Skip to main content
  • Home
  • login
  • Browse the archive

    swh mirror partner logo
swh logo
SoftwareHeritage
Software
Heritage
Mirror
Features
  • Search

  • Downloads

  • Save code now

  • Add forge now

  • Help

swh:1:snp:dc2a5002442a00b1c0eda7c65d04ea7455e166cd
  • Code
  • Branches (204)
  • Releases (207)
    • Branches
    • Releases
    • HEAD
    • refs/heads/OpenSSL-engine-0_9_6-stable
    • refs/heads/OpenSSL-fips-0_9_7-stable
    • refs/heads/OpenSSL-fips-0_9_8-stable
    • refs/heads/OpenSSL-fips-1_2-stable
    • refs/heads/OpenSSL-fips-2_0-dev
    • refs/heads/OpenSSL-fips-2_0-stable
    • refs/heads/OpenSSL-fips2-0_9_7-stable
    • refs/heads/OpenSSL_0_9_6-stable
    • refs/heads/OpenSSL_0_9_7-stable
    • refs/heads/OpenSSL_0_9_8-stable
    • refs/heads/OpenSSL_0_9_8fg-stable
    • refs/heads/OpenSSL_1_0_0-stable
    • refs/heads/OpenSSL_1_0_1-stable
    • refs/heads/OpenSSL_1_0_2-stable
    • refs/heads/OpenSSL_1_1_0-stable
    • refs/heads/OpenSSL_1_1_1-stable
    • refs/heads/SSLeay
    • refs/heads/feature/dtls-1.3
    • refs/heads/feature/ech
    • refs/heads/feature/quic-server
    • refs/heads/master
    • refs/heads/openssl-3.0
    • refs/heads/openssl-3.1
    • refs/heads/openssl-3.2
    • refs/heads/openssl-3.3
    • refs/heads/openssl-3.4
    • refs/heads/tls1.3-draft-18
    • refs/heads/tls1.3-draft-19
    • refs/tags/AFTER_COMPAQ_PATCH
    • refs/tags/BEFORE_COMPAQ_PATCH
    • refs/tags/BEFORE_engine
    • refs/tags/BEN_FIPS_TEST_1
    • refs/tags/BEN_FIPS_TEST_2
    • refs/tags/BEN_FIPS_TEST_3
    • refs/tags/BEN_FIPS_TEST_4
    • refs/tags/BEN_FIPS_TEST_5
    • refs/tags/BEN_FIPS_TEST_6
    • refs/tags/BEN_FIPS_TEST_7
    • refs/tags/BEN_FIPS_TEST_8
    • refs/tags/FIPS_098_TEST_1
    • refs/tags/FIPS_098_TEST_2
    • refs/tags/FIPS_098_TEST_3
    • refs/tags/FIPS_098_TEST_4
    • refs/tags/FIPS_098_TEST_5
    • refs/tags/FIPS_098_TEST_6
    • refs/tags/FIPS_098_TEST_7
    • refs/tags/FIPS_098_TEST_8
    • refs/tags/FIPS_TEST_10
    • refs/tags/FIPS_TEST_9
    • refs/tags/LEVITTE_after_const
    • refs/tags/LEVITTE_before_const
    • refs/tags/OpenSSL-engine-0_9_6
    • refs/tags/OpenSSL-engine-0_9_6-beta1
    • refs/tags/OpenSSL-engine-0_9_6-beta2
    • refs/tags/OpenSSL-engine-0_9_6-beta3
    • refs/tags/OpenSSL-engine-0_9_6a
    • refs/tags/OpenSSL-engine-0_9_6a-beta1
    • refs/tags/OpenSSL-engine-0_9_6a-beta2
    • refs/tags/OpenSSL-engine-0_9_6a-beta3
    • refs/tags/OpenSSL-engine-0_9_6b
    • refs/tags/OpenSSL-engine-0_9_6c
    • refs/tags/OpenSSL-engine-0_9_6d
    • refs/tags/OpenSSL-engine-0_9_6d-beta1
    • refs/tags/OpenSSL-engine-0_9_6e
    • refs/tags/OpenSSL-engine-0_9_6f
    • refs/tags/OpenSSL-engine-0_9_6g
    • refs/tags/OpenSSL-engine-0_9_6h
    • refs/tags/OpenSSL-engine-0_9_6i
    • refs/tags/OpenSSL-engine-0_9_6j
    • refs/tags/OpenSSL-engine-0_9_6k
    • refs/tags/OpenSSL-engine-0_9_6l
    • refs/tags/OpenSSL-engine-0_9_6m
    • refs/tags/OpenSSL-fips-1_2_0
    • refs/tags/OpenSSL-fips-1_2_1
    • refs/tags/OpenSSL-fips-1_2_2
    • refs/tags/OpenSSL-fips-1_2_3
