summaryrefslogtreecommitdiffstats
path: root/lib/libssl/src (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Switch to using unhyphenated VIA padlock mnemonics. VIA abandoned thematthew2013-05-301-2/+2
| | | | | | | | hyphen in their official programming guide sometime between 2003 and 2005, and Clang's integrated assembler does not support hyphenated mnemonics. ok jsg, deraadt
* cherry pick bugfixes for http://www.openssl.org/news/secadv_20130205.txtmarkus2013-02-1416-301/+1322
| | | | | from the openssl git (changes between openssl 1.0.1c and 1.0.1d). ok djm@
* remove ACSS, crank libcrypto major; ok markus@ deraadt@djm2013-01-266-468/+0
|
* On amd64 OPENSSL_cpuid_setup and OPENSSL_ia32cap_P are now hidden so we don'tkettenis2012-10-314-9/+5
| | | | | | | | | | have to go through the PLT/GOT to get at them anymore. In fact going through the GOT now fails since we no longer have a GOT entry for OPENSSL_ia32cap_P. Fixes the problem spotted by jasper@ and sthen@. Based on a diff from mikeb@ who did most of the actual work of tracking down the issue. ok millert@, mikeb@
* Restore r1.10, lost during last update:miod2012-10-221-1/+1
| | | | Disable use of dladdr() on a.out arches, they do not provide it (yet);
* import files that CVS missed; sighdjm2012-10-133-0/+473
|
* resolve conflictsdjm2012-10-13272-4249/+18208
|
* import OpenSSL-1.0.1cdjm2012-10-13222-1909/+54071
|
* When deciding whether we're PIC in a (generated) asm file, check for both PICpascal2012-08-211-1/+1
| | | | | | and __PIC__ defines. Makes things easier for PIE. ok djm@
* Skip printing another SSLv2-only command in s_client's usage text.sthen2012-07-121-0/+2
| | | | jmc@ noticed this in the manpage while updating it, but it applies here too.
* Disable SSLv2 in OpenSSL. No objections from djm.sthen2012-07-112-2/+4
| | | | Brad, jasper and naddy helped with test builds, fixing ports, etc.
* cherrypick fix for CVE-2012-2110: libcrypto ASN.1 parsing heap overflowdjm2012-04-193-14/+61
| | | | ok miod@ deraadt@
* OpenSSL 1.0.0f: mergedjm2012-01-0537-166/+460
|
* OpenSSL 1.0.0f: import upstream sourcedjm2012-01-058-18/+115
|
* openssl-1.0.0e: resolve conflictsdjm2011-11-03150-1359/+2933
|
* import OpenSSL 1.0.0edjm2011-11-0368-609/+2325
|
* fix for CVE-2011-0014 "OCSP stapling vulnerability";djm2011-02-101-1/+7
| | | | | | ok markus@ jasper@ miod@ AFAIK nothing in base uses this, though apache2 from ports may be affected.
* move CRYPTO_VIAC3_MAX out of cryptodev.h and into the onlyjsg2010-12-161-0/+2
| | | | | | file it will be used from. requested by/ok mikeb@
* The VIA ciphers are added to an array of CRYPTO_ALGORITHM_MAX lengthjsg2010-12-161-2/+2
| | | | | | | which should have been declared as CRYPTO_ALGORITHM_MAX + 1, fix this and reserve enough space for the VIA additions as well. ok/comments from mikeb & deraadt
* Security fix for CVE-2010-4180 as mentioned in http://www.openssl.org/news/secadv_20101202.txt.jasper2010-12-152-0/+8
| | | | | | | | | where clients could modify the stored session cache ciphersuite and in some cases even downgrade the suite to weaker ones. This code is not enabled by default. ok djm@
* - Apply security fix for CVE-2010-3864 (+commit 19998 which fixes the fix).jasper2010-11-171-18/+42
| | | | ok djm@ deraadt@
* Disable use of dladdr() on a.out arches, they do not provide it (yet); ok djm@miod2010-10-181-1/+1
|
* More OpenSSL fixes:djm2010-10-063-12/+14
| | | | | | | | | - Update local engines for the EVP API change (len u_int => size_t) - Use hw_cryptodev.c instead of eng_cryptodev.c - Make x86_64-xlate.pl always write to the output file and not stdout, fixing "make -j" builds (spotted by naddy@) ok naddy@
* Retire Skipjackmikeb2010-10-062-2/+0
| | | | | | | | | | | There's not much use for the declassified cipher from the 80's with a questionable license these days. According to the FIPS drafts, Skipjack reaches its EOL in December 2010. The libc portion will be removed after the ports hackathon. djm and thib agree, no objections from deraadt Thanks to jsg for digging up FIPS drafts.
