Skip to main content
  • Home
  • login
  • Browse the archive

    swh mirror partner logo
swh logo
SoftwareHeritage
Software
Heritage
Mirror
Features
  • Search

  • Downloads

  • Save code now

  • Add forge now

  • Help

swh:1:snp:dc2a5002442a00b1c0eda7c65d04ea7455e166cd
  • Code
  • Branches (204)
  • Releases (207)
    • Branches
    • Releases
    • HEAD
    • refs/heads/OpenSSL-engine-0_9_6-stable
    • refs/heads/OpenSSL-fips-0_9_7-stable
    • refs/heads/OpenSSL-fips-0_9_8-stable
    • refs/heads/OpenSSL-fips-1_2-stable
    • refs/heads/OpenSSL-fips-2_0-dev
    • refs/heads/OpenSSL-fips-2_0-stable
    • refs/heads/OpenSSL-fips2-0_9_7-stable
    • refs/heads/OpenSSL_0_9_6-stable
    • refs/heads/OpenSSL_0_9_7-stable
    • refs/heads/OpenSSL_0_9_8-stable
    • refs/heads/OpenSSL_0_9_8fg-stable
    • refs/heads/OpenSSL_1_0_0-stable
    • refs/heads/OpenSSL_1_0_1-stable
    • refs/heads/OpenSSL_1_0_2-stable
    • refs/heads/OpenSSL_1_1_0-stable
    • refs/heads/OpenSSL_1_1_1-stable
    • refs/heads/SSLeay
    • refs/heads/feature/dtls-1.3
    • refs/heads/feature/ech
    • refs/heads/feature/quic-server
    • refs/heads/master
    • refs/heads/openssl-3.0
    • refs/heads/openssl-3.1
    • refs/heads/openssl-3.2
    • refs/heads/openssl-3.3
    • refs/heads/openssl-3.4
    • refs/heads/tls1.3-draft-18
    • refs/heads/tls1.3-draft-19
    • refs/tags/AFTER_COMPAQ_PATCH
    • refs/tags/BEFORE_COMPAQ_PATCH
    • refs/tags/BEFORE_engine
    • refs/tags/BEN_FIPS_TEST_1
    • refs/tags/BEN_FIPS_TEST_2
    • refs/tags/BEN_FIPS_TEST_3
    • refs/tags/BEN_FIPS_TEST_4
    • refs/tags/BEN_FIPS_TEST_5
    • refs/tags/BEN_FIPS_TEST_6
    • refs/tags/BEN_FIPS_TEST_7
    • refs/tags/BEN_FIPS_TEST_8
    • refs/tags/FIPS_098_TEST_1
    • refs/tags/FIPS_098_TEST_2
    • refs/tags/FIPS_098_TEST_3
    • refs/tags/FIPS_098_TEST_4
    • refs/tags/FIPS_098_TEST_5
    • refs/tags/FIPS_098_TEST_6
    • refs/tags/FIPS_098_TEST_7
    • refs/tags/FIPS_098_TEST_8
    • refs/tags/FIPS_TEST_10
    • refs/tags/FIPS_TEST_9
    • refs/tags/LEVITTE_after_const
    • refs/tags/LEVITTE_before_const
    • refs/tags/OpenSSL-engine-0_9_6
    • refs/tags/OpenSSL-engine-0_9_6-beta1
    • refs/tags/OpenSSL-engine-0_9_6-beta2
    • refs/tags/OpenSSL-engine-0_9_6-beta3
    • refs/tags/OpenSSL-engine-0_9_6a
    • refs/tags/OpenSSL-engine-0_9_6a-beta1
    • refs/tags/OpenSSL-engine-0_9_6a-beta2
    • refs/tags/OpenSSL-engine-0_9_6a-beta3
    • refs/tags/OpenSSL-engine-0_9_6b
    • refs/tags/OpenSSL-engine-0_9_6c
    • refs/tags/OpenSSL-engine-0_9_6d
    • refs/tags/OpenSSL-engine-0_9_6d-beta1
    • refs/tags/OpenSSL-engine-0_9_6e
    • refs/tags/OpenSSL-engine-0_9_6f
    • refs/tags/OpenSSL-engine-0_9_6g
    • refs/tags/OpenSSL-engine-0_9_6h
    • refs/tags/OpenSSL-engine-0_9_6i
    • refs/tags/OpenSSL-engine-0_9_6j
    • refs/tags/OpenSSL-engine-0_9_6k
    • refs/tags/OpenSSL-engine-0_9_6l
    • refs/tags/OpenSSL-engine-0_9_6m
    • refs/tags/OpenSSL-fips-1_2_0
    • refs/tags/OpenSSL-fips-1_2_1
    • refs/tags/OpenSSL-fips-1_2_2
    • refs/tags/OpenSSL-fips-1_2_3
    • refs/tags/OpenSSL-fips-2_0
    • refs/tags/OpenSSL-fips-2_0-pl1
    • refs/tags/OpenSSL-fips-2_0-rc1
    • refs/tags/OpenSSL-fips-2_0-rc2
    • refs/tags/OpenSSL-fips-2_0-rc3
    • refs/tags/OpenSSL-fips-2_0-rc4
    • refs/tags/OpenSSL-fips-2_0-rc5
    • refs/tags/OpenSSL-fips-2_0-rc6
    • refs/tags/OpenSSL-fips-2_0-rc7
    • refs/tags/OpenSSL-fips-2_0-rc8
    • refs/tags/OpenSSL-fips-2_0-rc9
    • refs/tags/OpenSSL-fips-2_0_1
    • refs/tags/OpenSSL_0_9_1c
    • refs/tags/OpenSSL_0_9_2b
    • refs/tags/OpenSSL_0_9_3
    • refs/tags/OpenSSL_0_9_3a
    • refs/tags/OpenSSL_0_9_3beta1
    • refs/tags/OpenSSL_0_9_3beta2
    • refs/tags/OpenSSL_0_9_4
    • refs/tags/OpenSSL_0_9_5
    • refs/tags/OpenSSL_0_9_5a
    • refs/tags/OpenSSL_0_9_5a-beta1
    • refs/tags/OpenSSL_0_9_5a-beta2
    • refs/tags/OpenSSL_0_9_5beta1
    • refs/tags/OpenSSL_0_9_5beta2
    • refs/tags/OpenSSL_0_9_6
    • refs/tags/OpenSSL_0_9_6-beta1
    • refs/tags/OpenSSL_0_9_6-beta2
    • refs/tags/OpenSSL_0_9_6-beta3
    • refs/tags/OpenSSL_0_9_6a
    • refs/tags/OpenSSL_0_9_6a-beta1
    • refs/tags/OpenSSL_0_9_6a-beta2
    • refs/tags/OpenSSL_0_9_6a-beta3
    • refs/tags/OpenSSL_0_9_6b
    • refs/tags/OpenSSL_0_9_6c
    • refs/tags/OpenSSL_0_9_6d
    • refs/tags/OpenSSL_0_9_6d-beta1
    • refs/tags/OpenSSL_0_9_6e