    • refs/tags/OpenSSL-fips-2_0
    • refs/tags/OpenSSL-fips-2_0-pl1
    • refs/tags/OpenSSL-fips-2_0-rc1
    • refs/tags/OpenSSL-fips-2_0-rc2
    • refs/tags/OpenSSL-fips-2_0-rc3
    • refs/tags/OpenSSL-fips-2_0-rc4
    • refs/tags/OpenSSL-fips-2_0-rc5
    • refs/tags/OpenSSL-fips-2_0-rc6
    • refs/tags/OpenSSL-fips-2_0-rc7
    • refs/tags/OpenSSL-fips-2_0-rc8
    • refs/tags/OpenSSL-fips-2_0-rc9
    • refs/tags/OpenSSL-fips-2_0_1
    • refs/tags/OpenSSL_0_9_1c
    • refs/tags/OpenSSL_0_9_2b
    • refs/tags/OpenSSL_0_9_3
    • refs/tags/OpenSSL_0_9_3a
    • refs/tags/OpenSSL_0_9_3beta1
    • refs/tags/OpenSSL_0_9_3beta2
    • refs/tags/OpenSSL_0_9_4
    • refs/tags/OpenSSL_0_9_5
    • refs/tags/OpenSSL_0_9_5a
    • refs/tags/OpenSSL_0_9_5a-beta1
    • refs/tags/OpenSSL_0_9_5a-beta2
    • refs/tags/OpenSSL_0_9_5beta1
    • refs/tags/OpenSSL_0_9_5beta2
    • refs/tags/OpenSSL_0_9_6
    • refs/tags/OpenSSL_0_9_6-beta1
    • refs/tags/OpenSSL_0_9_6-beta2
    • refs/tags/OpenSSL_0_9_6-beta3
    • refs/tags/OpenSSL_0_9_6a
    • refs/tags/OpenSSL_0_9_6a-beta1
    • refs/tags/OpenSSL_0_9_6a-beta2
    • refs/tags/OpenSSL_0_9_6a-beta3
    • refs/tags/OpenSSL_0_9_6b
    • refs/tags/OpenSSL_0_9_6c
    • refs/tags/OpenSSL_0_9_6d
    • refs/tags/OpenSSL_0_9_6d-beta1
    • refs/tags/OpenSSL_0_9_6e
    • refs/tags/OpenSSL_0_9_6f
    • refs/tags/OpenSSL_0_9_6g
    • refs/tags/OpenSSL_0_9_6h
    • refs/tags/OpenSSL_0_9_6i
    • refs/tags/OpenSSL_0_9_6j
    • refs/tags/OpenSSL_0_9_6k
    • refs/tags/OpenSSL_0_9_6l
    • refs/tags/OpenSSL_0_9_6m
    • refs/tags/OpenSSL_0_9_7
    • refs/tags/OpenSSL_0_9_7-beta1
    • refs/tags/OpenSSL_0_9_7-beta2
    • refs/tags/OpenSSL_0_9_7-beta3
    • refs/tags/OpenSSL_0_9_7-beta4
    • refs/tags/OpenSSL_0_9_7-beta5
    • refs/tags/OpenSSL_0_9_7-beta6
    • refs/tags/OpenSSL_0_9_7a
    • refs/tags/OpenSSL_0_9_7b
    • refs/tags/OpenSSL_0_9_7c
    • refs/tags/OpenSSL_0_9_7d
    • refs/tags/OpenSSL_0_9_7e
    • refs/tags/OpenSSL_0_9_7f
    • refs/tags/OpenSSL_0_9_7g
    • refs/tags/OpenSSL_0_9_7h
    • refs/tags/OpenSSL_0_9_7i
    • refs/tags/OpenSSL_0_9_7j
    • refs/tags/OpenSSL_0_9_7k
    • refs/tags/OpenSSL_0_9_7l
    • refs/tags/OpenSSL_0_9_7m
    • refs/tags/OpenSSL_0_9_8
    • refs/tags/OpenSSL_0_9_8-beta1
    • refs/tags/OpenSSL_0_9_8-beta2
    • refs/tags/OpenSSL_0_9_8-beta3
    • refs/tags/OpenSSL_0_9_8-beta4
    • refs/tags/OpenSSL_0_9_8-beta5
    • refs/tags/OpenSSL_0_9_8-beta6
    • refs/tags/OpenSSL_0_9_8a
    • refs/tags/OpenSSL_0_9_8b
    • refs/tags/OpenSSL_0_9_8c
    • refs/tags/OpenSSL_0_9_8d
    • refs/tags/OpenSSL_0_9_8e
    • refs/tags/OpenSSL_0_9_8f
    • refs/tags/OpenSSL_0_9_8g
    • refs/tags/OpenSSL_0_9_8h
    • refs/tags/OpenSSL_0_9_8i
    • refs/tags/OpenSSL_0_9_8j
    • refs/tags/OpenSSL_0_9_8k
    • refs/tags/OpenSSL_0_9_8l
    • refs/tags/OpenSSL_0_9_8m
    • refs/tags/OpenSSL_0_9_8m-beta1
    • refs/tags/OpenSSL_0_9_8n
    • refs/tags/OpenSSL_0_9_8o
    • refs/tags/OpenSSL_0_9_8p
    • refs/tags/OpenSSL_0_9_8q
    • refs/tags/OpenSSL_0_9_8r
    • refs/tags/OpenSSL_0_9_8s
    • refs/tags/OpenSSL_0_9_8t
