Revision tags: OpenSSL_0_9_8 |
|
#
1875e6db |
| 05-Jul-2005 |
Andy Polyakov |
Pull up Win64 support from 0.9.8.
|
Revision tags: FIPS_TEST_10, OpenSSL_0_9_8-beta6, OpenSSL_0_9_8-beta5, FIPS_TEST_9, OpenSSL_0_9_8-beta4, OpenSSL_0_9_8-beta3, BEN_FIPS_TEST_8, OpenSSL_0_9_8-beta2 |
|
#
e476f942 |
| 21-May-2005 |
Andy Polyakov |
Move _WIN32_WINNT definition from command line to e_os.h. The change is inspired by VC6 failure report. In addition abstain from taking screen snapshots when running in NT service context.
|
Revision tags: OpenSSL_0_9_8-beta1 |
|
#
34c7ff6d |
| 03-May-2005 |
Andy Polyakov |
Cygwin doesn't expose Win32 [not "officially"].
|
#
630e4a6e |
| 21-Apr-2005 |
Richard Levitte |
Provide a default OPENSSL_ia32cap_loc for non-Intel platforms where util/libeay.num is important when building shared libraries, like VMS.
|
#
1bf95592 |
| 13-Apr-2005 |
Andy Polyakov |
Fix typos.
|
#
51d28013 |
| 13-Apr-2005 |
Andy Polyakov |
Introduce OPENSSL_NONPIC_relocated to denote relocated DLLs.
|
#
9e88c827 |
| 13-Apr-2005 |
Andy Polyakov |
Minor cryptlib.c update: compiler warnings in OPENSSL_showfatal and OPENSSL_stderr stub.
|
Revision tags: OpenSSL_0_9_7g |
|
#
9f2027e5 |
| 07-Apr-2005 |
Andy Polyakov |
Implement OPENSSL_showfatal and make it Win32 GUI and service aware [meaning that it will detect in which context application is running and either write message to stderr, post a dialog or l
Implement OPENSSL_showfatal and make it Win32 GUI and service aware [meaning that it will detect in which context application is running and either write message to stderr, post a dialog or log an event].
show more ...
|
#
e1d51de4 |
| 07-Apr-2005 |
Andy Polyakov |
Harmonize cygwin/mingw and VC targets.
|
Revision tags: OpenSSL_0_9_7f, BEN_FIPS_TEST_7, BEN_FIPS_TEST_6 |
|
#
959f9b11 |
| 23-Nov-2004 |
Andy Polyakov |
linux-x86_64 didn't link after EM64T RC4 tune-up...
|
Revision tags: OpenSSL_0_9_7e |
|
#
2b247cf8 |
| 29-Aug-2004 |
Andy Polyakov |
OPENSSL_ia32cap final touches. Note that OPENSSL_ia32cap is no longer a symbol, but a macro expanded as (*(OPENSSL_ia32cap_loc())). The latter is the only one to be exported to application.
|
#
c7709441 |
| 01-Aug-2004 |
Andy Polyakov |
Cygwin fix-up for shared build.
|
#
00555c2f |
| 01-Aug-2004 |
Andy Polyakov |
DLLEntryPoint is a collective name, not what linker looks for. However, if we explicitly intruct the linker to set entry point, then we become obliged to initialize run-time library. Instead
DLLEntryPoint is a collective name, not what linker looks for. However, if we explicitly intruct the linker to set entry point, then we become obliged to initialize run-time library. Instead we can pick name run-time will call and such name is DllMain. Note that this applies to both "native" Win32 environment and Cygwin:-)
show more ...
|
#
ebaec63e |
| 26-Jul-2004 |
Andy Polyakov |
This is so to say "damage control" for jumbo "cpuid" patch, see http://cvs.openssl.org/chngview?cn=12493. Now all platform should be operational, while SSE2 code pathes get engaged on ELF pla
This is so to say "damage control" for jumbo "cpuid" patch, see http://cvs.openssl.org/chngview?cn=12493. Now all platform should be operational, while SSE2 code pathes get engaged on ELF platforms only.