    • refs/tags/OpenSSL_0_9_6f
    • refs/tags/OpenSSL_0_9_6g
    • refs/tags/OpenSSL_0_9_6h
    • refs/tags/OpenSSL_0_9_6i
    • refs/tags/OpenSSL_0_9_6j
    • refs/tags/OpenSSL_0_9_6k
    • refs/tags/OpenSSL_0_9_6l
    • refs/tags/OpenSSL_0_9_6m
    • refs/tags/OpenSSL_0_9_7
    • refs/tags/OpenSSL_0_9_7-beta1
    • refs/tags/OpenSSL_0_9_7-beta2
    • refs/tags/OpenSSL_0_9_7-beta3
    • refs/tags/OpenSSL_0_9_7-beta4
    • refs/tags/OpenSSL_0_9_7-beta5
    • refs/tags/OpenSSL_0_9_7-beta6
    • refs/tags/OpenSSL_0_9_7a
    • refs/tags/OpenSSL_0_9_7b
    • refs/tags/OpenSSL_0_9_7c
    • refs/tags/OpenSSL_0_9_7d
    • refs/tags/OpenSSL_0_9_7e
    • refs/tags/OpenSSL_0_9_7f
    • refs/tags/OpenSSL_0_9_7g
    • refs/tags/OpenSSL_0_9_7h
    • refs/tags/OpenSSL_0_9_7i
    • refs/tags/OpenSSL_0_9_7j
    • refs/tags/OpenSSL_0_9_7k
    • refs/tags/OpenSSL_0_9_7l
    • refs/tags/OpenSSL_0_9_7m
    • refs/tags/OpenSSL_0_9_8
    • refs/tags/OpenSSL_0_9_8-beta1
    • refs/tags/OpenSSL_0_9_8-beta2
    • refs/tags/OpenSSL_0_9_8-beta3
    • refs/tags/OpenSSL_0_9_8-beta4
    • refs/tags/OpenSSL_0_9_8-beta5
    • refs/tags/OpenSSL_0_9_8-beta6
    • refs/tags/OpenSSL_0_9_8a
    • refs/tags/OpenSSL_0_9_8b
    • refs/tags/OpenSSL_0_9_8c
    • refs/tags/OpenSSL_0_9_8d
    • refs/tags/OpenSSL_0_9_8e
    • refs/tags/OpenSSL_0_9_8f
    • refs/tags/OpenSSL_0_9_8g
    • refs/tags/OpenSSL_0_9_8h
    • refs/tags/OpenSSL_0_9_8i
    • refs/tags/OpenSSL_0_9_8j
    • refs/tags/OpenSSL_0_9_8k
    • refs/tags/OpenSSL_0_9_8l
    • refs/tags/OpenSSL_0_9_8m
    • refs/tags/OpenSSL_0_9_8m-beta1
    • refs/tags/OpenSSL_0_9_8n
    • refs/tags/OpenSSL_0_9_8o
    • refs/tags/OpenSSL_0_9_8p
    • refs/tags/OpenSSL_0_9_8q
    • refs/tags/OpenSSL_0_9_8r
    • refs/tags/OpenSSL_0_9_8s
    • refs/tags/OpenSSL_0_9_8t
    • refs/tags/OpenSSL_0_9_8u
    • refs/tags/OpenSSL_0_9_8v
    • refs/tags/OpenSSL_0_9_8w
    • refs/tags/OpenSSL_0_9_8x
    • refs/tags/OpenSSL_1_0_0
    • refs/tags/OpenSSL_1_0_0-beta1
    • refs/tags/OpenSSL_1_0_0-beta2
    • refs/tags/OpenSSL_1_0_0-beta3
    • refs/tags/OpenSSL_1_0_0-beta4
    • refs/tags/OpenSSL_1_0_0-beta5
    • refs/tags/OpenSSL_1_0_0a
    • refs/tags/OpenSSL_1_0_0b
    • refs/tags/OpenSSL_1_0_0c
    • refs/tags/OpenSSL_1_0_0d
    • refs/tags/OpenSSL_1_0_0e
    • refs/tags/OpenSSL_1_0_0f
    • refs/tags/OpenSSL_1_0_0g
    • refs/tags/OpenSSL_1_0_0h
    • refs/tags/OpenSSL_1_0_0i
    • refs/tags/OpenSSL_1_0_0j
    • refs/tags/OpenSSL_1_0_1
    • refs/tags/OpenSSL_1_0_1-beta1
    • refs/tags/OpenSSL_1_0_1-beta2
    • refs/tags/OpenSSL_1_0_1-beta3
    • refs/tags/OpenSSL_1_0_1a
    • refs/tags/OpenSSL_1_0_1b
    • refs/tags/OpenSSL_1_0_1c
    • refs/tags/OpenSSL_FIPS_1_0
    • refs/tags/SSLeay_0_8_1b
    • refs/tags/SSLeay_0_9_0b
    • refs/tags/SSLeay_0_9_1b
    • refs/tags/STATE_after_zlib
    • refs/tags/STATE_before_zlib
    • refs/tags/rsaref
    • 872e681c00a713e840ebed77a4e05fa0e181f16f
    • openssl-3.4.0-alpha1
    • openssl-3.3.2
    • openssl-3.3.1
    • openssl-3.3.0-beta1
    • openssl-3.3.0-alpha1
    • openssl-3.3.0
    • openssl-3.2.3
    • openssl-3.2.2
    • openssl-3.2.1
    • openssl-3.2.0-beta1
    • openssl-3.2.0-alpha2
    • openssl-3.2.0-alpha1
    • openssl-3.2.0
    • openssl-3.1.7
    • openssl-3.1.6
    • openssl-3.1.5
    • openssl-3.1.4
    • openssl-3.1.3
    • openssl-3.1.2
    • openssl-3.1.1
    • openssl-3.1.0-beta1
    • openssl-3.1.0-alpha1
    • openssl-3.1.0
    • openssl-3.0.9
    • openssl-3.0.8
    • openssl-3.0.7
    • openssl-3.0.6
    • openssl-3.0.5
    • openssl-3.0.4
    • openssl-3.0.3
    • openssl-3.0.2
    • openssl-3.0.15
    • openssl-3.0.14
    • openssl-3.0.13
    • openssl-3.0.12
    • openssl-3.0.11
    • openssl-3.0.10
    • openssl-3.0.1
    • openssl-3.0.0-beta2
    • openssl-3.0.0-beta1
    • openssl-3.0.0-alpha9
    • openssl-3.0.0-alpha8
    • openssl-3.0.0-alpha7
    • openssl-3.0.0-alpha6
    • openssl-3.0.0-alpha5
    • openssl-3.0.0-alpha4
    • openssl-3.0.0-alpha3
    • openssl-3.0.0-alpha2
    • openssl-3.0.0-alpha17
    • openssl-3.0.0-alpha16
    • openssl-3.0.0-alpha15
    • openssl-3.0.0-alpha14
    • openssl-3.0.0-alpha13
    • openssl-3.0.0-alpha12
    • openssl-3.0.0-alpha11
    • openssl-3.0.0-alpha10
    • openssl-3.0.0-alpha1
    • openssl-3.0.0
    • master-pre-reformat
    • master-pre-auto-reformat
    • master-post-reformat