    • refs/tags/OpenSSL_0_9_8u
    • refs/tags/OpenSSL_0_9_8v
    • refs/tags/OpenSSL_0_9_8w
    • refs/tags/OpenSSL_0_9_8x
    • refs/tags/OpenSSL_1_0_0
    • refs/tags/OpenSSL_1_0_0-beta1
    • refs/tags/OpenSSL_1_0_0-beta2
    • refs/tags/OpenSSL_1_0_0-beta3
    • refs/tags/OpenSSL_1_0_0-beta4
    • refs/tags/OpenSSL_1_0_0-beta5
    • refs/tags/OpenSSL_1_0_0a
    • refs/tags/OpenSSL_1_0_0b
    • refs/tags/OpenSSL_1_0_0c
    • refs/tags/OpenSSL_1_0_0d
    • refs/tags/OpenSSL_1_0_0e
    • refs/tags/OpenSSL_1_0_0f
    • refs/tags/OpenSSL_1_0_0g
    • refs/tags/OpenSSL_1_0_0h
    • refs/tags/OpenSSL_1_0_0i
    • refs/tags/OpenSSL_1_0_0j
    • refs/tags/OpenSSL_1_0_1
    • refs/tags/OpenSSL_1_0_1-beta1
    • refs/tags/OpenSSL_1_0_1-beta2
    • refs/tags/OpenSSL_1_0_1-beta3
    • refs/tags/OpenSSL_1_0_1a
    • refs/tags/OpenSSL_1_0_1b
    • refs/tags/OpenSSL_1_0_1c
    • refs/tags/OpenSSL_FIPS_1_0
    • refs/tags/SSLeay_0_8_1b
    • refs/tags/SSLeay_0_9_0b
    • refs/tags/SSLeay_0_9_1b
    • refs/tags/STATE_after_zlib
    • refs/tags/STATE_before_zlib
    • refs/tags/rsaref
    • 121f386ec7a5384cfd4c0bb0f86e9ddd02c69a6e
    • openssl-3.4.0-alpha1
    • openssl-3.3.2
    • openssl-3.3.1
    • openssl-3.3.0-beta1
    • openssl-3.3.0-alpha1
    • openssl-3.3.0
    • openssl-3.2.3
    • openssl-3.2.2
    • openssl-3.2.1
    • openssl-3.2.0-beta1
    • openssl-3.2.0-alpha2
    • openssl-3.2.0-alpha1
    • openssl-3.2.0
    • openssl-3.1.7
    • openssl-3.1.6
    • openssl-3.1.5
    • openssl-3.1.4
    • openssl-3.1.3
    • openssl-3.1.2
    • openssl-3.1.1
    • openssl-3.1.0-beta1
    • openssl-3.1.0-alpha1
    • openssl-3.1.0
    • openssl-3.0.9
    • openssl-3.0.8
    • openssl-3.0.7
    • openssl-3.0.6
    • openssl-3.0.5
    • openssl-3.0.4
    • openssl-3.0.3
    • openssl-3.0.2
    • openssl-3.0.15
    • openssl-3.0.14
    • openssl-3.0.13
    • openssl-3.0.12
    • openssl-3.0.11
    • openssl-3.0.10
    • openssl-3.0.1
    • openssl-3.0.0-beta2
    • openssl-3.0.0-beta1
    • openssl-3.0.0-alpha9
    • openssl-3.0.0-alpha8
    • openssl-3.0.0-alpha7
    • openssl-3.0.0-alpha6
    • openssl-3.0.0-alpha5
    • openssl-3.0.0-alpha4
    • openssl-3.0.0-alpha3
    • openssl-3.0.0-alpha2
    • openssl-3.0.0-alpha17
    • openssl-3.0.0-alpha16
    • openssl-3.0.0-alpha15
    • openssl-3.0.0-alpha14
    • openssl-3.0.0-alpha13
    • openssl-3.0.0-alpha12
    • openssl-3.0.0-alpha11
    • openssl-3.0.0-alpha10
    • openssl-3.0.0-alpha1
    • openssl-3.0.0
    • master-pre-reformat
    • master-pre-auto-reformat
    • master-post-reformat
    • master-post-auto-reformat
    • OpenSSL_1_1_1w
    • OpenSSL_1_1_1v
    • OpenSSL_1_1_1u
    • OpenSSL_1_1_1t
    • OpenSSL_1_1_1s
    • OpenSSL_1_1_1r
    • OpenSSL_1_1_1q
    • OpenSSL_1_1_1p
    • OpenSSL_1_1_1o
    • OpenSSL_1_1_1n
    • OpenSSL_1_1_1m
    • OpenSSL_1_1_1l
    • OpenSSL_1_1_1k
    • OpenSSL_1_1_1j
    • OpenSSL_1_1_1i
    • OpenSSL_1_1_1h
    • OpenSSL_1_1_1g
    • OpenSSL_1_1_1f
    • OpenSSL_1_1_1e
    • OpenSSL_1_1_1d
    • OpenSSL_1_1_1c
    • OpenSSL_1_1_1b
    • OpenSSL_1_1_1a
