index
:
openbsd
OPENBSD_2_0
OPENBSD_2_1
OPENBSD_2_2
OPENBSD_2_3
OPENBSD_2_4
OPENBSD_2_5
OPENBSD_2_6
OPENBSD_2_7
OPENBSD_2_8
OPENBSD_2_9
OPENBSD_3_0
OPENBSD_3_1
OPENBSD_3_2
OPENBSD_3_3
OPENBSD_3_4
OPENBSD_3_5
OPENBSD_3_6
OPENBSD_3_7
OPENBSD_3_8
OPENBSD_3_9
OPENBSD_4_0
OPENBSD_4_1
OPENBSD_4_2
OPENBSD_4_3
OPENBSD_4_4
OPENBSD_4_5
OPENBSD_4_6
OPENBSD_4_7
OPENBSD_4_8
OPENBSD_4_9
OPENBSD_5_0
OPENBSD_5_1
OPENBSD_5_2
OPENBSD_5_3
OPENBSD_5_4
OPENBSD_5_5
OPENBSD_5_6
OPENBSD_5_7
OPENBSD_5_8
OPENBSD_5_9
OPENBSD_6_0
OPENBSD_6_1
OPENBSD_6_2
OPENBSD_6_3
OPENBSD_6_4
OPENBSD_6_5
OPENBSD_6_6
OPENBSD_6_7
OPENBSD_6_8
OPENBSD_6_9
OPENBSD_7_0
OPENBSD_7_1
OPENBSD_7_2
OPENBSD_7_3
OPENBSD_7_4
OPENBSD_7_5
OPENBSD_7_6
OPENBSD_7_7
OPENBSD_7_8
master
A mirror of https://github.com/libressl/openbsd.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
src
/
lib
/
libssl
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
Bump for LibreSSL 2.3.10
libressl-v2.3.10
OPENBSD_5_9
bcook
2017-01-07
1
-3
/
+3
*
MFC: Avoid a side-channel cache-timing attack that can leak the ECDSA
jsing
2017-01-05
1
-1
/
+3
*
MFC: In ssl3_read_bytes(), do not process more than three consecutive TLS
libressl-v2.3.9
jsing
2016-11-03
1
-4
/
+24
*
bump to 2.3.9
bcook
2016-10-02
1
-3
/
+3
*
MFC: Avoid falling back to a weak digest for (EC)DH when using SNI with
libressl-v2.3.8
jsing
2016-09-22
1
-3
/
+10
*
MFC: Avoid unbounded memory growth in libssl, which can be triggered by a
jsing
2016-09-22
1
-9
/
+20
*
bump version for 2.3.8
bcook
2016-09-22
1
-3
/
+3
*
bump for 2.3.7
libressl-v2.3.7
bcook
2016-06-30
1
-3
/
+3
*
Fix several issues in the OCSP code that could result in the incorrect
beck
2016-06-25
2
-9
/
+33
*
Set BN_FLG_CONSTTIME on the correct variable. beck committed wrong fix.
libressl-v2.3.6
tedu
2016-06-06
1
-2
/
+2
*
Correct a problem that prevents the DSA signing algorithm from running
beck
2016-06-06
1
-4
/
+6
*
LibreSSL 2.3.6
bcook
2016-06-06
1
-3
/
+3
*
bump to 2.3.5
libressl-v2.3.5
bcook
2016-05-29
1
-3
/
+3
*
Fix a short-read bug in the previous version of asn1_d2i_read_bio
bcook
2016-05-29
1
-26
/
+28
*
this chunk was NOT supposed to be committed. spotted by jsg.
tedu
2016-05-04
1
-2
/
+1
*
prefer limits.h over sys/limits.h
libressl-v2.3.4
bcook
2016-05-03
1
-2
/
+2
*
bump to 2.3.4
bcook
2016-05-03
1
-2
/
+2
*
backport patch from openssl for multiple issues:
tedu
2016-05-03
8
-31
/
+58
*
This commit was manufactured by cvs2git to create branch 'OPENBSD_5_9'.
cvs2svn
2016-05-03
1
-0
/
+209
*
bump for LibreSSL 2.3.3
libressl-v2.3.3
bcook
2016-03-12
1
-3
/
+3
*
This commit was manufactured by cvs2git to create branch 'OPENBSD_5_9'.
cvs2svn
2016-02-17
194
-57103
/
+0
*
Therefor -> Therefore (where appropriate)
tb
2016-01-29
2
-2
/
+2
*
deprecate SSL_OP_SINGLE_DH_USE
libressl-v2.3.2
beck
2016-01-27
4
-74
/
+12
*
Document that the ssl free() functions are NULL safe. OK mmcc@
millert
2015-12-30
6
-12
/
+42
*
More adress -> address
mmcc
2015-12-24
2
-2
/
+2
*
remove NULL-checks before free()
mmcc
2015-12-23
3
-19
/
+11
*
assign pointer NULL rather than 0
mmcc
2015-12-23
1
-2
/
+2
*
assign pointer to NULL rather than 0
mmcc
2015-12-23
1
-2
/
+2
*
initialize a pointer to NULL rather than 0
mmcc
2015-12-22
1
-2
/
+2
*
initialize ext_len to 0.
beck
2015-12-14
1
-2
/
+6
*
initialize ok to 0
beck
2015-12-14
1
-2
/
+2
*
initialize md_len to 0 for readability to quell warnings.
beck
2015-12-14
1
-3
/
+3
*
decipher comment. ok bcook@
mmcc
2015-12-12
2
-4
/
+4
*
move initialization of buf up to quell warnings and make it obvious the err c...
beck
2015-12-12
1
-4
/
+5
*
prevent possibly use of uninitialized variable
beck
2015-12-12
1
-2
/
+2
*
make the counter a size_t as well, which quells a warning on visual studio 2015
beck
2015-12-12
1
-2
/
+3
*
bump the major for libcrypto/ssl/tls for a CRYPTO_chacha_20 ABI change
bcook
2015-12-09
2
-4
/
+4
*
Change the counter argument for CRYPTO_chacha_20 to be 64-bits on all platforms.
bcook
2015-12-09
2
-5
/
+6
*
Remove SHA0 check, as we did in v1.21 of sha.h.
bcook
2015-12-07
1
-2
/
+2
*
Fix for OpenSSL CVE-2015-3195
beck
2015-12-04
1
-3
/
+8
*
Fix for OpenSSL CVE-2015-3194
beck
2015-12-03
1
-2
/
+2
*
fix references to lhash(3);
jmc
2015-11-15
2
-14
/
+16
*
mutli -> multi
miod
2015-11-14
1
-1
/
+1
*
Various *syncron* -> *synchron* typos.
miod
2015-11-14
1
-1
/
+1
*
update cross references after deleting the imaginary MLINKS
schwarze
2015-11-12
2
-2
/
+2
*
Convert the handful of manuals that had imaginary names,
schwarze
2015-11-12
6
-1055
/
+0
*
add missing functions to NAME, or otherwise correct the mlink
jmc
2015-11-11
20
-43
/
+69
*
Convert five more manuals from POD to mdoc.
schwarze
2015-11-11
5
-458
/
+0
*
Convert and enable CMS manuals.
schwarze
2015-11-11
16
-1234
/
+0
*
SSL_CTX_sess_set_remove mlink should be SSL_CTX_sess_set_remove_cb;
jmc
2015-11-10
1
-2
/
+2
[next]