show more ...
|
#
14e21f86 |
| 26-Jul-2004 |
Andy Polyakov |
Add framework for yet another assembler module dubbed "cpuid." Idea is to have a placeholder to small routines, which can be written only in assembler. In IA-32 case this includes processor c
Add framework for yet another assembler module dubbed "cpuid." Idea is to have a placeholder to small routines, which can be written only in assembler. In IA-32 case this includes processor capability identification and access to Time-Stamp Counter. As discussed earlier OPENSSL_ia32cap is introduced to control recently added SSE2 code pathes (see docs/crypto/OPENSSL_ia32cap.pod). For the moment the code is operational on ELF platforms only. I haven't checked it yet, but I have all reasons to believe that Windows build should fail to link too. I'll be looking into it shortly...
show more ...
|
#
60a938c6 |
| 19-Apr-2004 |
Geoff Thorpe |
(oops) Apologies all, that last header-cleanup commit was from the wrong tree. This further reduces header interdependencies, and makes some associated cleanups.
|
Revision tags: OpenSSL_0_9_7d, OpenSSL-engine-0_9_6m, OpenSSL_0_9_6m, LEVITTE_after_const, LEVITTE_before_const, BEN_FIPS_TEST_5, BEN_FIPS_TEST_4, OpenSSL-engine-0_9_6l, OpenSSL_0_9_6l, BEN_FIPS_TEST_3, BEN_FIPS_TEST_2, BEN_FIPS_TEST_1 |
|
#
c40b9bde |
| 06-Oct-2003 |
Richard Levitte |
Setting the ex_data index is unsafe in a threaded environment, so let's wrap it with a lock.
|
Revision tags: OpenSSL-engine-0_9_6k, OpenSSL_0_9_6k, OpenSSL_0_9_7c |
|
#
9236b5b0 |
| 01-May-2003 |
Richard Levitte |
Define a STORE lock (the STORE type will be committed later).
|
Revision tags: OpenSSL-engine-0_9_6j, OpenSSL_0_9_7b, OpenSSL_0_9_6j, OpenSSL-engine-0_9_6i, OpenSSL_0_9_6i, OpenSSL_0_9_7a |
|
#
abd22c9c |
| 12-Feb-2003 |
Bodo Möller |
new lock for EC_PRE_COMP structures Submitted by: Nils Larsch
|
Revision tags: OpenSSL_0_9_7, OpenSSL_0_9_7-beta6 |
|
#
b9b6e14b |
| 11-Dec-2002 |
Richard Levitte |
In CRYPTO_lock(), check that the application cares about locking (provided callbacks) before attempting to lock.
|
#
442d4230 |
| 11-Dec-2002 |
Richard Levitte |
sk_*_push() returns the number of items on the stack, not the index of the pushed item. The index is the number of items - 1. And if a NULL item was found, actually use it. Finally, pro
sk_*_push() returns the number of items on the stack, not the index of the pushed item. The index is the number of items - 1. And if a NULL item was found, actually use it. Finally, provide a little bit of safety in CRYPTO_lock() by asserting the a requested dynamic lock really must exist, instead of just being silent about it
show more ...
|
Revision tags: STATE_after_zlib, STATE_before_zlib, OpenSSL_0_9_7-beta5, OpenSSL-engine-0_9_6h, OpenSSL_0_9_6h, OpenSSL_0_9_7-beta4 |
|
#
54a656ef |
| 13-Nov-2002 |
Ben Laurie |
Security fixes brought forward from 0.9.7.
|
#
e5f4d827 |
| 04-Nov-2002 |
Richard Levitte |
Off-by-one-error corrected. PR: 235
|
#
19b8d06a |
| 28-Oct-2002 |
Bodo Möller |
clean up new code for NIST primes create new lock CRYPTO_LOCK_BN to avoid race condition
|
#
e78f1378 |
| 23-Sep-2002 |
Bodo Möller |
really fix race condition PR: 262
|