    • OpenSSL_1_1_1-pre9
    • OpenSSL_1_1_1-pre8
    • OpenSSL_1_1_1-pre7
    • OpenSSL_1_1_1-pre6
    • OpenSSL_1_1_1-pre5
    • OpenSSL_1_1_1-pre4
    • OpenSSL_1_1_1-pre3
    • OpenSSL_1_1_1-pre2
    • OpenSSL_1_1_1-pre1
    • OpenSSL_1_1_1
    • OpenSSL_1_1_0l
    • OpenSSL_1_1_0k
    • OpenSSL_1_1_0j
    • OpenSSL_1_1_0i
    • OpenSSL_1_1_0h
    • OpenSSL_1_1_0g
    • OpenSSL_1_1_0f
    • OpenSSL_1_1_0e
    • OpenSSL_1_1_0d
    • OpenSSL_1_1_0c
    • OpenSSL_1_1_0b
    • OpenSSL_1_1_0a
    • OpenSSL_1_1_0-pre6
    • OpenSSL_1_1_0-pre5
    • OpenSSL_1_1_0-pre4
    • OpenSSL_1_1_0-pre3
    • OpenSSL_1_1_0-pre2
    • OpenSSL_1_1_0-pre1
    • OpenSSL_1_1_0
    • OpenSSL_1_0_2u
    • OpenSSL_1_0_2t
    • OpenSSL_1_0_2s
    • OpenSSL_1_0_2r
    • OpenSSL_1_0_2q
    • OpenSSL_1_0_2p
    • OpenSSL_1_0_2o
    • OpenSSL_1_0_2n
    • OpenSSL_1_0_2m
    • OpenSSL_1_0_2l
    • OpenSSL_1_0_2k
    • OpenSSL_1_0_2j
    • OpenSSL_1_0_2i
    • OpenSSL_1_0_2h
    • OpenSSL_1_0_2g
    • OpenSSL_1_0_2f
    • OpenSSL_1_0_2e
    • OpenSSL_1_0_2d
    • OpenSSL_1_0_2c
    • OpenSSL_1_0_2b
    • OpenSSL_1_0_2a
    • OpenSSL_1_0_2-pre-reformat
    • OpenSSL_1_0_2-pre-auto-reformat
    • OpenSSL_1_0_2-post-reformat
    • OpenSSL_1_0_2-post-auto-reformat
    • OpenSSL_1_0_2-beta3
    • OpenSSL_1_0_2-beta2
    • OpenSSL_1_0_2-beta1
    • OpenSSL_1_0_2
    • OpenSSL_1_0_1u
    • OpenSSL_1_0_1t
    • OpenSSL_1_0_1s
    • OpenSSL_1_0_1r
    • OpenSSL_1_0_1q
    • OpenSSL_1_0_1p
    • OpenSSL_1_0_1o
    • OpenSSL_1_0_1n
    • OpenSSL_1_0_1m
    • OpenSSL_1_0_1l
    • OpenSSL_1_0_1k
    • OpenSSL_1_0_1j
    • OpenSSL_1_0_1i
    • OpenSSL_1_0_1h
    • OpenSSL_1_0_1g
    • OpenSSL_1_0_1f
    • OpenSSL_1_0_1e
    • OpenSSL_1_0_1d
    • OpenSSL_1_0_1-pre-reformat
    • OpenSSL_1_0_1-pre-auto-reformat
    • OpenSSL_1_0_1-post-reformat
    • OpenSSL_1_0_1-post-auto-reformat
    • OpenSSL_1_0_0t
    • OpenSSL_1_0_0s
    • OpenSSL_1_0_0r
    • OpenSSL_1_0_0q
    • OpenSSL_1_0_0p
    • OpenSSL_1_0_0o
    • OpenSSL_1_0_0n
    • OpenSSL_1_0_0m
    • OpenSSL_1_0_0l
    • OpenSSL_1_0_0k
    • OpenSSL_1_0_0-pre-reformat
    • OpenSSL_1_0_0-pre-auto-reformat
    • OpenSSL_1_0_0-post-reformat
    • OpenSSL_1_0_0-post-auto-reformat
    • OpenSSL_0_9_8zh
    • OpenSSL_0_9_8zg
    • OpenSSL_0_9_8zf
    • OpenSSL_0_9_8ze
    • OpenSSL_0_9_8zd
    • OpenSSL_0_9_8zc
    • OpenSSL_0_9_8zb
    • OpenSSL_0_9_8za
    • OpenSSL_0_9_8y
    • OpenSSL_0_9_8-pre-reformat
    • OpenSSL_0_9_8-pre-auto-reformat
    • OpenSSL_0_9_8-post-reformat
    • OpenSSL_0_9_8-post-auto-reformat
    • OpenSSL-fips-2_0_9
    • OpenSSL-fips-2_0_8
    • OpenSSL-fips-2_0_7
    • OpenSSL-fips-2_0_6
    • OpenSSL-fips-2_0_5
    • OpenSSL-fips-2_0_4
    • OpenSSL-fips-2_0_3
    • OpenSSL-fips-2_0_2
    • OpenSSL-fips-2_0_16
    • OpenSSL-fips-2_0_15
    • OpenSSL-fips-2_0_14
    • OpenSSL-fips-2_0_13
    • OpenSSL-fips-2_0_12
    • OpenSSL-fips-2_0_11
    • OpenSSL-fips-2_0_10
Permalinks

To reference or cite the objects present in the Software Heritage archive, permalinks based on SoftWare Hash IDentifiers (SWHIDs) must be used.
