summaryrefslogtreecommitdiffstats
path: root/crypto/openssl/ssl/s3_pkt.c
Commit message (Collapse)AuthorAgeFilesLines
* MFC: r312825jkim2017-01-261-10/+13
| | | | Merge OpenSSL 1.0.2k.
* MFC: r306193jkim2016-09-221-2/+17
| | | | Merge OpenSSL 1.0.2u.
* Merge OpenSSL 1.0.2e.jkim2015-12-031-1/+1
|\
* \ Merge OpenSSL 1.0.2d.jkim2015-10-301-13/+185
|\ \ | |/
* | Merge OpenSSL 1.0.1n.jkim2015-06-111-1/+12
| |
* | Merge OpenSSL 1.0.1m.jkim2015-03-201-1368/+1358
|\ \ | |/
* | Merge OpenSSL 1.0.1k.jkim2015-01-081-2/+3
|\ \ | |/
* | Merge OpenSSL 1.0.1j.jkim2014-10-151-1/+18
|\ \ | |/
* | Merge OpenSSL 1.0.1i.jkim2014-08-071-1/+1
|\ \ | |/
* | Merge OpenSSL 1.0.1h.jkim2014-06-091-9/+24
|\ \ | |/ | | | | Approved by: so (delphij)
* | Fix OpenSSL multiple vulnerabilities.delphij2014-06-051-1/+10
| | | | | | | | | | | | | | Security: CVE-2014-0195, CVE-2014-0221, CVE-2014-0224, CVE-2014-3470 Security: SA-14:14.openssl Approved by: so
* | Fix OpenSSL NULL pointer deference vulnerability.delphij2014-05-131-0/+4
| | | | | | | | | | | | Obtained from: OpenBSD Security: FreeBSD-SA-14:09.openssl Security: CVE-2014-0198
* | Fix OpenSSL use-after-free vulnerability.delphij2014-04-301-1/+1
| | | | | | | | | | | | Obtained from: OpenBSD Security: FreeBSD-SA-14:09.openssl Security: CVE-2010-5298
* | Merge OpenSSL 1.0.1f.jkim2014-01-221-2/+8
| | | | | | | | Approved by: so (delphij), benl (silence)
* | Merge OpenSSL 1.0.1e.jkim2013-02-131-48/+53
|\ \ | |/ | | | | Approved by: secteam (simon), benl (silence)
* | Merge OpenSSL 1.0.1c.jkim2012-07-121-77/+227
|\ \ | |/ | | | | Approved by: benl (maintainer)
* | Merge OpenSSL 0.9.8n into head.simon2010-04-011-3/+3
| | | | | | | | | | | | | | | | | | | | | | This fixes CVE-2010-0740 which only affected -CURRENT (OpenSSL 0.9.8m) but not -STABLE branches. I have not yet been able to find out if CVE-2010-0433 impacts FreeBSD. This will be investigated further. Security: CVE-2010-0433, CVE-2010-0740 Security: http://www.openssl.org/news/secadv_20100324.txt
* | Merge OpenSSL 0.9.8m into head.simon2010-03-131-9/+55
|\ \ | |/ | | | | | | | | | | | | | | | | | | This also "reverts" some FreeBSD local changes so we should now be back to using entirely stock OpenSSL. The local changes were simple $FreeBSD$ lines additions, which were required in the CVS days, and the patch for FreeBSD-SA-09:15.ssl which has been superseded with OpenSSL 0.9.8m's RFC5746 'TLS renegotiation extension' support. MFC after: 3 weeks
* | Disable SSL renegotiation in order to protect against a seriouscperciva2009-12-031-5/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | protocol flaw. [09:15] Correctly handle failures from unsetenv resulting from a corrupt environment in rtld-elf. [09:16] Fix permissions in freebsd-update in order to prevent leakage of sensitive files. [09:17] Approved by: so (cperciva) Security: FreeBSD-SA-09:15.ssl Security: FreeBSD-SA-09:16.rtld Security: FreeBSD-SA-09:17.freebsd-udpate
* | Merge OpenSSL 0.9.8k into head.simon2009-06-141-1/+15
|\ \ | |/ | | | | Approved by: re
| * Flatten OpenSSL vendor tree.simon2008-08-231-1311/+0
|/
* Vendor import of OpenSSL 0.9.8e.simon2007-03-151-5/+1
|
* Vendor import of OpenSSL 0.9.8bsimon2006-07-291-19/+24
|
* Vendor import of OpenSSL 0.9.7e.nectar2005-02-251-6/+6
|
* Correct a denial-of-service vulnerability in OpenSSL (CAN-2004-0079).nectar2004-03-171-0/+8
| | | | Obtained from: OpenSSL CVS (http://cvs.openssl.org/chngview?cn=12033)
* Vendor import of OpenSSL 0.9.7a.nectar2003-02-191-16/+31
|
* Vendor import of OpenSSL release 0.9.7. This release includesmarkm2003-01-281-13/+26
| | | | support for AES and OpenBSD's hardware crypto.
* Import of OpenSSL 0.9.6d.nectar2002-07-301-31/+78
|
* Initial import of OpenSSL 0.9.6ckris2002-01-271-12/+35
|
* Import of OpenSSL 0.9.6-STABLE snapshot dated 2001-02-10kris2001-02-181-9/+15
|
* Initial import of OpenSSL 0.9.6kris2000-11-131-25/+29
|
* Initial import of OpenSSL 0.9.5akris2000-04-131-304/+457
|
* Initial import of OpenSSL 0.9.4, sans IDEA and RSA code for patentkris2000-01-101-0/+1041
infringement reasons.
OpenPOWER on IntegriCloud