summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
* Bump for LibreSSL 2.4.5libressl-v2.4.5bcook2017-01-071-3/+3
* MFC: Avoid a side-channel cache-timing attack that can leak the ECDSAjsing2017-01-051-1/+3
* MFC: In ssl3_read_bytes(), do not process more than three consecutive TLSlibressl-v2.4.4jsing2016-11-031-4/+24
* Check for and handle failure of HMAC_{Update,Final} or EVP_DecryptUpdate()bcook2016-10-031-5/+11
* Detect zero-length encrypted session data early, instead of when malloc(0)bcook2016-10-031-2/+2
* Check for packet with truncated DTLS cookie.bcook2016-10-031-12/+17
* Improve ticket validity checking when tlsext_ticket_key_cb() callbackbcook2016-10-031-4/+25
* In X509_cmp_time(), pass asn1_time_parse() the tag of the field beingbcook2016-10-031-2/+3
* bump to 2.4.4bcook2016-10-021-3/+3
* MFC: Avoid falling back to a weak digest for (EC)DH when using SNI withlibressl-v2.4.3jsing2016-09-221-3/+10
* MFC: Avoid unbounded memory growth in libssl, which can be triggered by ajsing2016-09-221-9/+20
* bump version for 2.4.3bcook2016-09-221-3/+3
* back out calls to EVP_CIPHER_CTX_cleanup() in EVP_Encrypt/DecryptFinalbcook2016-09-221-3/+1
* This commit was manufactured by cvs2git to create branch 'OPENBSD_6_0'.libressl-v2.4.2cvs2svn2016-07-231187-380610/+0
* don't mix code and decls, ok tedu@bcook2016-07-182-4/+6
* use memset to initialize the unionbcook2016-07-172-4/+8
* remove unused OPENSSL_NO_OBJECT casebcook2016-07-172-28/+2
* Initialize buffers before use, noted by Kinichiro Inoguchi.bcook2016-07-172-14/+14
* Clean up OCSP_check_validity() a bit more.beck2016-07-162-22/+20
* Limit the support of the "backward compatible" ssl2 handshake to only bebeck2016-07-162-2/+18
* Split the existing TLS cipher suite groups into four:jsing2016-07-133-11/+22
* zero the read buffer after copying data to user so it doesn't linger.tedu2016-07-102-2/+4
* Revert previous - it introduces problems with a common privsep use case.jsing2016-07-073-72/+35
* call BN_init on temporaries to avoid use-before-set warningsbcook2016-07-076-6/+28
* J/j is a three valued option, document and fix code to actuall support thatotto2016-07-061-3/+5
* Check that the given ciphers string is syntactically valid and results injsing2016-07-061-1/+17
* Always load CA, key and certificate files at the time the configurationjsing2016-07-063-35/+72
* Correctly handle an EOF that occurs prior to the TLS handshake completing.jsing2016-07-061-3/+6
* remove unneeded duplicate call - spotted by jsing@beck2016-07-052-6/+2
* On systems where we do not have BN_ULLONG defined (most 64-bit systems),bcook2016-07-057-22/+87
* Add several fixes from OpenSSL to make OCSP work with intermediatebeck2016-07-052-20/+48
* Tighten behavior of _rs_allocate failure for portable arc4random implementati...bcook2016-06-3014-14/+28
* Tighten behavior of _rs_allocate on Windows.bcook2016-06-302-8/+14
* bump to 2.4.2bcook2016-06-302-6/+6
* adapt S option: add C, rm F (not relevant with 0 cache and disablesotto2016-06-301-3/+3
* Remove flags for disabling constant-time operations.bcook2016-06-3016-354/+174
* Back out previous; otto saw a potential race that could lead to atb2016-06-281-32/+23
* defer munmap to after unlocking malloc. this can (unfortunately) be antedu2016-06-271-23/+32
* increase the minimum for auto rounds to 6. that was the previous low boundtedu2016-06-261-2/+2
* Fix from kinichiro.inoguchi@gmail.com to ensure that OCSP usesbeck2016-06-252-4/+4
* Fix the ocsp code to actually check for errors when comparing time valuesbeck2016-06-252-14/+62
* Disable DSA_FLAG_NO_EXP_CONSTTIME, always enable constant-time behavior.bcook2016-06-216-176/+92
* Set BN_FLG_CONSTTIME on the correct variable. beck committed wrong fix.libressl-v2.4.1tedu2016-06-062-4/+4
* Correct a problem that prevents the DSA signing algorithm from runningbeck2016-06-062-8/+12
* LibreSSL 2.4.1bcook2016-06-062-6/+6
* Fix typo; the period should be outside the parens. From Michael McConvillemillert2016-06-021-3/+3
* deprecate internal use of EVP_[Cipher|Encrypt|Decrypt]_Final.beck2016-05-308-24/+40
* The icdb magic number doesn't need to be visible to static linksguenther2016-05-301-2/+2
* Remove dead support for changing BDB hash algorithm and cache of alternativesguenther2016-05-291-5/+4
* Prefer AF_* over PF_* and 'address family' over 'protocol family'guenther2016-05-291-9/+9