    • master-post-auto-reformat
    • OpenSSL_1_1_1w
    • OpenSSL_1_1_1v
    • OpenSSL_1_1_1u
    • OpenSSL_1_1_1t
    • OpenSSL_1_1_1s
    • OpenSSL_1_1_1r
    • OpenSSL_1_1_1q
    • OpenSSL_1_1_1p
    • OpenSSL_1_1_1o
    • OpenSSL_1_1_1n
    • OpenSSL_1_1_1m
    • OpenSSL_1_1_1l
    • OpenSSL_1_1_1k
    • OpenSSL_1_1_1j
    • OpenSSL_1_1_1i
    • OpenSSL_1_1_1h
    • OpenSSL_1_1_1g
    • OpenSSL_1_1_1f
    • OpenSSL_1_1_1e
    • OpenSSL_1_1_1d
    • OpenSSL_1_1_1c
    • OpenSSL_1_1_1b
    • OpenSSL_1_1_1a
    • OpenSSL_1_1_1-pre9
    • OpenSSL_1_1_1-pre8
    • OpenSSL_1_1_1-pre7
    • OpenSSL_1_1_1-pre6
    • OpenSSL_1_1_1-pre5
    • OpenSSL_1_1_1-pre4
    • OpenSSL_1_1_1-pre3
    • OpenSSL_1_1_1-pre2
    • OpenSSL_1_1_1-pre1
    • OpenSSL_1_1_1
    • OpenSSL_1_1_0l
    • OpenSSL_1_1_0k
    • OpenSSL_1_1_0j
    • OpenSSL_1_1_0i
    • OpenSSL_1_1_0h
    • OpenSSL_1_1_0g
    • OpenSSL_1_1_0f
    • OpenSSL_1_1_0e
    • OpenSSL_1_1_0d
    • OpenSSL_1_1_0c
    • OpenSSL_1_1_0b
    • OpenSSL_1_1_0a
    • OpenSSL_1_1_0-pre6
    • OpenSSL_1_1_0-pre5
    • OpenSSL_1_1_0-pre4
    • OpenSSL_1_1_0-pre3
    • OpenSSL_1_1_0-pre2
    • OpenSSL_1_1_0-pre1
    • OpenSSL_1_1_0
    • OpenSSL_1_0_2u
    • OpenSSL_1_0_2t
    • OpenSSL_1_0_2s
    • OpenSSL_1_0_2r
    • OpenSSL_1_0_2q
    • OpenSSL_1_0_2p
    • OpenSSL_1_0_2o
    • OpenSSL_1_0_2n
    • OpenSSL_1_0_2m
    • OpenSSL_1_0_2l
    • OpenSSL_1_0_2k
    • OpenSSL_1_0_2j
    • OpenSSL_1_0_2i
    • OpenSSL_1_0_2h
    • OpenSSL_1_0_2g
    • OpenSSL_1_0_2f
    • OpenSSL_1_0_2e
    • OpenSSL_1_0_2d
    • OpenSSL_1_0_2c
    • OpenSSL_1_0_2b
    • OpenSSL_1_0_2a
    • OpenSSL_1_0_2-pre-reformat
    • OpenSSL_1_0_2-pre-auto-reformat
    • OpenSSL_1_0_2-post-reformat
    • OpenSSL_1_0_2-post-auto-reformat
    • OpenSSL_1_0_2-beta3
    • OpenSSL_1_0_2-beta2
    • OpenSSL_1_0_2-beta1
    • OpenSSL_1_0_2
    • OpenSSL_1_0_1u
    • OpenSSL_1_0_1t
    • OpenSSL_1_0_1s
    • OpenSSL_1_0_1r
    • OpenSSL_1_0_1q
    • OpenSSL_1_0_1p
    • OpenSSL_1_0_1o
    • OpenSSL_1_0_1n
    • OpenSSL_1_0_1m
    • OpenSSL_1_0_1l
    • OpenSSL_1_0_1k
    • OpenSSL_1_0_1j
    • OpenSSL_1_0_1i
    • OpenSSL_1_0_1h
    • OpenSSL_1_0_1g
    • OpenSSL_1_0_1f
    • OpenSSL_1_0_1e
    • OpenSSL_1_0_1d
    • OpenSSL_1_0_1-pre-reformat
    • OpenSSL_1_0_1-pre-auto-reformat
    • OpenSSL_1_0_1-post-reformat
    • OpenSSL_1_0_1-post-auto-reformat
    • OpenSSL_1_0_0t
    • OpenSSL_1_0_0s
    • OpenSSL_1_0_0r
    • OpenSSL_1_0_0q
    • OpenSSL_1_0_0p
    • OpenSSL_1_0_0o
    • OpenSSL_1_0_0n
    • OpenSSL_1_0_0m
    • OpenSSL_1_0_0l
    • OpenSSL_1_0_0k
    • OpenSSL_1_0_0-pre-reformat
    • OpenSSL_1_0_0-pre-auto-reformat
    • OpenSSL_1_0_0-post-reformat
    • OpenSSL_1_0_0-post-auto-reformat
    • OpenSSL_0_9_8zh
    • OpenSSL_0_9_8zg
    • OpenSSL_0_9_8zf
    • OpenSSL_0_9_8ze
    • OpenSSL_0_9_8zd
    • OpenSSL_0_9_8zc
    • OpenSSL_0_9_8zb
    • OpenSSL_0_9_8za
    • OpenSSL_0_9_8y
    • OpenSSL_0_9_8-pre-reformat
    • OpenSSL_0_9_8-pre-auto-reformat
    • OpenSSL_0_9_8-post-reformat
    • OpenSSL_0_9_8-post-auto-reformat
    • OpenSSL-fips-2_0_9
    • OpenSSL-fips-2_0_8
    • OpenSSL-fips-2_0_7
    • OpenSSL-fips-2_0_6
    • OpenSSL-fips-2_0_5
    • OpenSSL-fips-2_0_4
    • OpenSSL-fips-2_0_3
    • OpenSSL-fips-2_0_2
    • OpenSSL-fips-2_0_16
    • OpenSSL-fips-2_0_15
    • OpenSSL-fips-2_0_14
    • OpenSSL-fips-2_0_13
    • OpenSSL-fips-2_0_12
    • OpenSSL-fips-2_0_11
    • OpenSSL-fips-2_0_10
Permalinks

To reference or cite the objects present in the Software Heritage archive, permalinks based on SoftWare Hash IDentifiers (SWHIDs) must be used.
Select below a type of object currently browsed in order to display its associated SWHID and permalink.

  • revision
  • snapshot
revision badge
swh:1:rev:872e681c00a713e840ebed77a4e05fa0e181f16f
snapshot badge
swh:1:snp:dc2a5002442a00b1c0eda7c65d04ea7455e166cd

sort by:
RevisionAuthorDateMessageCommit Date
00579b9 Hubert Kario06 June 2014, 14:48:43 UTCdocument -nextprotoneg option in man pages Add description of the option to advertise support of Next Protocol Negotiation extension (-nextprotoneg) to man pages of s_client and s_server. PR#3444 (cherry picked from commit 7efd0e777e65eaa6c60d85b1cc5c889f872f8fc4) Conflicts: doc/apps/s_server.pod14 July 2014, 22:43:58 UTC
