in ext/standard/ instead?
show more ...
|
#
94645642 |
| 19-Jul-2011 |
Scott MacVicar |
openssl_encrypt() / openssl_decrypt() were flawed and truncated the key to the default size for the case of a variable key length cipher. The result is a key of 448 bits being passed to the
openssl_encrypt() / openssl_decrypt() were flawed and truncated the key to the default size for the case of a variable key length cipher. The result is a key of 448 bits being passed to the blowfish algorithm would be truncated to 128 bit. Also fixed an error in the zend_parse_parameters() having an invalid character being used.
show more ...
|
#
64a0c79a |
| 19-Jul-2011 |
Scott MacVicar |
openssl_encrypt() / openssl_decrypt() were flawed and truncated the key to the default size for the case of a variable key length cipher. The result is a key of 448 bits being passed to the
openssl_encrypt() / openssl_decrypt() were flawed and truncated the key to the default size for the case of a variable key length cipher. The result is a key of 448 bits being passed to the blowfish algorithm would be truncated to 128 bit. Also fixed an error in the zend_parse_parameters() having an invalid character being used.
show more ...
|
#
02581a00 |
| 19-Jul-2011 |
Scott MacVicar |
openssl_encrypt() / openssl_decrypt() were flawed and truncated the key to the default size for the case of a variable key length cipher. The result is a key of 448 bits being passed to the
openssl_encrypt() / openssl_decrypt() were flawed and truncated the key to the default size for the case of a variable key length cipher. The result is a key of 448 bits being passed to the blowfish algorithm would be truncated to 128 bit. Also fixed an error in the zend_parse_parameters() having an invalid character being used.
show more ...
|
Revision tags: php-5.3.7RC3, php-5.4.0alpha2 |
|
#
8278f831 |
| 10-Jul-2011 |
Pierre Joye |
- use php_win32_get_random_bytes instead of over slow and partially wrong openssl's version
|
#
5fb25707 |
| 10-Jul-2011 |
Pierre Joye |
- use php_win32_get_random_bytes instead of over slow and partially wrong openssl's version
|
Revision tags: php-5.3.7RC2, php-5.4.0alpha1 |
|
#
ccae79a2 |
| 16-Jun-2011 |
Pierre Joye |
- did I not kill that already? (do not use rand_screen, pointless on server and not TS)
|
#
3c8bd9eb |
| 16-Jun-2011 |
Pierre Joye |
- did I not kill that already? (do not use rand_screen, pointless on server and not TS)
|
#
104cd28e |
| 16-Jun-2011 |
Pierre Joye |
- did I not kill that already? (do not use rand_screen, pointless on server and not TS)
|
Revision tags: php-5.3.7RC1 |
|
#
32b5f8a1 |
| 06-Jun-2011 |
Felipe Pena |
- Added new parameter parsing option (p - for valid path (string without null byte in the middle)) # The tests will be fixed in the next commits
|
#
4737910b |
| 06-Jun-2011 |
Felipe Pena |
- Added new parameter parsing option (p - for valid path (string without null byte in the middle)) # The tests will be fixed in the next commits
|
#
30f19bd5 |
| 20-May-2011 |
Scott MacVicar |
Allow management of your own padding in openssl_encrypt/decrypt. For using mcrypt / openssl interchangeabley managing your own padding is the only solution.
|
#
9e7ae3b2 |
| 20-May-2011 |
Scott MacVicar |
Allow management of your own padding in openssl_encrypt/decrypt. For using mcrypt / openssl interchangeabley managing your own padding is the only solution.
|
#
1a4897c8 |
| 25-Apr-2011 |
Martin Jansen |
MFH: The project calls itself OpenSSL and not openSSL, so let's keep it that way in our code as well.
|
#
0c843846 |
| 25-Apr-2011 |
Martin Jansen |
The project calls itself OpenSSL and not openSSL, so let's keep it that way in our code as well.
|
#
be3d70df |
| 24-Apr-2011 |
Rasmus Lerdorf |
SSLV2 patch cleanup
|
#
380c3e51 |
| 24-Apr-2011 |
Rasmus Lerdorf |
SSLV2 patch cleanup
|
Revision tags: php-5.3.6, php-5.3.6RC3, php-5.3.6RC2 |
|
#
69ba87b1 |
| 21-Feb-2011 |
Pierre Joye |
- fix bug #54061, memory leak in openssl_decrypt
|
#
f922e311 |
| 21-Feb-2011 |
Pierre Joye |
- fix bug #54061, memory leak in openssl_decrypt
|
#
7deec592 |
| 21-Feb-2011 |
Pierre Joye |
- fix test 025
|
#
b526a6ef |
| 21-Feb-2011 |
Pierre Joye |
- fix bug #54060, memory leak in openssl_encrypt
|
#
5261861d |
| 21-Feb-2011 |
Pierre Joye |
- fix bug #54060, memory leak in openssl_encrypt
|