index
:
openbsd
OPENBSD_2_0
OPENBSD_2_1
OPENBSD_2_2
OPENBSD_2_3
OPENBSD_2_4
OPENBSD_2_5
OPENBSD_2_6
OPENBSD_2_7
OPENBSD_2_8
OPENBSD_2_9
OPENBSD_3_0
OPENBSD_3_1
OPENBSD_3_2
OPENBSD_3_3
OPENBSD_3_4
OPENBSD_3_5
OPENBSD_3_6
OPENBSD_3_7
OPENBSD_3_8
OPENBSD_3_9
OPENBSD_4_0
OPENBSD_4_1
OPENBSD_4_2
OPENBSD_4_3
OPENBSD_4_4
OPENBSD_4_5
OPENBSD_4_6
OPENBSD_4_7
OPENBSD_4_8
OPENBSD_4_9
OPENBSD_5_0
OPENBSD_5_1
OPENBSD_5_2
OPENBSD_5_3
OPENBSD_5_4
OPENBSD_5_5
OPENBSD_5_6
OPENBSD_5_7
OPENBSD_5_8
OPENBSD_5_9
OPENBSD_6_0
OPENBSD_6_1
OPENBSD_6_2
OPENBSD_6_3
OPENBSD_6_4
OPENBSD_6_5
OPENBSD_6_6
OPENBSD_6_7
OPENBSD_6_8
OPENBSD_6_9
OPENBSD_7_0
OPENBSD_7_1
OPENBSD_7_2
OPENBSD_7_3
OPENBSD_7_4
OPENBSD_7_5
OPENBSD_7_6
master
A mirror of https://github.com/libressl/openbsd.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
src
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
Eliminate the weird condition in the BN_swap_ct() API that at most one bit
tb
2018-07-13
1
-3
/
+3
*
Sync comment
kn
2018-07-11
1
-3
/
+5
*
Document behavior change of EC_POINTs_mul(3) from EC constant time changes.
tb
2018-07-11
1
-4
/
+22
*
Turn yesterday's optimistic ! in an XXX comment into a more cautious ?
tb
2018-07-11
1
-2
/
+2
*
Update EC regression tests.
tb
2018-07-11
1
-160
/
+26
*
Indent labels by a space so they don't obliterate function names in diffs.
tb
2018-07-10
19
-91
/
+93
*
ECC constant time scalar multiplication support. First step in overhauling
tb
2018-07-10
5
-46
/
+337
*
Provide BN_swap_ct(), a constant time function that conditionally swaps
tb
2018-07-10
2
-2
/
+53
*
Factor out a bit of ugly code that truncates the digest to the order_bits
tb
2018-07-10
1
-32
/
+32
*
$OpenBSD$
tb
2018-07-10
2
-1
/
+2
*
Now that all *_free() functions are NULL safe, we can generate the
tb
2018-07-10
5
-239
/
+123
*
+addsub
tb
2018-07-10
1
-1
/
+2
*
Add simple regression tests for BN_{,u}{add,sub}(3). With input from jca
tb
2018-07-10
2
-0
/
+248
*
Move a detail on tls_connect(3) to its documentation and be a bit more
tb
2018-07-09
1
-5
/
+7
*
wording tweak for tls_init() from jsing
tb
2018-07-09
1
-4
/
+4
*
sync with const changes in x509.h r1.68.
tb
2018-07-09
1
-4
/
+4
*
sync with const changes in evp.h r1.64.
tb
2018-07-09
1
-3
/
+3
*
sync with const changes in bio.h r1.44.
tb
2018-07-09
1
-3
/
+3
*
sync with const changes in bio.h r1.45.
tb
2018-07-09
1
-10
/
+10
*
import the relevant parts of a new ASN1_INTEGER_get(3) manual page
schwarze
2018-07-08
2
-1
/
+240
*
Simplify and shorten the description of tls_init(3),
schwarze
2018-07-08
1
-4
/
+4
*
This code is already painful enough to look at. Putting the braces at the
tb
2018-06-16
1
-74
/
+64
*
Tiny tweak to the blinding comment.
tb
2018-06-16
1
-2
/
+4
*
Basic cleanup. Handle the possibly NULL ctx_in in ecdsa_sign_setup() with
tb
2018-06-15
1
-67
/
+62
*
Clean up some whitespace and polish a few comments. Reduces noise in
tb
2018-06-15
1
-24
/
+21
*
Use a blinding value when generating an ECDSA signature, in order to
tb
2018-06-14
1
-14
/
+65
*
Use a blinding value when generating a DSA signature, in order to reduce
jsing
2018-06-14
1
-9
/
+39
*
Clarify the digest truncation comment in DSA signature generation.
jsing
2018-06-14
1
-3
/
+4
*
Pull up the code that converts the digest to a BIGNUM - this only needs
jsing
2018-06-14
1
-10
/
+10
*
Fix a potential leak/incorrect return value in DSA signature generation.
jsing
2018-06-14
1
-4
/
+6
*
Call DSA_SIG_new() instead of hand rolling the same.
jsing
2018-06-14
1
-5
/
+2
*
DSA_SIG_new() amounts to a single calloc() call.
jsing
2018-06-14
1
-10
/
+3
*
style(9), comments and whitespace.
jsing
2018-06-13
1
-30
/
+32
*
Avoid a timing side-channel leak when generating DSA and ECDSA signatures.
jsing
2018-06-13
2
-7
/
+4
*
zap stray tab
sthen
2018-06-12
1
-2
/
+2
*
Reject excessively large primes in DH key generation. Problem reported
sthen
2018-06-12
1
-1
/
+6
*
fix odd whitespace
tb
2018-06-10
1
-3
/
+3
*
Remove a handrolled GOST_le2bn().
jsing
2018-06-10
1
-8
/
+4
*
Now that all of the server-side client key exchange processing functions
jsing
2018-06-10
1
-53
/
+40
*
Allocate a dedicated buffer for use when deriving a shared key during
jsing
2018-06-03
1
-10
/
+18
*
Check the return value from DH_size() in ssl3_send_client_kex_dhe().
jsing
2018-06-03
1
-4
/
+6
*
Convert ssl3_get_client_kex_ecdhe_ecp() to CBS.
jsing
2018-06-02
1
-44
/
+42
*
Update regress for DES cipher suite removal.
jsing
2018-06-02
2
-49
/
+41
*
Remove the three remaining single DES cipher suites.
jsing
2018-06-02
1
-49
/
+1
*
Zero the client random so that it is easier to spot unintended differences.
jsing
2018-06-02
1
-0
/
+1
*
Add a const qualifier to the argument of UI_method_get_closer(),
tb
2018-06-02
2
-14
/
+14
*
Add const to the argument of the following callback getters:
tb
2018-06-02
2
-18
/
+18
*
Add const to both arguments of X509_certificate_type() and clean up
tb
2018-05-30
2
-17
/
+10
*
Add a const qualifier to the argument of EVP_PKEY_size().
tb
2018-05-30
2
-4
/
+4
*
Add a const qualifier to the `name' argument of
tb
2018-05-30
2
-6
/
+8
[next]