ee5a8d3 Dr. Stephen Henson14 July 2014, 14:05:50 UTCUse more common name for GOST key exchange. (cherry picked from commit 7aabd9c92fe6f0ea2a82869e5171dcc4518cee85)14 July 2014, 17:31:54 UTC
7237016 Matt Caswell10 July 2014, 22:47:31 UTCFixed valgrind complaint due to BN_consttime_swap reading uninitialised data. This is actually ok for this function, but initialised to zero anyway if PURIFY defined. This does have the impact of masking any *real* unitialised data reads in bn though. Patch based on approach suggested by Rich Salz. PR#3415 (cherry picked from commit 77747e2d9a5573b1dbc15e247ce18c03374c760c)13 July 2014, 21:23:10 UTC
704422c Peter Mosmans13 July 2014, 17:30:07 UTCAdd names of GOST algorithms. PR#3440 (cherry picked from commit 924e5eda2c82d737cc5a1b9c37918aa6e34825da)13 July 2014, 17:31:36 UTC
8e8d7e1 Richard Levitte13 July 2014, 17:11:29 UTC* crypto/ui/ui_lib.c: misplaced brace in switch statement. Detected by dcruette@qualitesys.com (cherry picked from commit 8b5dd340919e511137696792279f595a70ae2762)13 July 2014, 17:15:30 UTC
3ed6327 Ben Laurie10 July 2014, 16:47:48 UTCDon't clean up uninitialised EVP_CIPHER_CTX on error (CID 483259). (cherry picked from commit c1d1b0114e9d370c30649e46182393dbfc00e20c)10 July 2014, 16:52:37 UTC
efd4f1d Matt Caswell09 July 2014, 22:29:17 UTCFix memory leak in BIO_free if there is no destroy function. Based on an original patch by Neitrino Photonov <neitrinoph@gmail.com> PR#3439 (cherry picked from commit 66816c53bea0ecddb9448da7ea9a51a334496127)09 July 2014, 22:34:35 UTC
00032b0 David Lloyd07 July 2014, 12:11:48 UTCPrevent infinite loop loading config files. PR#2985 (cherry picked from commit 9d23f422a32cb333a5e803199ae230706b1bf9f5)07 July 2014, 12:50:00 UTC
a07f514 Dr. Stephen Henson06 July 2014, 21:33:35 UTCUsage for -hack and -prexit -verify_return_error (cherry picked from commit ee724df75d9ad67fd954253ac514fddb46f1e3c6)06 July 2014, 21:48:57 UTC
b197c77 Dr. Stephen Henson06 July 2014, 21:16:21 UTCDocument certificate status request options. (cherry picked from commit cba3f1c739f012aaadb85aaefaf8de424d2695e2) Conflicts: doc/apps/s_client.pod doc/apps/s_server.pod06 July 2014, 21:48:52 UTC
b7c9762 Dr. Stephen Henson06 July 2014, 21:23:01 UTCs_server usage for certificate status requests (cherry picked from commit a44f219c009798054d6741e919cba5b2e656dbf4)06 July 2014, 21:45:44 UTC
a414bc8 Dr. Stephen Henson03 July 2014, 13:50:08 UTCUpdate ticket callback docs. (cherry picked from commit a23a6e85d8dcd5733a343754f434201f3c9aa6f0)06 July 2014, 11:42:27 UTC
98a3c3c Dr. Stephen Henson05 July 2014, 23:32:44 UTCSanity check keylength in PVK files. PR#2277 (cherry picked from commit 733a6c882e92f8221bd03a51643bb47f5f81bb81)05 July 2014, 23:36:11 UTC
157fd05 Jeffrey Walton05 July 2014, 21:39:08 UTCAdded reference to platform specific cryptographic acceleration such as AES-NI05 July 2014, 23:04:32 UTC
9f510ce Matt Caswell05 July 2014, 21:31:05 UTCFixed error in pod files with latest versions of pod2man (cherry picked from commit 07255f0a76d9d349d915e14f969b9ff2ee0d1953)05 July 2014, 23:04:32 UTC
675b1c2 Alan Hryngle05 July 2014, 21:24:03 UTCReturn smaller of ret and f. PR#3418. (cherry picked from commit fdea4fff8fb058be928980600b24cf4c62ef3630)05 July 2014, 21:38:44 UTC
c923132 Dr. Stephen Henson05 July 2014, 12:19:12 UTCDon't limit message sizes in ssl3_get_cert_verify. PR#319 (reoponed version). (cherry picked from commit 7f6e9578648728478e84246fd3e64026b8b6a48e)05 July 2014, 12:30:55 UTC
1864e3b Dr. Stephen Henson04 July 2014, 12:50:26 UTCtypo (cherry picked from commit 2cfbec1caea8f9567bdff85d33d22481f2afb40a) (cherry picked from commit a9661e45acda0bedcb2413b412f9ffc3f9fb2354)04 July 2014, 17:43:55 UTC
af7bcd7 Dr. Stephen Henson04 July 2014, 17:41:45 UTCAdd license info. (cherry picked from commit 55707a36cce3584457f687ff020842c079624ee8)04 July 2014, 17:43:50 UTC
3fa2fff Rich Salz03 July 2014, 02:44:53 UTCMerge branch 'rsalz-docfixes'03 July 2014, 16:53:36 UTC
b372a64 Rich Salz03 July 2014, 04:07:04 UTCClose 3170, remove reference to Ariel Glenn's old 0.9.8 doc (cherry picked from commit f1112985e847286033ac573e70bdee752d26f46f)03 July 2014, 16:51:33 UTC
e432336 Andy Polyakov02 July 2014, 17:35:50 UTCbn_exp.c: fix x86_64-specific crash with one-word modulus. PR: #3397 (cherry picked from commit eca441b2b4d33d2a18d163ef9b4b3aff14251c73)02 July 2014, 19:21:02 UTC
