Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | http://openssl.org/news/patch-CVE-2007-3108.txt; ok pval, deraadt | 2007-08-21 | 1 | -13/+65 | ||
| | ||||||
* | Correctly NUL terminate the message buffer that is used with the | 2007-08-06 | 1 | -4/+24 | ||
| | | | | | -starttls option. Without this openssl s_client -starttls crashed with malloc.conf -> J. OK deraadt@, hshoexer@ | |||||
* | More comment typos from Diego Casati. Including winners like funtion, allmost, | 2007-05-26 | 1 | -1/+1 | ||
| | | | | oustside, seqencer, toghether, nessissary, etc. | |||||
* | Add proper checks against fgets failure. From Charles Longeau. | 2007-04-06 | 1 | -1/+2 | ||
| | | | | OK moritz@, millert@, and jaredy@. | |||||
* | remove some bogus *p tests from charles longeau | 2007-03-20 | 3 | -5/+5 | ||
| | | | | ok deraadt millert | |||||
* | Fix format string misuse in kssl_err_set(), which is not | 2007-01-03 | 1 | -1/+1 | ||
| | | | | | | called with user-supplied strings at the moment. ok markus@ | |||||
* | openssl security fixes, diff from markus@, ok & "commit it" djm@ | 2006-10-04 | 12 | -2/+84 | ||
| | | | | http://www.openssl.org/news/secadv_20060928.txt for more | |||||
* | Use S_IS* macros insted of masking with S_IF* flags. The latter may | 2006-09-25 | 1 | -2/+2 | ||
| | | | | | have multiple bits set, which lead to surprising results. Spotted by Paul Stoeber. ok djm@ | |||||
* | fix RSA signature padding vulnerability in OpenSSL libcrypto CVE-2006-4339; | 2006-09-09 | 1 | -0/+17 | ||
| | | | | ok beck@ miod@ | |||||
* | resolve conflicts | 2006-06-27 | 172 | -2439/+4398 | ||
| | ||||||
* | import of openssl-0.9.7j | 2006-06-27 | 130 | -324/+27174 | ||
| | ||||||
* | potential fd leak (we will fix this before we move to cloning) | 2006-06-08 | 1 | -1/+3 | ||
| | ||||||
* | Add a -hex option to 'rand' to output hexadecimal output. | 2006-05-14 | 1 | -1/+20 | ||
| | | | | ok djm@ miod@, man page help from jmc@. | |||||
* | backport checks for degenerate Diffie-Hellman public exponents from | 2006-05-04 | 4 | -0/+36 | ||
| | | | | | OpenSSL-0.9.8a, where they were added without a corresponding patch to 0.9.7 or an advisory! ok theo@ markus@ | |||||
* | make BN_is_prime() realise that 2 is, in fact, a prime number. | 2006-03-14 | 1 | -1/+3 | ||
| | | | | from OpenSSL CVS; ok otto@ deraadt@ | |||||
* | fix potential SSL 2.0 rollback (http://www.openssl.org//news/secadv_20051011.txt) | 2005-10-11 | 1 | -3/+1 | ||
| | | | | from http://www.openssl.org/news/patch-CAN-2005-2969.txt | |||||
* | kernal->kernel; | 2005-08-01 | 1 | -1/+1 | ||
| | | | | | from netbsd pr #30872 (anonymous post); ok deraadt@ krw@ | |||||
* | avoid spurious ld evil string func warning, spotted by david@; | 2005-05-25 | 1 | -3/+3 | ||
| | | | | feedback & ok avsm@ | |||||
* | no need to byteswap for AES_ASM, from tom@ | 2005-05-23 | 1 | -1/+9 | ||
| | ||||||
* | import i386 AES asm code from openssl.org; ok and help with testing djm@ | 2005-05-10 | 2 | -1/+1550 | ||
| | ||||||
* | kill strcpy; ok hshoexer@, prodded by david@ | 2005-05-10 | 2 | -2/+2 | ||
| | ||||||
* | remove this junk that snuck in the import; spotted by markus@ | 2005-04-29 | 1 | -0/+0 | ||
| | ||||||
* | increase EVP_MAX_MD_SIZE to something sane (big enough for SHA512) | 2005-04-29 | 1 | -1/+1 | ||
| | ||||||
* | resolve conflicts | 2005-04-29 | 298 | -1667/+5261 | ||
| | ||||||
* | import of openssl-0.9.7g; tested on platforms from alpha to zaurus, ok deraadt@ | 2005-04-29 | 188 | -106/+42182 | ||
| | ||||||
* | typo | 2005-04-25 | 1 | -2/+2 | ||
| | ||||||
* | fix lies about snprintf | 2005-04-23 | 1 | -2/+3 | ||
| | ||||||
* | enable openssl DSO (typo, it's -DDSO_DLFCN not -DSO_DLFCN); Douglas Santos | 2005-03-30 | 1 | -3/+3 | ||