Select below a type of object currently browsed in order to display its associated SWHID and permalink.

  • revision
  • snapshot
revision badge
swh:1:rev:121f386ec7a5384cfd4c0bb0f86e9ddd02c69a6e
snapshot badge
swh:1:snp:dc2a5002442a00b1c0eda7c65d04ea7455e166cd

sort by:
RevisionAuthorDateMessageCommit Date
121f386 Jeffrey Walton27 June 2014, 15:33:06 UTCClarify docs. Document that the certificate passed to SSL_CTX_add_extra_chain_cert() should not be freed by the application. PR#3409 Add restrictions section present in other branches. (cherry picked from commit 86cac6d3b25342ff17a2b6564f7592fd7c6829e8)27 June 2014, 15:44:14 UTC
9fb10cf Dr. Stephen Henson27 June 2014, 02:21:10 UTCMemory leak and NULL dereference fixes. PR#3403 (cherry picked from commit d2aea038297e0c64ca66e6844cbb37377365885e) Conflicts: apps/crl2p7.c crypto/asn1/a_utctm.c crypto/asn1/ameth_lib.c crypto/asn1/bio_asn1.c27 June 2014, 14:33:18 UTC
a20a636 Dr. Stephen Henson26 June 2014, 11:36:44 UTCRemove ancient obsolete files under pkcs7. (cherry picked from commit 7be6b27aaf5ed77f13c93dc89a2c27a42082db3f)27 June 2014, 13:04:35 UTC
54985b5 Huzaifa Sidhpurwala26 June 2014, 22:45:58 UTCMake sure BN_sqr can never return a negative value. PR#3410 (cherry picked from commit e14e764c0d5d469da63d0819c6ffc0e1e9e7f0bb)26 June 2014, 22:52:18 UTC
b09db67 Miod Vallat12 June 2014, 20:25:07 UTCFix off-by-one errors in ssl_cipher_get_evp() In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays. Bug discovered and fixed by Miod Vallat from the OpenBSD team. PR#337522 June 2014, 22:26:33 UTC
cdc5965 Matt Caswell22 June 2014, 22:24:52 UTCRevert " Fix off-by-one errors in ssl_cipher_get_evp()" This reverts commit def1490717c091c6ef669da9fc5ea4c8b2a4d776. Incorrect attribution22 June 2014, 22:24:52 UTC
70d923f Dr. Stephen Henson14 June 2014, 21:24:08 UTCAccept CCS after sending finished. Allow CCS after finished has been sent by client: at this point keys have been correctly set up so it is OK to accept CCS from server. Without this renegotiation can sometimes fail. PR#3400 (cherry picked from commit 99cd6a91fcb0931feaebbb4832681d40a66fad41)14 June 2014, 21:26:56 UTC
def1490 Kurt Cancemi12 June 2014, 20:25:07 UTCFix off-by-one errors in ssl_cipher_get_evp() In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays. PR#337512 June 2014, 20:25:07 UTC
7697d9b Ben Laurie19 May 2014, 17:21:39 UTCAllow the maximum value. (Backported as a result of PR#3377 reported by Rainer Jung <rainer.jung@kippdata.de>)12 June 2014, 19:52:30 UTC
0345354 Dr. Stephen Henson10 June 2014, 13:47:29 UTCFix null pointer errors. PR#3394 (cherry picked from commit 7a9d59c148b773f59a41f8697eeecf369a0974c2)10 June 2014, 13:48:19 UTC
90aef44 Dr. Stephen Henson09 June 2014, 08:40:25 UTCClarify NEWS.09 June 2014, 08:40:25 UTC
6026890 Dr. Stephen Henson06 June 2014, 12:24:56 UTCUse correct wording for website scripts.06 June 2014, 12:26:31 UTC
810d2c7 Dr. Stephen Henson06 June 2014, 11:26:24 UTCAdd two known issues to NEWS.06 June 2014, 11:31:13 UTC
0a9b8dd Dr. Stephen Henson06 June 2014, 11:16:10 UTCFix 0.9.8 FIPS capable OpenSSL build. The object file bn_lib.o is excluded from FIPS builds which causes a linker error for BN_consttime_swap. So move definition from bn_lib.c to bn_gf2m.c This change is *only* needed for OpenSSL 0.9.8 which uses the 1.2 FIPS module.06 June 2014, 11:31:13 UTC
bfce4e5 Matt Caswell26 May 2014, 23:26:55 UTCFixed Windows compilation failure05 June 2014, 19:27:14 UTC
4a1190b Dr. Stephen Henson05 June 2014, 09:40:11 UTCPrepare for 0.9.8zb-dev05 June 2014, 09:40:11 UTC
047ec5d Dr. Stephen Henson05 June 2014, 09:38:57 UTCPrepare for 0.9.8za release05 June 2014, 09:38:57 UTC
bb59889 Dr. Stephen Henson05 June 2014, 08:08:27 UTCUpdate CHANGES and NEWS05 June 2014, 08:08:27 UTC