f3b0e02 Dr. Stephen Henson02 July 2014, 17:32:03 UTCupdate release notes02 July 2014, 17:32:03 UTC
a6cc0e0 Matt Smart02 July 2014, 02:43:42 UTCFix doc typo. ERR_get_error(3) references the non-existent ERR_get_last_error_line_data instead of the one that does exist, ERR_peek_last_error_line_data. PR#3283 (cherry picked from commit 5cc99c6cf5e908df6b00b04af7f08e99c0698c7b)02 July 2014, 02:45:07 UTC
b2cb6dc Thijs Alkemade02 July 2014, 02:32:19 UTCMake disabling last cipher work. (cherry picked from commit 7cb472bd0d0fd9da3d42bed1acc56c3a79fc5328)02 July 2014, 02:32:50 UTC
f87f88a Geoff Thorpe25 April 2014, 05:20:16 UTCutil/mkerr.pl: fix perl warning Gets rid of this; defined(@array) is deprecated at ../util/mkerr.pl line 792. (Maybe you should just omit the defined()?) defined(@array) is deprecated at ../util/mkerr.pl line 800. (Maybe you should just omit the defined()?) Signed-off-by: Geoff Thorpe <geoff@openssl.org> (cherry picked from commit 647f360e2e86818cee1f2d0429e071d14814e0b5)02 July 2014, 00:50:51 UTC
6d87cd2 Dr. Stephen Henson01 July 2014, 23:57:57 UTCASN1 sanity check. Primitive encodings shouldn't use indefinite length constructed form. PR#2438 (partial). (cherry picked from commit 398e99fe5e06edb11f55a39ce0883d9aa633ffa9)02 July 2014, 00:00:18 UTC
2db3ea2 Ben Laurie23 April 2014, 17:13:20 UTCFix possible buffer overrun.01 July 2014, 22:39:17 UTC
c28b055 Dr. Stephen Henson30 June 2014, 11:57:29 UTCFix copy for CCM, GCM and XTS. Internal pointers in CCM, GCM and XTS contexts should either be NULL or set to point to the appropriate key schedule. This needs to be adjusted when copying contexts. (cherry picked from commit c2fd5d79ffc4fc9d120a0faad579ce96473e6a2f)30 June 2014, 13:00:00 UTC
02e8d46 Jeffrey Walton29 June 2014, 22:34:21 UTCClarified that the signature's buffer size, `s`, is not used as an IN parameter. Under the old docs, the only thing stated was "at most EVP_PKEY_size(pkey) bytes will be written". It was kind of misleading since it appears EVP_PKEY_size(pkey) WILL be written regardless of the signature's buffer size. (cherry picked from commit 6e6ba36d980f67b6e5c7b139f78da7acbbf8ec76)29 June 2014, 22:36:51 UTC
105a3db ZNV29 June 2014, 21:01:28 UTCMake EVP_CIPHER_CTX_copy work in GCM mode. PR#3272 (cherry picked from commit 370bf1d708e6d7af42e1752fb078d0822c9bc73d)29 June 2014, 21:02:42 UTC
295befe Dr. Stephen Henson29 June 2014, 12:51:30 UTCFix memory leak. PR#2531 (cherry picked from commit 44724beeadf95712a42a8b21dc71bf110e89a262)29 June 2014, 12:52:03 UTC
cb34cb1 Ken Ballou29 June 2014, 12:38:55 UTCTypo. PR#3173 (cherry picked from commit 76ed5a42ea68dd08bba44e4003b7e638e5d8a4a3)29 June 2014, 12:39:24 UTC
86f393c Dr. Stephen Henson29 June 2014, 12:31:57 UTCShow errors on CSR verification failure. If CSR verify fails in ca utility print out error messages. Otherwise some errors give misleading output: for example if the key size exceeds the library limit. PR#2875 (cherry picked from commit a30bdb55d1361b9926eef8127debfc2e1bb8c484)29 June 2014, 12:34:44 UTC
d6d3243 Dr. Stephen Henson29 June 2014, 02:02:51 UTCMake no-ssl3 no-ssl2 do more sensible things. (cherry picked from commit 7ae6a4b659facfd7ad8131238aa1d349cb3fc951)29 June 2014, 02:05:37 UTC
14999bc Dr. Stephen Henson28 June 2014, 20:54:13 UTCClarify protocols supported. Update protocols supported and note that SSLv2 is effectively disabled by default. PR#3184 (cherry picked from commit 1b13a4f38dfc385d5e776f6b3e06c5795874cf9b)28 June 2014, 23:04:43 UTC
046e288 Dr. Stephen Henson28 June 2014, 11:42:04 UTCTypo. PR#3107 (cherry picked from commit 7c206db9280865ae4af352dbc14e9019a6c4795d)28 June 2014, 11:43:18 UTC
d8b11e7 Dr. Stephen Henson27 June 2014, 23:54:32 UTCDon't disable state strings with no-ssl2 Some state strings were erronously not compiled when no-ssl2 was set. PR#3295 (cherry picked from commit 0518a3e19e18cfc441cab261b28441b8c8bd77bf)27 June 2014, 23:56:42 UTC
0df7959 yogesh nagarkar27 June 2014, 23:40:26 UTCFix compilation with -DSSL_DEBUG -DTLS_DEBUG -DKSSL_DEBUG PR#3141 (cherry picked from commit d183545d4589f1e7a40190400b8b99ea3d1f7f97)27 June 2014, 23:41:49 UTC
5894eb1 Andreas Westfeld27 June 2014, 23:04:56 UTCFix typo in ideatest.c (cherry picked from commit d1d4382dcb3fdcad4758ef7e7dd7b61dbf5abbfe)27 June 2014, 23:06:40 UTC
6daba1d Ken Ballou27 June 2014, 22:17:47 UTCRemove redundant check. PR#3174 (cherry picked from commit fd331c0bb9b557903dd2ce88398570a3327b5ef0)27 June 2014, 22:18:21 UTC
