summaryrefslogtreecommitdiffstats
path: root/crypto/openssl/crypto
Commit message (Collapse)AuthorAgeFilesLines
* Merge OpenSSL 1.0.2f.jkim2016-01-2896-153/+370
|\ | | | | | | Relnotes: yes
* \ Merge OpenSSL 1.0.2e.jkim2015-12-03118-611/+1098
|\ \ | |/
* | Merge OpenSSL 1.0.2d.jkim2015-10-30299-8500/+77947
|\ \ | |/
* | Merge OpenSSL 1.0.1p.jkim2015-07-0911-201/+420
|\ \ | |/
* | Merge OpenSSL 1.0.1o.jkim2015-06-124-17/+16
| |
* | Merge OpenSSL 1.0.1n.jkim2015-06-11131-268/+797
| |
* | Merge OpenSSL 1.0.1m.jkim2015-03-20804-170246/+173960
|\ \ | |/
* | Merge OpenSSL 1.0.1l.jkim2015-01-165-13/+12
| | | | | | | | | | MFC after: 1 week Relnotes: yes
* | MFV: r276862jkim2015-01-091-1/+1
| | | | | | | | Fix build.
* | Merge OpenSSL 1.0.1k.jkim2015-01-0846-2888/+616
|\ \ | |/
* | Merge OpenSSL 1.0.1j.jkim2014-10-1537-205/+981
|\ \ | |/
* | Merge OpenSSL 1.0.1i.jkim2014-08-0773-4763/+2063
|\ \ | |/
* | Merge OpenSSL 1.0.1h.jkim2014-06-0922-39/+81
|\ \ | |/ | | | | Approved by: so (delphij)
* | Merge OpenSSL 1.0.1g.jkim2014-04-0813-17/+110
| | | | | | | | Approved by: benl (maintainer)
* | Fix NFS deadlock vulnerability. [SA-14:05]delphij2014-04-083-11/+79
| | | | | | | | | | Fix "Heartbleed" vulnerability and ECDSA Cache Side-channel Attack in OpenSSL. [SA-14:06]
* | Merge OpenSSL 1.0.1f.jkim2014-01-2255-613/+847
| | | | | | | | Approved by: so (delphij), benl (silence)
* | Merge OpenSSL 1.0.1e.jkim2013-02-13103-374/+995
|\ \ | |/ | | | | Approved by: secteam (simon), benl (silence)
* | Clean some 'svn:executable' properties in the tree.pfg2013-01-268-0/+0
| | | | | | | | | | Submitted by: Christoph Mallon MFC after: 3 days
* | Indicate that we are using OpenSSL with some local modifications.delphij2013-01-021-1/+1
| | | | | | | | X-MFC after: with r244974
* | MFV r244973:delphij2013-01-021-17/+8
| | | | | | | | | | | | | | | | Integrate OpenSSL changeset 22950 (appro): bn_word.c: fix overflow bug in BN_add_word. MFC after: 2 weeks
* | Clean up hardcoded ar(1) flags in the tree to use the global ARFLAGS ineadler2012-12-061-1/+2
| | | | | | | | | | | | | | | | | | | | | | | | share/mk/sys.mk instead. This is part of a medium term project to permit deterministic builds of FreeBSD. Submitted by: Erik Cederstrand <erik@cederstrand.dk> Reviewed by: imp, toolchain@ Approved by: cperciva MFC after: 2 weeks
* | Allow OpenSSL to use arc4random(3) on FreeBSD. arc4random(3) was modifiedpjd2012-11-301-3/+3
| | | | | | | | | | | | | | | | | | some time ago to use sysctl instead of /dev/random to get random data, so is now much better choice, especially for sandboxed processes that have no direct access to /dev/random. Approved by: benl MFC after: 2 weeks
* | openssl: change SHLIB_VERSION_NUMBER to reflect the realityavg2012-09-111-1/+1
| | | | | | | | | | | | | | | | Note: I timed out waiting for an exp-run for this change but I survived having it locally for quite a long time. MFC after: 1 month X-MFC note: SHLIB_MAJOR is 6 in stable/8 and stable/9
* | Merge OpenSSL 1.0.1c.jkim2012-07-12737-31481/+127021
|\ \ | |/ | | | | Approved by: benl (maintainer)
* | Merge OpenSSL 0.9.8x.jkim2012-06-2740-177/+531
| | | | | | | | | | | | Reviewed by: stas Approved by: benl (maintainer) MFC after: 3 days