| | ||||||
* | belive -> believe | 2005-03-29 | 3 | -4/+4 | ||
| | ||||||
* | adjust comment, open_dev_crypto() returns -1 on error. | 2005-01-29 | 1 | -1/+1 | ||
| | | | | ok markus@ | |||||
* | on error set correct pointer to NULL. | 2005-01-26 | 1 | -2/+2 | ||
| | | | | | | From phk@freebsd.org ok markus@ | |||||
* | machdep.xcrypt now has a different meaning: Instead of > 0 indicating | 2004-06-15 | 1 | -14/+16 | ||
| | | | | | | that AES is there, we now have 3 flag bits: C3_HAS_AES, C3_HAS_SHA (SHA1 & SHA256), and C3_HAS_MM (RSA). Change this code to only look at C3_HAS_AES for now. | |||||
* | update missing pieces from 0.9.7d; ok henning | 2004-04-25 | 3 | -11/+67 | ||
| | | | | crank minor for API extensions | |||||
* | avoid NULL deref; from danh@ | 2004-04-25 | 1 | -2/+5 | ||
| | ||||||
* | from openssl, 1.50.2.9, make S/MIME encrypt work again. | 2004-04-25 | 1 | -4/+9 | ||
| | ||||||
* | backout for now | 2004-04-08 | 3 | -67/+11 | ||
| | ||||||
* | merge 0.9.7d | 2004-04-08 | 114 | -1383/+1808 | ||
| | ||||||
* | import openssl-0.9.7d | 2004-04-07 | 22 | -29/+852 | ||
| | ||||||
* | support IPv6 connections in "openssl s_client", adding -4 and -6 options to | 2004-03-31 | 3 | -96/+45 | ||
| | | | | force protocol; ok itojun@ | |||||
* | Unbreak rmd160. Was broken on sparc64 when compiled with gcc3. Fix and report | 2004-03-22 | 1 | -2/+2 | ||
| | | | | | | | | | | by Simon Kellner. XXX This is only a temporary work-around and we still need a REAL fix for XXX this issue. Testing on different archs by marc@ tdvall@ millert@ otto@ ho@ miod@ hshoexer@ ok deraadt@ | |||||
* | Insert missing ABORT if EC_GROUP_copy() fails. | 2004-03-21 | 1 | -1/+1 | ||
| | | | | ok markus@ | |||||
* | return(00); -> return(0); markus@ ok | 2004-03-17 | 1 | -2/+2 | ||
| | ||||||
* | out-of-bounds read in (unused) kerberos ciphersuites (CAN-2004-0112) | 2004-03-17 | 1 | -0/+16 | ||
| | ||||||
* | avoid null-pointer deref (aka CAN-2004-0079) | 2004-03-17 | 1 | -0/+8 | ||
| | | | | see http://www.openssl.org/news/secadv_20040317.txt | |||||
* | Cleanup and shrink ACSS_KEY a bit. Thus crank library minor. | 2004-02-13 | 3 | -19/+24 | ||
| | | | | | | Change cipher modes to more generic names and add an additional mode. ok deraadt@ markus@ | |||||
* | remove some debug code and cleanup.. | 2004-02-04 | 1 | -18/+6 | ||
| | ||||||
* | OK, this time the AES soft keys work with ssh and such. I spent over 3 | 2004-02-03 | 1 | -16/+63 | ||
| | | | | | hours learning that OpenSSL's internal functions for AES extended keys generate screwy byte order swapped data.. | |||||
* | oops, software key gen bug | 2004-02-03 | 1 | -35/+10 | ||
| | ||||||
* | Switch to using software generated extended keys (because the cpu cannot | 2004-02-03 | 1 | -10/+35 | ||
| | | | | | | | | | | yet generate 192 & 256 bit keys). Ensure that 192 and 256 are in the nids table. This also accelerates performance for 128 a tiny bit: type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes aes-128-cbc 34921.48k 129617.82k 362059.93k 623649.81k 790397.77k aes-192-cbc 26227.43k 99215.33k 283242.84k 509881.15k 665323.22k aes-256-cbc 26133.22k 97458.06k 265990.84k 457824.69k 579835.09k | |||||
* | If on an i386, detect existance of the VIA C3 xcrypt-* using sysctl of | 2004-02-03 | 1 | -4/+174 | ||
| | | | | | | | | the machdep.xcrypt node. If they exist, use the xcrypt-cbc instruction to accelerate aes-{128,192,256}-cbc, for more than 100x performance increase. This code has no effect on any cpu... Tested thus far using openssl speed command, and of course, ssh. 778MB/sec AES-128-CBC performance at 8192 byte block size. |