summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* Bump for LibreSSL 2.3.10libressl-v2.3.10OPENBSD_5_9bcook2017-01-071-3/+3
* MFC: Avoid a side-channel cache-timing attack that can leak the ECDSAjsing2017-01-051-1/+3
* MFC: In ssl3_read_bytes(), do not process more than three consecutive TLSlibressl-v2.3.9jsing2016-11-031-4/+24
* bump to 2.3.9bcook2016-10-021-3/+3
* MFC: Avoid falling back to a weak digest for (EC)DH when using SNI withlibressl-v2.3.8jsing2016-09-221-3/+10
* MFC: Avoid unbounded memory growth in libssl, which can be triggered by ajsing2016-09-221-9/+20
* bump version for 2.3.8bcook2016-09-221-3/+3
* bump for 2.3.7libressl-v2.3.7bcook2016-06-301-3/+3
* Fix several issues in the OCSP code that could result in the incorrectbeck2016-06-252-9/+33
* Set BN_FLG_CONSTTIME on the correct variable. beck committed wrong fix.libressl-v2.3.6tedu2016-06-061-2/+2
* Correct a problem that prevents the DSA signing algorithm from runningbeck2016-06-061-4/+6
* LibreSSL 2.3.6bcook2016-06-061-3/+3
* bump to 2.3.5libressl-v2.3.5bcook2016-05-291-3/+3
* Fix a short-read bug in the previous version of asn1_d2i_read_biobcook2016-05-291-26/+28
* this chunk was NOT supposed to be committed. spotted by jsg.tedu2016-05-041-2/+1
* prefer limits.h over sys/limits.hlibressl-v2.3.4bcook2016-05-031-2/+2
* bump to 2.3.4bcook2016-05-031-2/+2
* backport patch from openssl for multiple issues:tedu2016-05-038-31/+58
* This commit was manufactured by cvs2git to create branch 'OPENBSD_5_9'.cvs2svn2016-05-031-0/+209
* bump for LibreSSL 2.3.3libressl-v2.3.3bcook2016-03-121-3/+3
* This commit was manufactured by cvs2git to create branch 'OPENBSD_5_9'.cvs2svn2016-02-17194-57103/+0
* Therefor -> Therefore (where appropriate)tb2016-01-292-2/+2
* deprecate SSL_OP_SINGLE_DH_USElibressl-v2.3.2beck2016-01-274-74/+12
* Document that the ssl free() functions are NULL safe. OK mmcc@millert2015-12-306-12/+42
* More adress -> addressmmcc2015-12-242-2/+2
* remove NULL-checks before free()mmcc2015-12-233-19/+11
* assign pointer NULL rather than 0mmcc2015-12-231-2/+2
* assign pointer to NULL rather than 0mmcc2015-12-231-2/+2
* initialize a pointer to NULL rather than 0mmcc2015-12-221-2/+2
* initialize ext_len to 0.beck2015-12-141-2/+6
* initialize ok to 0beck2015-12-141-2/+2
* initialize md_len to 0 for readability to quell warnings.beck2015-12-141-3/+3
* decipher comment. ok bcook@mmcc2015-12-122-4/+4
* move initialization of buf up to quell warnings and make it obvious the err c...beck2015-12-121-4/+5
* prevent possibly use of uninitialized variablebeck2015-12-121-2/+2
* make the counter a size_t as well, which quells a warning on visual studio 2015beck2015-12-121-2/+3
* bump the major for libcrypto/ssl/tls for a CRYPTO_chacha_20 ABI changebcook2015-12-092-4/+4
* Change the counter argument for CRYPTO_chacha_20 to be 64-bits on all platforms.bcook2015-12-092-5/+6
* Remove SHA0 check, as we did in v1.21 of sha.h.bcook2015-12-071-2/+2
* Fix for OpenSSL CVE-2015-3195beck2015-12-041-3/+8
* Fix for OpenSSL CVE-2015-3194beck2015-12-031-2/+2
* fix references to lhash(3);jmc2015-11-152-14/+16
* mutli -> multimiod2015-11-141-1/+1
* Various *syncron* -> *synchron* typos.miod2015-11-141-1/+1
* update cross references after deleting the imaginary MLINKSschwarze2015-11-122-2/+2
* Convert the handful of manuals that had imaginary names,schwarze2015-11-126-1055/+0
* add missing functions to NAME, or otherwise correct the mlinkjmc2015-11-1120-43/+69
* Convert five more manuals from POD to mdoc.schwarze2015-11-115-458/+0
* Convert and enable CMS manuals.schwarze2015-11-1116-1234/+0
* SSL_CTX_sess_set_remove mlink should be SSL_CTX_sess_set_remove_cb;jmc2015-11-101-2/+2