summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Move build machinery for libcrypto from libssl/crypto to libcrypto, as wellmiod2014-04-1124-9144/+12
| | | | | | | | | as configuration files; split manpages and .pc files between libcrypto and libssl. No functional change, only there to make engineering easier, and libcrypto sources are still found in libssl/src/crypto at the moment. ok reyk@, also discussed with deraadt@ beck@ and the usual crypto suspects.
* oops, typo, spotted by Matthias Schelerderaadt2014-04-101-2/+2
|
* Piotr Sikora pointed me at a more refined diff for the buffer releasetedu2014-04-102-0/+4
| | | | | | issue. Apply that version. Maybe someday upstream will wake up and then we can have the same code. https://rt.openssl.org/Ticket/Display.html?id=2167&user=guest&pass=guest
* crank major; struct ssl_ctx_st changes; ok teduderaadt2014-04-102-2/+2
|
* Disable Segglemann's RFC520 hearbeat.deraadt2014-04-101-2/+2
| | | | | | | | | | | | I am completely blown away that the same IETF that cannot efficiently allocate needed protocol, service numbers, or other such things when they are needed, can so quickly and easily rubber stamp the addition of a 64K Covert Channel in a critical protocol. The organization should look at itself very carefully, find out how this this happened, and everyone who allowed this to happen on their watch should be evicted from the decision making process. IETF, I don't trust you. ok tedu markus
* disable buf freelists. we'll see what happens next.tedu2014-04-101-1/+2
| | | | ok deraadt
* don't release the read buffer if we're not done reading from it.tedu2014-04-102-4/+0
| | | | ok benno deraadt
* Remove CA certificates which are not listed in Mozilla's certdata.txt.sthen2014-04-091-1823/+0
| | | | | | Notably this removes CAcert who it turns out have strict requirements on redistribution (http://www.cacert.org/policy/RootDistributionLicense.php) which we don't meet.
* Use root CAs that are used by TeleSec (Deutsche Telekom AG):reyk2014-04-091-0/+313
| | | | | | | | | - Baltimore CyberTrust Root - Deutsche Telekom Root CA 2 - T-TeleSec GlobalRoot Class 2 - T-TeleSec GlobalRoot Class 3 ok sthen@
* cherrypick fix for CVE-2014-0160 "heartbleed" vulnerability fromdjm2014-04-074-26/+54
| | | | OpenSSL git; ok sthen@
* Retire hp300, mvme68k and mvme88k ports. These ports have no users, keepingmiod2014-03-181-273/+0
| | | | | | | this hardware alive is becoming increasingly difficult, and I should heed the message sent by the three disks which have died on me over the last few days. Noone sane will mourn these ports anyway. So long, and thanks for the fish.
* * Fix another instance of directly writing to the target with a utilityschwarze2014-03-181-4/+6
| | | | | | | that might fail. * Keep the build log clean. * Make sure syntax checks run again when doing: make clean; make ok espie@
* prevent failed command from generating bogus fileespie2014-03-181-2/+2
| | | | okay guenther@
* prepare manpages for new perl.espie2014-03-1818-40/+46
| | | | | | | Note that I missed two of these in the diff shown initially, thx to the atrocious Makefile rule... okay millert@, sthen@, basically
* SECURITY fixes backported from openssl-1.0.1f. ok mikeb@jca2014-02-2712-26/+82
| | | | | | | | | | | | CVE-2013-4353 NULL pointer dereference with crafted Next Protocol Negotiation record in TLS handshake. Upstream: 197e0ea CVE-2013-6449 Fix crash with crafted traffic from a TLS 1.2 client. Upstream: ca98926, 0294b2b CVE-2013-6450 Fix DTLS retransmission from previous session. Upstream: 3462896
* Install a bunch more of OpenSSL manpages. ok deraadt@jca2013-12-231-1/+49
|
* Reliability fix for SHA384 SSL/TLS ciphers on strict alignmentjca2013-12-191-1/+8
| | | | | | | | | architectures. ok miod@ djm@ Upstream patch: commit cdd1acd788020d2c525331da1712ada778f1373c Author: Andy Polyakov <appro@openssl.org> Date: Wed Dec 18 21:27:35 2013 +0100
* Switch time_t, ino_t, clock_t, and struct kevent's ident and dataguenther2013-08-133-3/+3
| | | | | | | | | | | | | | | | | | | | members to 64bit types. Assign new syscall numbers for (almost all) the syscalls that involve the affected types, including anything with time_t, timeval, itimerval, timespec, rusage, dirent, stat, or kevent arguments. Add a d_off member to struct dirent and replace getdirentries() with getdents(), thus immensely simplifying and accelerating telldir/seekdir. Build perl with -DBIG_TIME. Bump the major on every single base library: the compat bits included here are only good enough to make the transition; the T32 compat option will be burned as soon as we've reached the new world are are happy with the snapshots for all architectures. DANGER: ABI incompatibility. Updating to this kernel requires extra work or you won't be able to login: install a snapshot instead. Much assistance in fixing userland issues from deraadt@ and tedu@ and build assistance from todd@ and otto@
* Remove no longer needed vax CFLAGS workarounds.miod2013-07-131-13/+1
|
* VAX ELF userland bits. Consists mostly of register prefix additions.miod2013-07-051-151/+151
|
* Switch to using unhyphenated VIA padlock mnemonics. VIA abandoned thematthew2013-05-301-2/+2
| | | | | | | | hyphen in their official programming guide sometime between 2003 and 2005, and Clang's integrated assembler does not support hyphenated mnemonics. ok jsg, deraadt
* cherry pick bugfixes for http://www.openssl.org/news/secadv_20130205.txtmarkus2013-02-1425-515/+2348
| | | | | from the openssl git (changes between openssl 1.0.1c and 1.0.1d). ok djm@
* remove ACSS, crank libcrypto major; ok markus@ deraadt@djm2013-01-269-480/+4
|
* New CA root certificates, ok beck@.sthen2012-12-031-99/+1705
| | | | | | | | | | | | | | - additional cert's from GlobalSign. - additional cert's from VeriSign and replace existing ones with 'Signature Algorithm: md2WithRSAEncryption' with their currently distributed sha1WithRSAEncryption versions. - new CAs: AddTrust (root for most Comodo certificates also heavily used in academic networks), Comodo (most of their certs are rooted in AddTrust but TERENA use the Comodo AAA Certificate Services root for some things so add that separately), UserTrust Network/UTN (part of Comodo) and Starfield (part of Go Daddy).