141a548 Dr. Stephen Henson29 May 2014, 14:00:05 UTCFix CVE-2014-3470 Check session_cert is not NULL before dereferencing it.03 June 2014, 15:30:23 UTC
de2422a Dr. Stephen Henson16 May 2014, 12:00:45 UTCFix CVE-2014-0221 Unnecessary recursion when receiving a DTLS hello request can be used to crash a DTLS client. Fixed by handling DTLS hello request without recursion. Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue.03 June 2014, 15:30:23 UTC
897169f Dr. Stephen Henson16 May 2014, 11:55:16 UTCAdditional CVE-2014-0224 protection. Return a fatal error if an attempt is made to use a zero length master secret.03 June 2014, 15:30:23 UTC
410a49a Dr. Stephen Henson16 May 2014, 11:49:48 UTCFix for CVE-2014-0224 Only accept change cipher spec when it is expected instead of at any time. This prevents premature setting of session keys before the master secret is determined which an attacker could use as a MITM attack. Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue and providing the initial fix this patch is based on.03 June 2014, 15:30:23 UTC
82ba68c Dr. Stephen Henson13 May 2014, 17:48:31 UTCFix for CVE-2014-0195 A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Fixed by adding consistency check for DTLS fragments. Thanks to Jüri Aedla for reporting this issue.03 June 2014, 15:30:23 UTC
4b258e7 zhu qun-ying02 June 2014, 13:38:52 UTCFree up s->d1->buffered_app_data.q properly. PR#3286 (cherry picked from commit 71e95000afb2227fe5cac1c79ae884338bcd8d0b)02 June 2014, 13:40:45 UTC
6ac2f67 Andy Polyakov11 January 2012, 21:42:20 UTCecdsa.pod: typo. PR: 2678 Submitted by: Annie Yousar (cherry picked from commit d572544a2cccc9dad7afcef24de11232e5506c99)02 June 2014, 12:59:53 UTC
bea1d1c Sami Farin02 June 2014, 11:24:19 UTCTypo: set i to -1 before goto. PR#3302 (cherry picked from commit 9717f01951f976f76dd40a38d9fc7307057fa4c4)02 June 2014, 11:28:50 UTC
61e6e80 Dr. Stephen Henson01 June 2014, 14:03:00 UTCSet default global mask to UTF8 only. (cherry picked from commit 3009244da47b989c4cc59ba02cf81a4e9d8f8431)01 June 2014, 14:04:49 UTC
2ce5407 David Ramos01 June 2014, 13:30:10 UTCAllocate extra space when NETSCAPE_HANG_BUG defined. Make sure there is an extra 4 bytes for server done message when NETSCAPE_HANG_BUG is defined. PR#3361 (cherry picked from commit 673c42b2380c34e7500f05e7f00c674cc677a065)01 June 2014, 13:31:57 UTC
8e928aa Ben Laurie19 May 2014, 17:20:54 UTCFix signed/unsigned warning. (cherry picked from commit 989d87cb1a174a951efd829ff6b2f68a322f9df8)29 May 2014, 13:16:21 UTC
105e52b Dr. Stephen Henson29 May 2014, 13:07:49 UTCSet version number correctly. PR#3249 (cherry picked from commit 8909bf20269035d295743fca559207ef2eb84eb3)29 May 2014, 13:12:11 UTC
492a501 František Bořánek29 May 2014, 12:49:10 UTCFix memory leak. PR#3278 (cherry picked from commit de56fe797081fc09ebd1add06d6e2df42a324fd5)29 May 2014, 13:12:11 UTC
53b0b0a Peter Mosmans27 May 2014, 22:26:11 UTCFix for test_bn regular expression to work on Windows using MSYS. PR#334627 May 2014, 22:30:17 UTC
677c117 Matt Caswell25 May 2014, 22:37:53 UTCFixed error in args for SSL_set_msg_callback and SSL_set_msg_callback_arg25 May 2014, 22:48:57 UTC
bb50d30 Matt Caswell24 May 2014, 22:55:27 UTCFix for non compilation with TLS_DEBUG defined24 May 2014, 23:02:38 UTC
8323996 Dr. Stephen Henson21 May 2014, 09:50:19 UTCFix for PKCS12_create if no-rc2 specified. Use triple DES for certificate encryption if no-rc2 is specified. PR#3357 (cherry picked from commit 03b5b78c09fb10839a565f341cdc527c675e89ce)21 May 2014, 10:30:34 UTC
ee14e33 Dr. Stephen Henson21 May 2014, 09:39:11 UTCChange default cipher in smime app to des3. PR#3357 (cherry picked from commit ca3ffd9670f2b589bf8cc04923f953e06d6fbc58) Conflicts: doc/apps/smime.pod21 May 2014, 10:21:12 UTC
1bcb94a Matt Caswell15 May 2014, 20:19:46 UTCRemoved note in BUGS section about AEAD ciphers - inadvertently added to wrong branch15 May 2014, 20:24:07 UTC