* | Update the previous openssl fix. [12:01]bz2012-05-301-1/+1
| | | | | | | | | | | | | | | | Fix a bug in crypt(3) ignoring characters of a passphrase. [12:02] Security: FreeBSD-SA-12:01.openssl (revised) Security: FreeBSD-SA-12:02.crypt Approved by: so (bz, simon)
* | Fix multiple OpenSSL vulnerabilities.bz2012-05-036-39/+134
| | | | | | | | | | | | | | Security: CVE-2011-4576, CVE-2011-4619, CVE-2011-4109 Security: CVE-2012-0884, CVE-2012-2110 Security: FreeBSD-SA-12:01.openssl Approved by: so (bz,simon)
* | Merge OpenSSL 0.9.8q into head.simon2010-12-037-10/+44
|\ \ | |/ | | | | | | | | Security: CVE-2010-4180 Security: http://www.openssl.org/news/secadv_20101202.txt MFC after: 3 days
* | Merge OpenSSL 0.9.8p into head.simon2010-11-2250-187/+276
| | | | | | | | | | Security: CVE-2010-3864 Security: http://www.openssl.org/news/secadv_20101116.txt
* | Bring in OpenSSL checkin 19821:rpaulo2010-09-212-6/+13
| | | | | | | | | | | | | | | | | | Make inline assembler clang-friendly [from HEAD]. openssl/crypto/md32_common.h 1.45.2.1 -> 1.45.2.2 openssl/crypto/rc5/rc5_locl.h 1.8 -> 1.8.8.1 Approved by: simon
* | Merge OpenSSL 0.9.8n into head.simon2010-04-0114-23/+51
| | | | | | | | | | | | | | | | | | | | | | This fixes CVE-2010-0740 which only affected -CURRENT (OpenSSL 0.9.8m) but not -STABLE branches. I have not yet been able to find out if CVE-2010-0433 impacts FreeBSD. This will be investigated further. Security: CVE-2010-0433, CVE-2010-0740 Security: http://www.openssl.org/news/secadv_20100324.txt
* | Merge OpenSSL 0.9.8m into head.simon2010-03-13115-16068/+1265
|\ \ | |/ | | | | | | | | | | | | | | | | | | This also "reverts" some FreeBSD local changes so we should now be back to using entirely stock OpenSSL. The local changes were simple $FreeBSD$ lines additions, which were required in the CVS days, and the patch for FreeBSD-SA-09:15.ssl which has been superseded with OpenSSL 0.9.8m's RFC5746 'TLS renegotiation extension' support. MFC after: 3 weeks
* | Merge DTLS fixes from vendor-crypto/openssl/dist:simon2009-08-232-0/+15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | - Fix memory consumption bug with "future epoch" DTLS records. - Fix fragment handling memory leak. - Do not access freed data structure. - Fix DTLS fragment bug - out-of-sequence message handling which could result in NULL pointer dereference in dtls1_process_out_of_seq_message(). Note that this will not get FreeBSD Security Advisory as DTLS is experimental in OpenSSL. MFC after: 1 week Security: CVE-2009-1377 CVE-2009-1378 CVE-2009-1379 CVE-2009-1387
* | Merge OpenSSL 0.9.8k into head.simon2009-06-14476-10102/+43336
|\ \ | |/ | | | | Approved by: re
| * Flatten OpenSSL vendor tree.simon2008-08-23968-271131/+0
| |
* | Don't leak information via uninitialized space in db(3) records. [09:07]cperciva2009-04-223-0/+16
| | | | | | | | | | | | | | | | | | | | | | Sanity-check string lengths in order to stop OpenSSL crashing when printing corrupt BMPString or UniversalString objects. [09:08] Security: FreeBSD-SA-09:07.libc Security: FreeBSD-SA-09:08.openssl Security: CVE-2009-0590 Approved by: re (kensmith) Approved by: so (cperciva)
