index
:
openbsd
OPENBSD_2_0
OPENBSD_2_1
OPENBSD_2_2
OPENBSD_2_3
OPENBSD_2_4
OPENBSD_2_5
OPENBSD_2_6
OPENBSD_2_7
OPENBSD_2_8
OPENBSD_2_9
OPENBSD_3_0
OPENBSD_3_1
OPENBSD_3_2
OPENBSD_3_3
OPENBSD_3_4
OPENBSD_3_5
OPENBSD_3_6
OPENBSD_3_7
OPENBSD_3_8
OPENBSD_3_9
OPENBSD_4_0
OPENBSD_4_1
OPENBSD_4_2
OPENBSD_4_3
OPENBSD_4_4
OPENBSD_4_5
OPENBSD_4_6
OPENBSD_4_7
OPENBSD_4_8
OPENBSD_4_9
OPENBSD_5_0
OPENBSD_5_1
OPENBSD_5_2
OPENBSD_5_3
OPENBSD_5_4
OPENBSD_5_5
OPENBSD_5_6
OPENBSD_5_7
OPENBSD_5_8
OPENBSD_5_9
OPENBSD_6_0
OPENBSD_6_1
OPENBSD_6_2
OPENBSD_6_3
OPENBSD_6_4
OPENBSD_6_5
OPENBSD_6_6
OPENBSD_6_7
OPENBSD_6_8
OPENBSD_6_9
OPENBSD_7_0
OPENBSD_7_1
OPENBSD_7_2
OPENBSD_7_3
OPENBSD_7_4
OPENBSD_7_5
OPENBSD_7_6
master
A mirror of https://github.com/libressl/openbsd.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
src
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
prevent a crash with openssl asn1parse -genstr FORMAT
jsg
2015-02-12
2
-2
/
+10
*
bump minor for TLS_PROTOCOLS_ALL. OK jsing@
reyk
2015-02-12
1
-1
/
+1
*
Add a tls_config_parse_protocols() function that allows a protocols string
jsing
2015-02-12
2
-2
/
+63
*
Fix handling of "legacy" mode for tls_config_set_dheparams().
jsing
2015-02-12
1
-2
/
+2
*
qsort() compare functions MUST use memcmp() instead of bcmp() to have
guenther
2015-02-12
1
-2
/
+4
*
Change TLS_PROTOCOLS_DEFAULT to be TLSv1.2 only. Add a TLS_PROTOCOLS_ALL
jsing
2015-02-12
1
-2
/
+4
*
If you do not support POSIX I/O then you're not tall enough to ride...
jsing
2015-02-12
8
-46
/
+8
*
unifdef -m -UOPENSSL_NO_NEXTPROTONEG - NPN is being replaced with ALPN,
jsing
2015-02-12
8
-48
/
+8
*
swap limits.h for sys/limits.h
bcook
2015-02-12
1
-1
/
+1
*
use a width specifier for lists, and Sq rather than Dq for single letters
jmc
2015-02-11
1
-3
/
+3
*
Provide a tls_connect_servername() function that has the same behaviour
jsing
2015-02-11
4
-6
/
+27
*
Be consistent with naming - only use "host" and "hostname" when referring
jsing
2015-02-11
6
-60
/
+61
*
Do not rely upon malloc(0) not returning NULL. Not all malloc implementations
miod
2015-02-11
1
-6
/
+10
*
Guenther has plans for OPENSSL_NO_CMS, so revert this for the moment.
beck
2015-02-11
18
-24
/
+246
*
the possible algos for pref should be documented here
tedu
2015-02-11
1
-4
/
+11
*
Remove initialisers with default values from the ASN1 data structures.
jsing
2015-02-11
34
-376
/
+46
*
get rid of OPENSSL_NO_CMS code we do not use.
beck
2015-02-11
18
-246
/
+24
*
get rid of OPENSSL_NO_COMP code we don't use.
beck
2015-02-11
4
-22
/
+4
*
Expand most of the ASN1_SEQUENCE* and associated macros, making the data
jsing
2015-02-11
34
-292
/
+1900
*
Enable building with -DOPENSSL_NO_DEPRECATED.
