index
:
openbsd
OPENBSD_2_0
OPENBSD_2_1
OPENBSD_2_2
OPENBSD_2_3
OPENBSD_2_4
OPENBSD_2_5
OPENBSD_2_6
OPENBSD_2_7
OPENBSD_2_8
OPENBSD_2_9
OPENBSD_3_0
OPENBSD_3_1
OPENBSD_3_2
OPENBSD_3_3
OPENBSD_3_4
OPENBSD_3_5
OPENBSD_3_6
OPENBSD_3_7
OPENBSD_3_8
OPENBSD_3_9
OPENBSD_4_0
OPENBSD_4_1
OPENBSD_4_2
OPENBSD_4_3
OPENBSD_4_4
OPENBSD_4_5
OPENBSD_4_6
OPENBSD_4_7
OPENBSD_4_8
OPENBSD_4_9
OPENBSD_5_0
OPENBSD_5_1
OPENBSD_5_2
OPENBSD_5_3
OPENBSD_5_4
OPENBSD_5_5
OPENBSD_5_6
OPENBSD_5_7
OPENBSD_5_8
OPENBSD_5_9
OPENBSD_6_0
OPENBSD_6_1
OPENBSD_6_2
OPENBSD_6_3
OPENBSD_6_4
OPENBSD_6_5
OPENBSD_6_6
OPENBSD_6_7
OPENBSD_6_8
OPENBSD_6_9
OPENBSD_7_0
OPENBSD_7_1
OPENBSD_7_2
OPENBSD_7_3
OPENBSD_7_4
OPENBSD_7_5
OPENBSD_7_6
master
A mirror of https://github.com/libressl/openbsd.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
Commit message (
Expand
)
Author
Age
Files
Lines
*
Bump for LibreSSL 2.3.10
libressl-v2.3.10
OPENBSD_5_9
bcook
2017-01-07
1
-3
/
+3
*
MFC: Avoid a side-channel cache-timing attack that can leak the ECDSA
jsing
2017-01-05
1
-1
/
+3
*
MFC: In ssl3_read_bytes(), do not process more than three consecutive TLS
libressl-v2.3.9
jsing
2016-11-03
1
-4
/
+24
*
bump to 2.3.9
bcook
2016-10-02
1
-3
/
+3
*
MFC: Avoid falling back to a weak digest for (EC)DH when using SNI with
libressl-v2.3.8
jsing
2016-09-22
1
-3
/
+10
*
MFC: Avoid unbounded memory growth in libssl, which can be triggered by a
jsing
2016-09-22
1
-9
/
+20
*
bump version for 2.3.8
bcook
2016-09-22
1
-3
/
+3
*
bump for 2.3.7
libressl-v2.3.7
bcook
2016-06-30
1
-3
/
+3
*
Fix several issues in the OCSP code that could result in the incorrect
beck
2016-06-25
2
-9
/
+33
*
Set BN_FLG_CONSTTIME on the correct variable. beck committed wrong fix.
libressl-v2.3.6
tedu
2016-06-06
1
-2
/
+2
*
Correct a problem that prevents the DSA signing algorithm from running
beck
2016-06-06
1
-4
/
+6
*
LibreSSL 2.3.6
bcook
2016-06-06
1
-3
/
+3
*
bump to 2.3.5
libressl-v2.3.5
bcook
2016-05-29
1
-3
/
+3
*
Fix a short-read bug in the previous version of asn1_d2i_read_bio
bcook
2016-05-29
1
-26
/
+28
*
this chunk was NOT supposed to be committed. spotted by jsg.
tedu
2016-05-04
1
-2
/
+1
*
prefer limits.h over sys/limits.h
libressl-v2.3.4
bcook
2016-05-03
1
-2
/
+2
*
bump to 2.3.4
bcook
2016-05-03
1
-2
/
+2
*
backport patch from openssl for multiple issues:
tedu
2016-05-03
8
-31
/
+58
*
This commit was manufactured by cvs2git to create branch 'OPENBSD_5_9'.
cvs2svn
2016-05-03
1
-0
/
+209
*
bump for LibreSSL 2.3.3
libressl-v2.3.3
bcook
2016-03-12
1
-3
/
+3
*
This commit was manufactured by cvs2git to create branch 'OPENBSD_5_9'.
cvs2svn
2016-02-17
1186
-380326
/
+0
*
Sync some root certificates with Mozilla's cert store. ok bcook@
sthen
2016-02-17
1
-84
/
+1016
*
word fix from previous; ok sthen
jmc
2016-02-12
1
-3
/
+3
*
sslv3 has been removed;
jmc
2016-02-08
1
-16
/
+21
*
compare pointer to NULL in example code
mmcc
2016-02-07
1
-3
/
+3
*
be more forceful about not using these.
espie
2016-02-05
1
-2
/
+9
*
Fix err(3) calls after allocation failures in examples.
schwarze
2016-02-05
1
-8
/
+8
*
Sort cert.pem alphabetically, first by organisation, then by CA name
sthen
2016-02-01
1
-1604
/
+1584
*
Revamp cert.pem certificate information formatting. Skip headers which
sthen
2016-01-31
1
-2459
/
+184
*
Therefor -> Therefore (where appropriate)
tb
2016-01-29
2
-2
/
+2
*
deprecate SSL_OP_SINGLE_DH_USE
libressl-v2.3.2
beck
2016-01-27
4
-74
/
+12
*
Don't crash dumping malloc stats if malloc_init hasn't been called, noted by
otto
2016-01-26
1
-1
/
+3
*
Call BIO_sock_init() from tls_init() to ensure sockets are enabled on Windows.
bcook
2016-01-18
1
-1
/
+4
*
Long ago, malloc internally had two kinds of failures, warnings and errors.
tedu
2016-01-06
2
-14
/
+7
*
Follow style(9) and drop lint /* NOTREACHED */ annotations from
tb
2016-01-04
2
-6
/
+4
*
Use the correct values for TLS certificate / private key flags.
bcook
2016-01-04
1
-5
/
+5
*
Calling clone(2) with CLONE_NEWPID yields multiple processes with pid=1.
bcook
2016-01-04
2
-4
/
+6
*
Document that the ssl free() functions are NULL safe. OK mmcc@
millert
2015-12-30
6
-12
/
+42
*
another case where bad things would happen after wrterror
tedu
2015-12-30
1
-2
/
+4
*
if somebody makes the mistake of disabling abort, don't deref null in
tedu
2015-12-30
1
-2
/
+4
*
Remove NULL-checks before free() and a few related dead assignments.
mmcc
2015-12-28
2
-8
/
+5
*
initialize pointer to avoid undefined free on failure
bcook
2015-12-28
1
-2
/
+2
*
include time.h over sys/time.h for ctime(3)
bcook
2015-12-28
1
-2
/
+2
*
remove unused variable
chl
2015-12-27
1
-2
/
+1
*
more e-mail -> email
mmcc
2015-12-24
2
-5
/
+5
*
More adress -> address
mmcc
2015-12-24
4
-4
/
+4
*
remove NULL-check before free()
mmcc
2015-12-23
1
-3
/
+2
*
remove NULL-checks before free()
mmcc
2015-12-23
6
-38
/
+22
*
assign pointer NULL rather than 0
mmcc
2015-12-23
2
-4
/
+4
*
assign pointer to NULL rather than 0
mmcc
2015-12-23
2
-4
/
+4
[next]