9658c63 Jeffrey Walton14 May 2014, 21:49:30 UTCFix grammar error in verify pod. PR#335514 May 2014, 22:00:57 UTC
7ee8b27 Jeffrey Walton14 May 2014, 21:48:26 UTCAdd information to BUGS section of enc documentation. PR#335414 May 2014, 22:00:57 UTC
e4ea6f0 Michal Bozon14 May 2014, 20:07:51 UTCCorrected POD syntax errors. PR#335314 May 2014, 22:00:56 UTC
a2c00fb Kurt Roeckx12 May 2014, 16:19:14 UTCCheck sk_SSL_CIPHER_num() after assigning sk.12 May 2014, 22:07:44 UTC
d06ae0f Günther Noack01 May 2014, 11:33:11 UTCAvoid out-of-bounds write in SSL_get_shared_ciphers PR: 331711 May 2014, 23:04:57 UTC
afa2ea2 Viktor Dukhovni11 May 2014, 19:28:56 UTCFix infinite loop. PR#334711 May 2014, 20:20:00 UTC
0b6394c Tim Hudson11 May 2014, 12:29:59 UTCsafety check to ensure we dont send out beyond the users buffer11 May 2014, 12:38:23 UTC
70ddf8e Dr. Stephen Henson08 May 2014, 12:17:11 UTCReturn an error if no recipient type matches. If the key type does not match any CMS recipient type return an error instead of using a random key (MMA mitigation). This does not leak any useful information to an attacker. PR#3348 (cherry picked from commit 83a3182e0560f76548f4378325393461f6275493)08 May 2014, 12:18:49 UTC
9febee0 Geoff Thorpe04 May 2014, 22:44:14 UTCevp: prevent underflow in base64 decoding This patch resolves RT ticket #2608. Thanks to Robert Dugal for originally spotting this, and to David Ramos for noticing that the ball had been dropped. Signed-off-by: Geoff Thorpe <geoff@openssl.org>06 May 2014, 22:23:54 UTC
a721216 Geoff Thorpe04 May 2014, 20:19:22 UTCbignum: allow concurrent BN_MONT_CTX_set_locked() The lazy-initialisation of BN_MONT_CTX was serialising all threads, as noted by Daniel Sands and co at Sandia. This was to handle the case that 2 or more threads race to lazy-init the same context, but stunted all scalability in the case where 2 or more threads are doing unrelated things! We favour the latter case by punishing the former. The init work gets done by each thread that finds the context to be uninitialised, and we then lock the "set" logic after that work is done - the winning thread's work gets used, the losing threads throw away what they've done. Signed-off-by: Geoff Thorpe <geoff@openssl.org>06 May 2014, 22:23:49 UTC
47f689a Dr. Stephen Henson06 May 2014, 13:07:37 UTCInitialize num properly. PR#3289 PR#3345 (cherry picked from commit 3ba1e406c2309adb427ced9815ebf05f5b58d155)06 May 2014, 13:09:26 UTC
f51f374 Dr. Stephen Henson06 May 2014, 13:02:17 UTCSet Enveloped data version to 2 if ktri version not zero. (cherry picked from commit 9c5d953a07f472452ae2cb578e39eddea2de2b9c)06 May 2014, 13:05:05 UTC
3c1128f Steve Marquess24 April 2014, 11:13:05 UTCAdd new sponsors (cherry picked from commit 351f0a124bffaa94d2a8abdec2e7dde5ae9c457d)24 April 2014, 11:31:42 UTC
8185c94 Dr. Stephen Henson11 April 2014, 01:50:51 UTCAdd new key fingerprint. (cherry picked from commit 3143a332e8f2f5ca1a6f0262a1a1a66103f2adf7)11 April 2014, 01:52:14 UTC
c61f0cb Dr. Stephen Henson09 April 2014, 14:42:40 UTCFix free errors in ocsp utility. Keep copy of any host, path and port values allocated by OCSP_parse_url and free as necessary. (cherry picked from commit 5219d3dd350cc74498dd49daef5e6ee8c34d9857)09 April 2014, 14:45:56 UTC
d90605d Dr. Stephen Henson04 April 2014, 11:46:39 UTCUpdate FAQ. (cherry picked from commit 6cc0068430d0a4abdef0b466d422e6a4d154a5fe)04 April 2014, 12:09:13 UTC
e563349 Dr. Stephen Henson04 April 2014, 11:44:43 UTCUse correct length when prompting for password. Use bufsiz - 1 not BUFSIZ - 1 when prompting for a password in the openssl utility. Thanks to Rob Mackinnon, Leviathan Security for reporting this issue. (cherry picked from commit 7ba08a4d73c1bdfd3aced09a628b1d7d7747cdca)04 April 2014, 12:09:05 UTC
