summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
* Bump for LibreSSL 2.3.10libressl-v2.3.10OPENBSD_5_9bcook2017-01-071-3/+3
* MFC: Avoid a side-channel cache-timing attack that can leak the ECDSAjsing2017-01-051-1/+3
* MFC: In ssl3_read_bytes(), do not process more than three consecutive TLSlibressl-v2.3.9jsing2016-11-031-4/+24
* bump to 2.3.9bcook2016-10-021-3/+3
* MFC: Avoid falling back to a weak digest for (EC)DH when using SNI withlibressl-v2.3.8jsing2016-09-221-3/+10
* MFC: Avoid unbounded memory growth in libssl, which can be triggered by ajsing2016-09-221-9/+20
* bump version for 2.3.8bcook2016-09-221-3/+3
* bump for 2.3.7libressl-v2.3.7bcook2016-06-301-3/+3
* Fix several issues in the OCSP code that could result in the incorrectbeck2016-06-252-9/+33
* Set BN_FLG_CONSTTIME on the correct variable. beck committed wrong fix.libressl-v2.3.6tedu2016-06-061-2/+2
* Correct a problem that prevents the DSA signing algorithm from runningbeck2016-06-061-4/+6
* LibreSSL 2.3.6bcook2016-06-061-3/+3
* bump to 2.3.5libressl-v2.3.5bcook2016-05-291-3/+3
* Fix a short-read bug in the previous version of asn1_d2i_read_biobcook2016-05-291-26/+28
* this chunk was NOT supposed to be committed. spotted by jsg.tedu2016-05-041-2/+1
* prefer limits.h over sys/limits.hlibressl-v2.3.4bcook2016-05-031-2/+2
* bump to 2.3.4bcook2016-05-031-2/+2
* backport patch from openssl for multiple issues:tedu2016-05-038-31/+58
* This commit was manufactured by cvs2git to create branch 'OPENBSD_5_9'.cvs2svn2016-05-031-0/+209
* bump for LibreSSL 2.3.3libressl-v2.3.3bcook2016-03-121-3/+3
* This commit was manufactured by cvs2git to create branch 'OPENBSD_5_9'.cvs2svn2016-02-171186-380326/+0
* Sync some root certificates with Mozilla's cert store. ok bcook@sthen2016-02-171-84/+1016
* word fix from previous; ok sthenjmc2016-02-121-3/+3
* sslv3 has been removed;jmc2016-02-081-16/+21
* compare pointer to NULL in example codemmcc2016-02-071-3/+3
* be more forceful about not using these.espie2016-02-051-2/+9
* Fix err(3) calls after allocation failures in examples.schwarze2016-02-051-8/+8
* Sort cert.pem alphabetically, first by organisation, then by CA namesthen2016-02-011-1604/+1584
* Revamp cert.pem certificate information formatting. Skip headers whichsthen2016-01-311-2459/+184
* Therefor -> Therefore (where appropriate)tb2016-01-292-2/+2
* deprecate SSL_OP_SINGLE_DH_USElibressl-v2.3.2beck2016-01-274-74/+12
* Don't crash dumping malloc stats if malloc_init hasn't been called, noted byotto2016-01-261-1/+3
* Call BIO_sock_init() from tls_init() to ensure sockets are enabled on Windows.bcook2016-01-181-1/+4
* Long ago, malloc internally had two kinds of failures, warnings and errors.tedu2016-01-062-14/+7
* Follow style(9) and drop lint /* NOTREACHED */ annotations fromtb2016-01-042-6/+4
* Use the correct values for TLS certificate / private key flags.bcook2016-01-041-5/+5
* Calling clone(2) with CLONE_NEWPID yields multiple processes with pid=1.bcook2016-01-042-4/+6
* Document that the ssl free() functions are NULL safe. OK mmcc@millert2015-12-306-12/+42
* another case where bad things would happen after wrterrortedu2015-12-301-2/+4
* if somebody makes the mistake of disabling abort, don't deref null intedu2015-12-301-2/+4
* Remove NULL-checks before free() and a few related dead assignments.mmcc2015-12-282-8/+5
* initialize pointer to avoid undefined free on failurebcook2015-12-281-2/+2
* include time.h over sys/time.h for ctime(3)bcook2015-12-281-2/+2
* remove unused variablechl2015-12-271-2/+1
* more e-mail -> emailmmcc2015-12-242-5/+5
* More adress -> addressmmcc2015-12-244-4/+4
* remove NULL-check before free()mmcc2015-12-231-3/+2
* remove NULL-checks before free()mmcc2015-12-236-38/+22
* assign pointer NULL rather than 0mmcc2015-12-232-4/+4
* assign pointer to NULL rather than 0mmcc2015-12-232-4/+4