* Additional CA root certificates: GeoTrust/Equifax, Go Daddy, StartCom, thawte.sthen2012-12-011-0/+1187
| | | | ok beck@ william@ todd@
* Regenerate the text information for all certificates with recent opensslsthen2012-11-301-439/+465
| | | | | | and include sha1 signatures for all certs (some were missing). No certificate changes, this is just for consistency. ok beck@
* Remove retired Thawte/Verisign certificates.sthen2012-11-301-499/+0
| | | | | | Remove intermediate GoDaddy certificate, this file should just contain roots. ok beck@ phessler@
* On amd64 OPENSSL_cpuid_setup and OPENSSL_ia32cap_P are now hidden so we don'tkettenis2012-10-314-9/+5
| | | | | | | | | | have to go through the PLT/GOT to get at them anymore. In fact going through the GOT now fails since we no longer have a GOT entry for OPENSSL_ia32cap_P. Fixes the problem spotted by jasper@ and sthen@. Based on a diff from mikeb@ who did most of the actual work of tracking down the issue. ok millert@, mikeb@
* Restore r1.10, lost during last update:miod2012-10-221-1/+1
| | | | Disable use of dladdr() on a.out arches, they do not provide it (yet);
* Makefile and header changes for OpenSSL-1.0.1cdjm2012-10-1320-139/+361
| | | | major cranks
* import files that CVS missed; sighdjm2012-10-135-0/+749
|
* resolve conflictsdjm2012-10-13309-4740/+23179
|
* This commit was generated by cvs2git to track changes on a CVS vendordjm2012-10-1328-554/+421
|\ | | | | branch.
| * import OpenSSL-1.0.1cdjm2012-10-13290-3994/+14133
| |
* | This commit was generated by cvs2git to track changes on a CVS vendordjm2012-10-13193-1354/+53656
|\ \ | | | | | | branch.
| * | import OpenSSL-1.0.1cdjm2012-10-13218-2281/+58716
| | |
* | | This commit was generated by cvs2git to track changes on a CVS vendordjm2012-10-139-18/+869
|\ \ \ | | | | | | | | branch.
| * | | import OpenSSL-1.0.1cdjm2012-10-1342-501/+5785
| | | |
* | | | When deciding whether we're PIC in a (generated) asm file, check for both PICpascal2012-08-211-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | and __PIC__ defines. Makes things easier for PIE. ok djm@
* | | | remove leftover NOLINT, WANTLINT, LINTFLAGS, LOBJ vars and lint targets.okan2012-08-022-4/+2
| | | | | | | | | | | | | | | | ok guenther@
* | | | Skip printing another SSLv2-only command in s_client's usage text.sthen2012-07-121-0/+2
| | | | | | | | | | | | | | | | jmc@ noticed this in the manpage while updating it, but it applies here too.
* | | | Disable SSLv2 in OpenSSL. No objections from djm.sthen2012-07-1119-7/+94
| | | | | | | | | | | | | | | | Brad, jasper and naddy helped with test builds, fixing ports, etc.
* | | | cherrypick fix for CVE-2012-2110: libcrypto ASN.1 parsing heap overflowdjm2012-04-193-14/+61
| | | | | | | | | | | | | | | | ok miod@ deraadt@
* | | | OpenSSL 1.0.0f: crank minordjm2012-01-053-3/+3
| | | |
* | | | OpenSSL 1.0.0f: mergedjm2012-01-0551-186/+526
| | | |
* | | | This commit was generated by cvs2git to track changes on a CVS vendordjm2012-01-052-8/+24
|\| | | | | | | | | | | branch.
| * | | OpenSSL 1.0.0f: import upstream sourcedjm2012-01-0516-28/+90
| | | |
* | | | This commit was generated by cvs2git to track changes on a CVS vendordjm2012-01-051-1/+1
|\ \ \ \ | | |_|/ | |/| | branch.
| * | | OpenSSL 1.0.0f: import upstream sourcedjm2012-01-0534-115/+358
| | | |
* | | | This commit was generated by cvs2git to track changes on a CVS vendordjm2012-01-057-17/+114
|\ \ \ \ | | |_|/ | |/| | branch.