* fix -Wall due to API changedjm2010-10-011-3/+3
|
* add missing; yay for cvs!djm2010-10-013-0/+402
|
* resolve conflicts, fix local changesdjm2010-10-01990-126731/+39623
|
* import OpenSSL-1.0.0adjm2010-10-01414-6881/+51698
|
* Oracle has re-licensed sunrpc under a three-clause BSD license.millert2010-09-011-27/+29
| | | | Update our sources appropriately. OK deraadt@ jsg@
* AES-NI engine support for OpenSSL.thib2010-07-0110-3/+1661
| | | | | | | | | | This is code mostly picked up from upstream OpenSSL, or to be more exact a diff from David Woodhouse <dwmw2 at infradead dot org>. Remember to make includes before doing a build! no objections from djm@ OK deraadt@, reyk@ (AES is about 4.25x faster on his x201 now)
* VIA xcrypt for amd64, simpler version of a diff from deraadtjsg2010-06-291-6/+19
| | | | | | | | | with suggestions from miod. The codepath doesn't seem to be called yet, this will be investigated later. looks good miod@, ok deraadt@
* When running in pic mode we don't have enough general registers for alljsg2010-05-031-1/+1
| | | | | | | | | | | | the xcrypt inputs, hence the dance which is done to make this work. The constraint for the key however was "mr" which is both from memory and from a general register, it seems gcc3 went with the former and gcc4 went with the later in the pic case, so change the constraint for the key to just "m" which gives us more efficient code that both gcc3 and gcc4 are happy with. ok kettenis@
* The openssl command line tool treats the non-null terminated bufferderaadt2010-04-201-1/+1
| | | | | | | "mbuf" as a C string when using the pop3 s_client feature. This causes a segmentation fault with malloc.conf option "J" set when BIO_printf() runs off the end of the buffer. The following patch fixes PR 6282 from Matthew Haub (asked to submit upstream), ok djm
* Security fix for CVE-2010-0740jasper2010-04-141-3/+4
| | | | | | | | | "In TLS connections, certain incorrectly formatted records can cause an OpenSSL client or server to crash due to a read attempt at NULL." http://openssl.org/news/secadv_20100324.txt ok deraadt@ djm@ sthen@
* cherrypick patch from OpenSSL 0.9.8m:djm2010-03-044-8/+11
| | | | | *) Always check bn_wexpend() return values for failure. (CVE-2009-3245) [Martin Olsson, Neel Mehta]
* add a fix from OpenSSL CVS for SA38200.jasper2010-01-311-10/+7
| | | | | | | | "Modify compression code so it avoids using ex_data free functions. This stops applications that call CRYPTO_free_all_ex_data() prematurely leaking memory." looks ok to markus@
* plug a memory leak; found by parfait, ok djmderaadt2009-12-111-0/+2
|
* pull Ben Lauries blind prefix injection fix for CVE-2009-3555 frommarkus2009-11-104-5/+19
| | | | openssl 0.9.8l; crank minor version; ok djm@ deraadt@; initially from jsg@
* s/Mhz/MHz/, MHz is a multiple of the SI unit hertz (whose symbol is Hz).sobrado2009-10-312-4/+4
|
* pull string for memcpy; ok hshoexer@martynas2009-08-071-1/+2
|
* resolve conflictsdjm2009-04-0649-175/+303
|
* import of OpenSSL 0.9.8kdjm2009-04-0641-128/+18137
|
* missing ssl_sock_init() call in init_client() (used bydjm2009-01-301-3/+10
| | | | "openssl s_client"), fix an unlikely memory leak
* remove some gratuitous changes that do nothing other than inreasedjm2009-01-301-2/+1
| | | | the size of the diff against openssl mainline
* convert a strdup (into a purpose-allocated buffer) in libcrypto to adjm2009-01-121-2/+3
| | | | memcpy to avoid linker deprecation warnings; pointed out by dkrause@
* resolve conflictsdjm2009-01-09284-4665/+6506
|
* import openssl-0.9.8jdjm2009-01-09175-3572/+18657
|
* update to openssl-0.9.8i; tested by several, especially krw@djm2009-01-0599-2812/+4426
|
* fix some cause of bad TEXTREL on i386 and amd64otto2008-09-195-14/+64
| | | | | | | - global function calls in .init sections (diff makes them via PLT) - calls to global functions in aes-586.S (made static or local) - global variable accesses in rc4-x86_64.S (now made via GOT) from djm@large; ok miod@
* use one call to arc4random_buf() instead of lots of arc4random()djm2008-09-101-8/+2
|