69b8f28 Dr. Stephen Henson27 June 2014, 21:56:37 UTCFix for EVP_PBE_alg_add(). In EVP_PBE_alg_add don't use the underlying NID for the cipher as it may have a non-standard key size. PR#3206 (cherry picked from commit efb7caef637a1de8468ca109efd355a9d0e73a45)27 June 2014, 21:58:55 UTC
0ace876 Dr. Stephen Henson27 June 2014, 17:49:32 UTCTolerate critical AKID in CRLs. PR#3014 (cherry picked from commit 11da66f8b1fbe5777fe08cc6ace9e1f2c1576a50)27 June 2014, 17:50:33 UTC
e9daf8a Tom Greenslade27 June 2014, 16:30:59 UTCHandle IPv6 addresses in OCSP_parse_url. PR#2783 (cherry picked from commit b36f35cda964544a15d53d3fdfec9b2bab8cacb1)27 June 2014, 16:31:44 UTC
cf01566 Tomas Mraz27 June 2014, 15:49:22 UTCDon't advertise ECC ciphersuits in SSLv2 compatible client hello. PR#3374 (cherry picked from commit 0436369fccd128cb7f6a8538d5fed1c876c437af)27 June 2014, 15:52:05 UTC
86cac6d Jeffrey Walton27 June 2014, 15:33:06 UTCClarify docs. Document that the certificate passed to SSL_CTX_add_extra_chain_cert() should not be freed by the application. PR#3409 (cherry picked from commit 0535c2d67ca2d684087ef90be35d5fb207aab227) Add restrictions section present in other branches. Conflicts: doc/ssl/SSL_CTX_add_extra_chain_cert.pod27 June 2014, 15:41:45 UTC
f46ea1d Dr. Stephen Henson26 June 2014, 11:36:44 UTCRemove ancient obsolete files under pkcs7. (cherry picked from commit 7be6b27aaf5ed77f13c93dc89a2c27a42082db3f)27 June 2014, 12:54:45 UTC
0980992 Dr. Stephen Henson27 June 2014, 02:21:10 UTCMemory leak and NULL derefernce fixes. PR#340327 June 2014, 02:21:10 UTC
38a503f Dr. Stephen Henson27 June 2014, 02:17:15 UTCFix OID encoding for one component. OIDs with one component don't have an encoding. PR#2556 (Bug#1)27 June 2014, 02:17:15 UTC
fef58ce Huzaifa Sidhpurwala26 June 2014, 22:45:58 UTCMake sure BN_sqr can never return a negative value. PR#3410 (cherry picked from commit e14e764c0d5d469da63d0819c6ffc0e1e9e7f0bb)26 June 2014, 22:50:36 UTC
da0d5e7 Jenny Yung26 June 2014, 22:30:57 UTCMemory allocation checks. PR#3399.26 June 2014, 22:32:17 UTC
ad212c1 Miod Vallat04 June 2014, 07:59:58 UTCFix off-by-one errors in ssl_cipher_get_evp() In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays. Bug discovered and fixed by Miod Vallat from the OpenBSD team. PR#337522 June 2014, 22:20:39 UTC
e1bce59 Matt Caswell22 June 2014, 22:20:19 UTCRevert "Fix off-by-one errors in ssl_cipher_get_evp()" This reverts commit 29411a0c7a00a73e4ca42be8b5a7401d3bb5107a. Incorrect attribution.22 June 2014, 22:20:19 UTC
9beb75d Dr. Stephen Henson14 June 2014, 21:24:08 UTCAccept CCS after sending finished. Allow CCS after finished has been sent by client: at this point keys have been correctly set up so it is OK to accept CCS from server. Without this renegotiation can sometimes fail. PR#3400 (cherry picked from commit 99cd6a91fcb0931feaebbb4832681d40a66fad41)14 June 2014, 21:26:10 UTC
042ef46 Matt Caswell10 June 2014, 22:24:28 UTCFixed incorrect return code handling in ssl3_final_finish_mac. Based on an original patch by Joel Sing (OpenBSD) who also originally identified the issue.13 June 2014, 14:53:29 UTC
01736e6 Matt Caswell13 June 2014, 14:53:08 UTCRevert "Fixed incorrect return code handling in ssl3_final_finish_mac" This reverts commit 9ab788aa23feaa0e3b9efc2213e0c27913f8d987. Missing attribution13 June 2014, 14:53:08 UTC
29411a0 Kurt Cancemi04 June 2014, 07:59:58 UTCFix off-by-one errors in ssl_cipher_get_evp() In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays. PR#337512 June 2014, 20:15:54 UTC
b66f59a Dr. Stephen Henson11 June 2014, 13:31:08 UTCFix compilation with no-comp (cherry picked from commit 7239a09c7b5757ed8d0e9869f3e9b03c0e11f4d1)11 June 2014, 13:33:32 UTC
9ab788a Matt Caswell10 June 2014, 22:24:28 UTCFixed incorrect return code handling in ssl3_final_finish_mac10 June 2014, 22:28:10 UTC
87887a7 Hubert Kario10 June 2014, 12:13:33 UTCbackport changes to ciphers(1) man page Backport of the patch: add ECC strings to ciphers(1), point out difference between DH and ECDH and few other changes applicable to the 1.0.1 code base. * Make a clear distinction between DH and ECDH key exchange. * Group all key exchange cipher suite identifiers, first DH then ECDH * add descriptions for all supported *DH* identifiers * add ECDSA authentication descriptions * add example showing how to disable all suites that offer no authentication or encryption * backport listing of elliptic curve cipher suites. * backport listing of TLS 1.2 cipher suites, add note that DH_RSA and DH_DSS is not implemented in this version * backport of description of PSK and listing of PSK cipher suites * backport description of AES128, AES256 and AESGCM options * backport description of CAMELLIA128, CAMELLIA256 options10 June 2014, 19:56:39 UTC
