History log of /openssl/crypto/cryptlib.c (Results 101 – 125 of 163)
Revision (<<< Hide revision tags) (Show revision tags >>>) Date Author Comments
Revision tags: OpenSSL_0_9_8
# 1875e6db 05-Jul-2005 Andy Polyakov

Pull up Win64 support from 0.9.8.


Revision tags: FIPS_TEST_10, OpenSSL_0_9_8-beta6, OpenSSL_0_9_8-beta5, FIPS_TEST_9, OpenSSL_0_9_8-beta4, OpenSSL_0_9_8-beta3, BEN_FIPS_TEST_8, OpenSSL_0_9_8-beta2
# e476f942 21-May-2005 Andy Polyakov

Move _WIN32_WINNT definition from command line to e_os.h. The change is
inspired by VC6 failure report. In addition abstain from taking screen
snapshots when running in NT service context.


Revision tags: OpenSSL_0_9_8-beta1
# 34c7ff6d 03-May-2005 Andy Polyakov

Cygwin doesn't expose Win32 [not "officially"].


# 630e4a6e 21-Apr-2005 Richard Levitte

Provide a default OPENSSL_ia32cap_loc for non-Intel platforms where
util/libeay.num is important when building shared libraries, like
VMS.


# 1bf95592 13-Apr-2005 Andy Polyakov

Fix typos.


# 51d28013 13-Apr-2005 Andy Polyakov

Introduce OPENSSL_NONPIC_relocated to denote relocated DLLs.


# 9e88c827 13-Apr-2005 Andy Polyakov

Minor cryptlib.c update: compiler warnings in OPENSSL_showfatal and
OPENSSL_stderr stub.


Revision tags: OpenSSL_0_9_7g
# 9f2027e5 07-Apr-2005 Andy Polyakov

Implement OPENSSL_showfatal and make it Win32 GUI and service aware
[meaning that it will detect in which context application is running
and either write message to stderr, post a dialog or l

Implement OPENSSL_showfatal and make it Win32 GUI and service aware
[meaning that it will detect in which context application is running
and either write message to stderr, post a dialog or log an event].

show more ...


# e1d51de4 07-Apr-2005 Andy Polyakov

Harmonize cygwin/mingw and VC targets.


Revision tags: OpenSSL_0_9_7f, BEN_FIPS_TEST_7, BEN_FIPS_TEST_6
# 959f9b11 23-Nov-2004 Andy Polyakov

linux-x86_64 didn't link after EM64T RC4 tune-up...


Revision tags: OpenSSL_0_9_7e
# 2b247cf8 29-Aug-2004 Andy Polyakov

OPENSSL_ia32cap final touches. Note that OPENSSL_ia32cap is no longer a
symbol, but a macro expanded as (*(OPENSSL_ia32cap_loc())). The latter
is the only one to be exported to application.


# c7709441 01-Aug-2004 Andy Polyakov

Cygwin fix-up for shared build.


# 00555c2f 01-Aug-2004 Andy Polyakov

DLLEntryPoint is a collective name, not what linker looks for. However,
if we explicitly intruct the linker to set entry point, then we become
obliged to initialize run-time library. Instead

DLLEntryPoint is a collective name, not what linker looks for. However,
if we explicitly intruct the linker to set entry point, then we become
obliged to initialize run-time library. Instead we can pick name run-time
will call and such name is DllMain. Note that this applies to both
"native" Win32 environment and Cygwin:-)

show more ...


# ebaec63e 26-Jul-2004 Andy Polyakov

This is so to say "damage control" for jumbo "cpuid" patch, see
http://cvs.openssl.org/chngview?cn=12493. Now all platform should
be operational, while SSE2 code pathes get engaged on ELF pla

This is so to say "damage control" for jumbo "cpuid" patch, see
http://cvs.openssl.org/chngview?cn=12493. Now all platform should
be operational, while SSE2 code pathes get engaged on ELF platforms
only.

show more ...


# 14e21f86 26-Jul-2004 Andy Polyakov

Add framework for yet another assembler module dubbed "cpuid." Idea
is to have a placeholder to small routines, which can be written only
in assembler. In IA-32 case this includes processor c

Add framework for yet another assembler module dubbed "cpuid." Idea
is to have a placeholder to small routines, which can be written only
in assembler. In IA-32 case this includes processor capability
identification and access to Time-Stamp Counter. As discussed earlier
OPENSSL_ia32cap is introduced to control recently added SSE2 code
pathes (see docs/crypto/OPENSSL_ia32cap.pod). For the moment the
code is operational on ELF platforms only. I haven't checked it yet,
but I have all reasons to believe that Windows build should fail to
link too. I'll be looking into it shortly...

show more ...


# 60a938c6 19-Apr-2004 Geoff Thorpe

(oops) Apologies all, that last header-cleanup commit was from the wrong
tree. This further reduces header interdependencies, and makes some
associated cleanups.


Revision tags: OpenSSL_0_9_7d, OpenSSL-engine-0_9_6m, OpenSSL_0_9_6m, LEVITTE_after_const, LEVITTE_before_const, BEN_FIPS_TEST_5, BEN_FIPS_TEST_4, OpenSSL-engine-0_9_6l, OpenSSL_0_9_6l, BEN_FIPS_TEST_3, BEN_FIPS_TEST_2, BEN_FIPS_TEST_1
# c40b9bde 06-Oct-2003 Richard Levitte

Setting the ex_data index is unsafe in a threaded environment, so
let's wrap it with a lock.


Revision tags: OpenSSL-engine-0_9_6k, OpenSSL_0_9_6k, OpenSSL_0_9_7c
# 9236b5b0 01-May-2003 Richard Levitte

Define a STORE lock (the STORE type will be committed later).


Revision tags: OpenSSL-engine-0_9_6j, OpenSSL_0_9_7b, OpenSSL_0_9_6j, OpenSSL-engine-0_9_6i, OpenSSL_0_9_6i, OpenSSL_0_9_7a
# abd22c9c 12-Feb-2003 Bodo Möller

new lock for EC_PRE_COMP structures

Submitted by: Nils Larsch


Revision tags: OpenSSL_0_9_7, OpenSSL_0_9_7-beta6
# b9b6e14b 11-Dec-2002 Richard Levitte

In CRYPTO_lock(), check that the application cares about locking (provided
callbacks) before attempting to lock.


# 442d4230 11-Dec-2002 Richard Levitte

sk_*_push() returns the number of items on the stack, not the index of the
pushed item. The index is the number of items - 1. And if a NULL item was
found, actually use it.
Finally, pro

sk_*_push() returns the number of items on the stack, not the index of the
pushed item. The index is the number of items - 1. And if a NULL item was
found, actually use it.
Finally, provide a little bit of safety in CRYPTO_lock() by asserting the a
requested dynamic lock really must exist, instead of just being silent about it

show more ...


Revision tags: STATE_after_zlib, STATE_before_zlib, OpenSSL_0_9_7-beta5, OpenSSL-engine-0_9_6h, OpenSSL_0_9_6h, OpenSSL_0_9_7-beta4
# 54a656ef 13-Nov-2002 Ben Laurie

Security fixes brought forward from 0.9.7.


# e5f4d827 04-Nov-2002 Richard Levitte

Off-by-one-error corrected.
PR: 235


# 19b8d06a 28-Oct-2002 Bodo Möller

clean up new code for NIST primes

create new lock CRYPTO_LOCK_BN to avoid race condition


# e78f1378 23-Sep-2002 Bodo Möller

really fix race condition

PR: 262


1234567