index
:
openbsd
OPENBSD_2_0
OPENBSD_2_1
OPENBSD_2_2
OPENBSD_2_3
OPENBSD_2_4
OPENBSD_2_5
OPENBSD_2_6
OPENBSD_2_7
OPENBSD_2_8
OPENBSD_2_9
OPENBSD_3_0
OPENBSD_3_1
OPENBSD_3_2
OPENBSD_3_3
OPENBSD_3_4
OPENBSD_3_5
OPENBSD_3_6
OPENBSD_3_7
OPENBSD_3_8
OPENBSD_3_9
OPENBSD_4_0
OPENBSD_4_1
OPENBSD_4_2
OPENBSD_4_3
OPENBSD_4_4
OPENBSD_4_5
OPENBSD_4_6
OPENBSD_4_7
OPENBSD_4_8
OPENBSD_4_9
OPENBSD_5_0
OPENBSD_5_1
OPENBSD_5_2
OPENBSD_5_3
OPENBSD_5_4
OPENBSD_5_5
OPENBSD_5_6
OPENBSD_5_7
OPENBSD_5_8
OPENBSD_5_9
OPENBSD_6_0
OPENBSD_6_1
OPENBSD_6_2
OPENBSD_6_3
OPENBSD_6_4
OPENBSD_6_5
OPENBSD_6_6
OPENBSD_6_7
OPENBSD_6_8
OPENBSD_6_9
OPENBSD_7_0
OPENBSD_7_1
OPENBSD_7_2
OPENBSD_7_3
OPENBSD_7_4
OPENBSD_7_5
OPENBSD_7_6
master
A mirror of https://github.com/libressl/openbsd.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
Commit message (
Expand
)
Author
Age
Files
Lines
*
Add missing pointer invalidation
libressl-v3.6.3
OPENBSD_7_2
tb
2023-05-26
1
-1
/
+2
*
Fix a number of out of bound reads in DNS response parsing.
bluhm
2023-03-16
1
-1
/
+7
*
Fix arbitrary memory read in GENERAL_NAME_cmp()
bluhm
2023-02-07
1
-2
/
+3
*
Unbreak ASN.1 indefinite length encoding.
libressl-v3.6.2
libressl-v3.6.1
tb
2022-10-20
1
-4
/
+4
*
Store errors that result from leaf certificate verification.
tb
2022-10-20
1
-8
/
+12
*
This commit was manufactured by cvs2git to create branch 'OPENBSD_7_2'.
libressl-v3.6.0
cvs2svn
2022-09-21
0
-0
/
+0
*
Tweak symbols test in such a way that it would have caught the recent
tb
2022-09-21
2
-3
/
+9
*
Remove PKCS12_MAKE_{,SH}KEYBAG from Symbols.list
tb
2022-09-19
1
-2
/
+0
*
Allow TLSv1.3 clients to send CCS without middlebox compatibility mode.
jsing
2022-09-17
1
-4
/
+2
*
Link to SSL_read_early_data(3)
kn
2022-09-17
1
-3
/
+3
*
Add OID for RPKI signedTAL objects
job
2022-09-15
2
-0
/
+2
*
Use LONG_MAX as the limit for ciphers with long based APIs.
jsing
2022-09-15
6
-169
/
+120
*
remove an extraneous empty line
tb
2022-09-14
1
-2
/
+1
*
Stop pretending that EVP_CIPHER cleanup can fail.
jsing
2022-09-13
4
-14
/
+15
*
zap extra .Pp
tb
2022-09-12
1
-2
/
+1
*
Stop documenting i2c_ASN1_INTEGER.
tb
2022-09-12
2
-48
/
+4
*
Add CBC, CFB64 and OFB64 test coverage for RC2
tb
2022-09-12
1
-34
/
+463
*
whitespace nits
tb
2022-09-12
1
-4
/
+5
*
Move division by two out of sizeof()
tb
2022-09-12
1
-3
/
+3
*
Error checks for EVP_*
tb
2022-09-12
1
-25
/
+36
*
Move division by two out of sizeof()
tb
2022-09-12
1
-3
/
+3
*
Add regression tests for the sendmmsg and recvmmsg system calls.
mbuhl
2022-09-11
4
-2
/
+410
*
Enforce the minimum TLS version requirement for QUIC.
jsing
2022-09-11
1
-1
/
+9
*
Adjust for opaque structs in ts.h
tb
2022-09-11
1
-14
/
+24
*
Adjust for opaque structs in pkcs12.h
tb
2022-09-11
1
-25
/
+38
*
bump major after libcrypto and libssl major bump
tb
2022-09-11
1
-2
/
+2
*
Crank major after symbol addition and libcrypto major bump
tb
2022-09-11
1
-2
/
+2
*
Update Symbols.list
tb
2022-09-11
1
-0
/
+11
*
Expose SSL_get_share_{group,curve}() and related #defines
tb
2022-09-11
1
-7
/
+3
*
Expose some error codes needed for QUIC support
tb
2022-09-11
1
-3
/
+1
*
Define LIBRESSL_HAS_QUIC
tb
2022-09-11
1
-0
/
+1
*
Bump major after symbol addition and removal and struct visibility changes
tb
2022-09-11
1
-2
/
+2
*
Update Symbols.list
tb
2022-09-11
1
-9
/
+31
*
Make structs in ts.h opaque
tb
2022-09-11
2
-215
/
+223
*
Make structs in pkcs12.h opaque
tb
2022-09-11
4
-162
/
+45
*
Expose EVP_chacha20_poly1305()
tb
2022-09-11
1
-3
/
+1
*
Expose various EVP AEAD constants for EVP ChaCha and QUIC
tb
2022-09-11
1
-3
/
+1
*
Expose OPENSL_cleanup()
tb
2022-09-11
1
-3
/
+1
*
Make BIO_info_cb() identical to bio_info_cb()
tb
2022-09-11
1
-2
/
+3
*
Remove c2i_* and i2c_* from public visibility
tb
2022-09-11
2
-10
/
+11
*
link asn1object test statically in preparation for upcoming bump
tb
2022-09-11
1
-1
/
+2
*
Be stricter with middlebox compatibility mode in the TLSv1.3 server.
jsing
2022-09-11
1
-5
/
+21
*
Only permit CCS messages if requesting middlebox compatibility mode.
jsing
2022-09-11
1
-4
/
+4
*
Use CBS when procesing a CCS message in the legacy stack.
jsing
2022-09-11
1
-4
/
+7
*
Ensure there is no trailing data for a CCS received by the TLSv1.3 stack.
jsing
2022-09-11
1
-1
/
+3
*
Replace archaic \*(Lt and \*(Gt by plain < and >, respectively,
schwarze
2022-09-11
1
-7
/
+7
*
.Li -> .Vt where appropriate;
jmc
2022-09-11
24
-106
/
+103
*
fix repeated words
jsg
2022-09-11
2
-6
/
+6
*
Increment the input and output position for EVP AES CFB1.
jsing
2022-09-10
1
-1
/
+3
*
Use correct length for EVP CFB mode ciphers.
jsing
2022-09-10
7
-22
/
+22
[next]