5a0d057 Mike Bland07 June 2014, 17:05:50 UTCCreate test/testutil.h for unit test helper macros Defines SETUP_TEST_FIXTURE and EXECUTE_TEST, and updates ssl/heartbeat_test.c using these macros. SETUP_TEST_FIXTURE makes use of the new TEST_CASE_NAME macro, defined to use __func__ or __FUNCTION__ on platforms that support those symbols, or to use the file name and line number otherwise. This should fix several reported build problems related to lack of C99 support.10 June 2014, 18:27:45 UTC
aa59369 Dr. Stephen Henson10 June 2014, 13:47:29 UTCFix null pointer errors. PR#3394 (cherry picked from commit 7a9d59c148b773f59a41f8697eeecf369a0974c2)10 June 2014, 13:48:07 UTC
18c7f2f Dr. Stephen Henson09 June 2014, 11:03:12 UTCSRP ciphersuite correction. SRP ciphersuites do not have no authentication. They have authentication based on SRP. Add new SRP authentication flag and cipher string. (cherry picked from commit a86b88acc373ac1fb0ca709a5fb8a8fa74683f67)09 June 2014, 11:09:49 UTC
6a8d6f0 Dr. Stephen Henson09 June 2014, 07:55:37 UTCUpdate strength_bits for 3DES. Fix strength_bits to 112 for 3DES. (cherry picked from commit 837c203719205ab19b5609b2df7151be8df05687)09 June 2014, 11:09:49 UTC
5ff9c21 Kurt Roeckx07 June 2014, 11:32:23 UTCLink heartbeat_test with the static version of the libraries It's using an internal API that that might not be available in the shared library.08 June 2014, 23:13:06 UTC
5c52c04 Jakub Wilk07 June 2014, 12:37:17 UTCCreate ~/.rnd with mode 0600 instead of 0666 Because of a missing include <fcntl.h> we don't have O_CREATE and don't create the file with open() using mode 0600 but fall back to using fopen() with the default umask followed by a chmod(). Problem found by Jakub Wilk <jwilk@debian.org>.08 June 2014, 20:25:43 UTC
6c86bf7 Dr. Stephen Henson07 June 2014, 17:18:41 UTCupdate NEWS07 June 2014, 17:19:03 UTC
0d4d2e0 Dr. Stephen Henson07 June 2014, 14:21:13 UTCMake tls_session_secret_cb work with CVE-2014-0224 fix. If application uses tls_session_secret_cb for session resumption set the CCS_OK flag. (cherry picked from commit 953c592572e8811b7956cc09fbd8e98037068b58)07 June 2014, 14:27:21 UTC
151399a Matt Caswell07 June 2014, 11:30:18 UTCFixed minor duplication in docs07 June 2014, 11:32:00 UTC
049615e Dr. Stephen Henson05 June 2014, 09:45:50 UTCPrepare for 1.0.1i-dev05 June 2014, 09:45:50 UTC
6b72417 Dr. Stephen Henson05 June 2014, 09:45:00 UTCPrepare for 1.0.1h release05 June 2014, 09:45:00 UTC
aabbe99 Dr. Stephen Henson05 June 2014, 07:56:20 UTCUpdate CHANGES and NEWS05 June 2014, 08:04:27 UTC
8011cd5 Dr. Stephen Henson29 May 2014, 14:00:05 UTCFix CVE-2014-3470 Check session_cert is not NULL before dereferencing it.05 June 2014, 08:04:27 UTC
d315265 Dr. Stephen Henson16 May 2014, 12:00:45 UTCFix CVE-2014-0221 Unnecessary recursion when receiving a DTLS hello request can be used to crash a DTLS client. Fixed by handling DTLS hello request without recursion. Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue.05 June 2014, 08:04:27 UTC
006cd70 Dr. Stephen Henson16 May 2014, 11:55:16 UTCAdditional CVE-2014-0224 protection. Return a fatal error if an attempt is made to use a zero length master secret.05 June 2014, 08:04:27 UTC
bc8923b Dr. Stephen Henson16 May 2014, 11:49:48 UTCFix for CVE-2014-0224 Only accept change cipher spec when it is expected instead of at any time. This prevents premature setting of session keys before the master secret is determined which an attacker could use as a MITM attack. Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue and providing the initial fix this patch is based on.05 June 2014, 08:04:27 UTC
1632ef7 Dr. Stephen Henson13 May 2014, 17:48:31 UTCFix for CVE-2014-0195 A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Fixed by adding consistency check for DTLS fragments. Thanks to Jüri Aedla for reporting this issue.05 June 2014, 08:04:27 UTC
f1f4fbd Dr. Stephen Henson05 June 2014, 08:01:33 UTCmake update05 June 2014, 08:02:03 UTC