doug
2015-02-11
61
-61
/
+142
*
More unifdef OPENSSL_NO_RFC3779 that got missed last time around.
jsing
2015-02-11
4
-32
/
+4
*
Introduce an openssl(1) certhash command.
jsing
2015-02-10
3
-9
/
+685
*
unifdef OPENSSL_NO_RFC3779 - this is currently disabled and unlikely to
jsing
2015-02-10
13
-5410
/
+9
*
Remove old interesting but not useful content.
jsing
2015-02-10
2
-556
/
+0
*
unifdef OPENSSL_NO_RC5
jsing
2015-02-10
6
-58
/
+6
*
Remove RC5 code - this is not currently enabled and is not likely to ever
jsing
2015-02-10
17
-2166
/
+2
*
Remove more IMPLEMENT_STACK_OF noops that have been hiding for the last
jsing
2015-02-10
26
-78
/
+28
*
Remove crypto/store - part of which is "currently highly experimental".
jsing
2015-02-10
15
-7016
/
+1
*
EVP_BytesToKey(): return through the error path (which cleans things up)
miod
2015-02-10
2
-6
/
+6
*
Replace assert() and OPENSSL_assert() calls with proper error return paths.
miod
2015-02-10
26
-102
/
+282
*
Remove default value initialisers for ASN1_ITEM. Minor changes to generated
jsing
2015-02-10
2
-186
/
+22
*
Remove unnecessary include of assert.h
miod
2015-02-10
10
-20
/
+10
*
Remove assert() or OPENSSL_assert() of pointers being non-NULL. The policy
miod
2015-02-10
32
-170
/
+34
*
Expand IMPLEMENT_ASN1_TYPE macros - no change to generated assembly.
jsing
2015-02-10
2
-46
/
+442
*
The IMPLEMENT_STACK_OF and IMPLEMENT_ASN1_SET_OF macros were turned into
jsing
2015-02-10
20
-94
/
+20
*
Place the IMPLEMENT_ASN1_.*FUNCTION.* macros under an #ifndef
jsing
2015-02-10
2
-2
/
+8
*
Expand IMPLEMENT_ASN1_NDEF_FUNCTION and IMPLEMENT_ASN1_PRINT_FUNCTION
jsing
2015-02-10
2
-6
/
+28
*
Expand IMPLEMENT_ASN1_ENCODE_FUNCTIONS_fname macros that got missed.
jsing
2015-02-10
4
-8
/
+56
*
Expand the IMPLEMENT_ASN1_ALLOC_FUNCTIONS macro so that the code is visible
jsing
2015-02-10
8
-22
/
+176
*
Manually expand ASN1_ITEM_rptr macros that should have been expanded with
jsing
2015-02-10
20
-58
/
+58
*
Expand the -IMPLEMENT_ASN1_ENCODE_FUNCTIONS_(const_)?fname macros so that
jsing
2015-02-10
8
-26
/
+242
*
Expand the IMPLEMENT_ASN1_DUP_FUNCTION macro so that the code is visible
jsing
2015-02-10
20
-58
/
+248
*
Expand the IMPLEMENT_ASN1_FUNCTIONS_{const,fname,name} macros so that the
jsing
2015-02-10
10
-46
/
+910
*
Expand the IMPLEMENT_ASN1_FUNCTIONS macro so that the code is visible and
jsing
2015-02-09
12
-102
/
+2310
*
Expand the IMPLEMENT_ASN1_FUNCTIONS macro so that the code is visible and
jsing
2015-02-09
24
-86
/
+1574
*
BN_CTX_get() can fail - consistently check its return value.
jsing
2015-02-09
56
-546
/
+716
*
Expand the IMPLEMENT_ASN1_FUNCTIONS macro so that the code is visible and
jsing
2015-02-09
38
-120
/
+2088
*
Jettison SCTP support in BIO dgram.
jsing
2015-02-09
4
-2104
/
+4
*
Jettison DTLS over SCTP.
jsing
2015-02-09
14
-818
/
+14
*
When parsing the host in tls_connect(), first check if it is a numeric
reyk
2015-02-09
1
-29
/
+49
[next]