* | Unbreak detection of cryptodev support for FreeBSD which was brokensimon2008-01-131-1/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | with OpenSSL 0.9.8 import. Note that this does not enable cryptodev by default, as it was the case with OpenSSL 0.9.7 in FreeBSD base, but this change makes it possible to enable cryptodev at all. This has been submitted upstream as: http://rt.openssl.org/Ticket/Display.html?id=1624 Submitted by: nork
* | Fix runtime crash in OpenSSL with "Illegal instruction" by making somesimon2007-05-223-23/+25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | casts a bit less evil. This was e.g. seen when using portsnap as: Fetching snapshot tag from portsnap3.FreeBSD.org... Illegal instruction Note the patch is slightly different from kan's original patch to match style in the OpenSSL source files a bit better. Submitted by: kan Tested by: many
* | This commit was generated by cvs2svn to compensate for changes in r167617,simon2007-03-151-1/+1
|\ \ | |/ | | | | which included commits to RCS files with non-trunk default branches.
| * Import fix from upstream OpenSSL_0_9_8-stable branch:simon2007-03-151-1/+1
| | | | | | | | | | | | | | | | | | | | | | EVP_CIPHER_CTX_key_length() should return the set key length in the EVP_CIPHER_CTX structure which may not be the same as the underlying cipher key length for variable length ciphers. This fixes problems in OpenSSH using some ciphers, and possibly other applications. See also: http://bugzilla.mindrot.org/show_bug.cgi?id=1291
* | Resolve conflicts after import of OpenSSL 0.9.8e.simon2007-03-157-42/+44
| |
* | This commit was generated by cvs2svn to compensate for changes in r167612,simon2007-03-15132-565/+3259
|\ \ | |/ | | | | which included commits to RCS files with non-trunk default branches.
| * Vendor import of OpenSSL 0.9.8e.simon2007-03-15139-607/+3303
| |
* | This commit was generated by cvs2svn to compensate for changes in r162916,simon2006-10-011-1/+1
|\ \ | |/ | | | | which included commits to RCS files with non-trunk default branches.
| * Import from upstream OpenSSL 0.9.8 branch:simon2006-10-011-1/+1
| | | | | | | | | | | | | | Fix uninitialized free of ctx in compute_key() when the OPENSSL_DH_MAX_MODULUS_BITS check is triggered. This fixes the same issue as FreeBSD-SA-06:23.openssl v1.1.
* | Resolve conflicts after import of OpenSSL 0.9.8d.simon2006-10-014-18/+122
| |
* | This commit was generated by cvs2svn to compensate for changes in r162911,simon2006-10-0146-381/+4356
|\ \ | |/ | | | | which included commits to RCS files with non-trunk default branches.
| * Vendor import of OpenSSL 0.9.8d.simon2006-10-0150-398/+4494
| |
* | Correct incorrect PKCS#1 v1.5 padding validation in crypto(3).simon2006-09-101-0/+17
| | | | | | | | | | Obtained from: OpenSSL project Security: FreeBSD-SA-06:19.openssl
* | Resolve conflicts after import of OpenSSL 0.9.8b.simon2006-07-301-53/+215
| | | | | | | | | | | | | | | | This was missed the first time around since eng_padlock.c was not part of OpenSSL 0.9.7e and therefor did not have the v0_9_7e CVS tag used during original resolve of conflicts. Noticed by: Antoine Brodin <antoine.brodin@laposte.net>
OpenPOWER on IntegriCloud