1854c48 Libor Krystek03 June 2014, 22:14:40 UTCCorrected OPENSSL_NO_EC_NISTP_64_GCC_128 usage in ec_lcl.h. PR#337003 June 2014, 22:19:21 UTC
ebda73f David Benjamin02 June 2014, 17:55:20 UTCCheck there is enough room for extension. (cherry picked from commit 7d89b3bf42e4b4067371ab33ef7631434e41d1e4)02 June 2014, 18:00:02 UTC
bcc3116 zhu qun-ying02 June 2014, 13:38:52 UTCFree up s->d1->buffered_app_data.q properly. PR#3286 (cherry picked from commit 71e95000afb2227fe5cac1c79ae884338bcd8d0b)02 June 2014, 13:40:18 UTC
1dd2641 Sami Farin02 June 2014, 11:24:19 UTCTypo: set i to -1 before goto. PR#3302 (cherry picked from commit 9717f01951f976f76dd40a38d9fc7307057fa4c4)02 June 2014, 13:22:06 UTC
056389e Matt Caswell01 June 2014, 20:32:19 UTCAdded SSLErr call for internal error in dtls1_buffer_record01 June 2014, 20:38:01 UTC
a07856a David Ramos01 June 2014, 20:28:41 UTCDelays the queue insertion until after the ssl3_setup_buffers() call due to use-after-free bug. PR#336201 June 2014, 20:37:47 UTC
19ce768 Dr. Stephen Henson01 June 2014, 15:25:43 UTCRecognise padding extension. (cherry picked from commit ea2bb861f0daaa20819bf9ac8c146f7593feacd4) Conflicts: apps/s_cb.c (cherry picked from commit 14dc83ca779e91a267701a1fb05b2bbcf2cb63c4)01 June 2014, 15:50:37 UTC
aaed77c Dr. Stephen Henson01 June 2014, 15:36:24 UTCOption to disable padding extension. Add TLS padding extension to SSL_OP_ALL so it is used with other "bugs" options and can be turned off. This replaces SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG which is an ancient option referring to SSLv2 and SSLREF. PR#333601 June 2014, 15:50:37 UTC
49270d0 Dr. Stephen Henson01 June 2014, 14:03:00 UTCSet default global mask to UTF8 only. (cherry picked from commit 3009244da47b989c4cc59ba02cf81a4e9d8f8431)01 June 2014, 14:04:29 UTC
673c42b David Ramos01 June 2014, 13:30:10 UTCAllocate extra space when NETSCAPE_HANG_BUG defined. Make sure there is an extra 4 bytes for server done message when NETSCAPE_HANG_BUG is defined. PR#336101 June 2014, 13:30:10 UTC
5541b18 David Ramos01 June 2014, 12:03:05 UTCInitialise alg. PR#3313 (cherry picked from commit 7e2c6f7eb01515a990f77fbc5441be8e1a17152a)01 June 2014, 12:05:20 UTC
28e117f Dr. Stephen Henson30 May 2014, 12:21:43 UTCUse correct digest when exporting keying material. PR#3319 (cherry picked from commit 84691390eae86befd33c83721dacedb539ae34e6)31 May 2014, 12:43:01 UTC
46bfc05 Dr. Stephen Henson30 May 2014, 12:10:08 UTCDon't compile heartbeat test code on Windows (for now). (cherry picked from commit 2c575907d2c8601a18716f718ce309ed4e1f1783)31 May 2014, 12:43:01 UTC
427a37c Hubert Kario12 September 2013, 09:37:12 UTCadd description of -attime to man page the verify app man page didn't describe the usage of attime option even though it was listed as a valid option in the -help message. This patch fixes this omission.30 May 2014, 22:33:10 UTC
39ae3b3 Hubert Kario10 September 2013, 13:59:13 UTCadd description of -no_ecdhe option to s_server man page While the -help message references this option, the man page doesn't mention the -no_ecdhe option. This patch fixes this omission.30 May 2014, 22:32:54 UTC
48f5b3e Dr. Stephen Henson29 May 2014, 13:07:49 UTCSet version number correctly. PR#3249 (cherry picked from commit 8909bf20269035d295743fca559207ef2eb84eb3)29 May 2014, 13:12:14 UTC
f8dc000 František Bořánek29 May 2014, 12:49:10 UTCFix memory leak. PR#3278 (cherry picked from commit de56fe797081fc09ebd1add06d6e2df42a324fd5)29 May 2014, 13:12:14 UTC
bf8d6f9 Martin Kaiser28 May 2014, 09:16:06 UTCremove duplicate 0x for default RSASSA-PSS salt len (cherry picked from commit 3820fec3a09faecba7fe9912aa20ef7fcda8337b)29 May 2014, 13:12:14 UTC
17e844a Peter Mosmans27 May 2014, 22:26:11 UTCFix for test_bn regular expression to work on Windows using MSYS. PR#334627 May 2014, 22:26:11 UTC
8ca7d12 Matt Caswell26 May 2014, 23:26:55 UTCFixed Windows compilation failure26 May 2014, 23:26:55 UTC
67b9c82 Matt Caswell25 May 2014, 22:37:53 UTCFixed error in args for SSL_set_msg_callback and SSL_set_msg_callback_arg25 May 2014, 22:48:15 UTC
a6f5b99 Matt Caswell24 May 2014, 22:55:27 UTCFix for non compilation with TLS_DEBUG defined24 May 2014, 22:56:58 UTC
  • Newer
  • Older

ENEA — Copyright (C), ENEA. License: GNU AGPLv3+.
Legal notes  ::  JavaScript license information ::  Web API

back to top