9ad5c5e Eric Young02 April 2014, 18:50:33 UTCFix base64 decoding bug. A short PEM encoded sequence if passed to the BIO, and the file had 2 \n following would fail. PR#3289 (cherry picked from commit 10378fb5f4c67270b800e8f7c600cd0548874811)02 April 2014, 18:58:25 UTC
4bc24cf Dr. Stephen Henson27 March 2014, 01:03:46 UTCmake update27 March 2014, 01:03:46 UTC
79f5776 Dr. Stephen Henson27 March 2014, 01:03:07 UTCUpdate NEWS27 March 2014, 01:03:07 UTC
d79eb92 Dr. Stephen Henson12 March 2014, 14:35:54 UTCUpdate ordinals. Use a previously unused value as we will be updating multiple released branches. (cherry picked from commit 0737acd2a8cc688902b5151cab5dc6737b82fb96)27 March 2014, 00:59:48 UTC
fff69a7 mancha27 March 2014, 00:55:08 UTCFix for CVE-2014-0076 backported to 0.9.8 branch Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" by Yuval Yarom and Naomi Benger. Details can be obtained from: http://eprint.iacr.org/2014/140 Thanks to Yuval Yarom and Naomi Benger for discovering this flaw and to Yuval Yarom for supplying a fix. Thanks for mancha for backporting the fix to OpenSSL 0.9.8 branch.27 March 2014, 00:55:08 UTC
a375025 mancha27 March 2014, 00:47:14 UTCFix alert handling. Fix OpenSSL 0.9.8 alert handling. PR#303827 March 2014, 00:54:16 UTC
d471adf Dr. Stephen Henson15 February 2014, 01:27:56 UTCRemove duplicate statement. (cherry picked from commit 5a7652c3e585e970e5b778074c92e617e48fde38)15 February 2014, 01:31:34 UTC
2fb8642 Dr. Stephen Henson29 January 2014, 00:59:35 UTCClarify docs. Remove reference to ERR_TXT_MALLOCED in the error library as that is only used internally. Indicate that returned error data must not be freed. (cherry picked from commit f2d678e6e89b6508147086610e985d4e8416e867)29 January 2014, 01:02:35 UTC
c44d95c Dr. Stephen Henson10 January 2014, 23:03:47 UTCfix shell syntax PR#3216 (cherry picked from commit 080ae6843299c873808c04487d4ccf51624fe618)10 January 2014, 23:04:40 UTC
0da40f0 Dr. Stephen Henson04 January 2014, 13:50:52 UTCRestore SSL_OP_MSIE_SSLV2_RSA_PADDING The flag SSL_OP_MSIE_SSLV2_RSA_PADDING hasn't done anything since OpenSSL 0.9.7h but deleting it will break source compatibility with any software that references it. Restore it but #define to zero. (cherry picked from commit b17d6b8d1d49fa4732deff17cfd1833616af0d9c)04 January 2014, 14:01:25 UTC
7f722c9 Dr. Stephen Henson10 December 2013, 00:11:06 UTCremove obsolete STATUS file10 December 2013, 00:11:06 UTC
4268216 Dr. Stephen Henson09 December 2013, 23:53:28 UTCAdd release dates to NEWS09 December 2013, 23:53:28 UTC
17540b7 Dr. Stephen Henson27 November 2013, 15:37:39 UTCSimplify and update openssl.spec27 November 2013, 15:37:39 UTC
b70e4d3 Dr. Stephen Henson21 November 2013, 15:47:19 UTCFixes for no-static-engine and Windows builds.21 November 2013, 15:49:34 UTC
d9519a4 Rob Stradling12 September 2013, 20:47:25 UTCUpdate CHANGES.04 October 2013, 13:55:01 UTC
5ac9786 Rob Stradling10 September 2013, 12:04:05 UTCFix compilation with this branch's definition of SSL_CIPHER.04 October 2013, 13:55:01 UTC
0b05204 Rob Stradling10 September 2013, 11:46:24 UTCRemove empty line.04 October 2013, 13:55:01 UTC
a4bfeff Rob Stradling10 September 2013, 11:45:34 UTCTidy up comments.04 October 2013, 13:55:01 UTC
43433b3 Rob Stradling10 September 2013, 11:43:33 UTCUse TLS version supplied by client when fingerprinting Safari.04 October 2013, 13:55:01 UTC
020a478 Rob Stradling10 September 2013, 11:42:46 UTCBackport TLS 1.1/1.2 #defines04 October 2013, 13:55:01 UTC
cadbbd5 Rob Stradling10 September 2013, 11:41:37 UTCDon't prefer ECDHE-ECDSA ciphers when the client appears to be Safari on OS X. OS X 10.8..10.8.3 has broken support for ECDHE-ECDSA ciphers.04 October 2013, 13:55:01 UTC
ff7b021 Bodo Moeller16 September 2013, 10:59:21 UTCFix overly lenient comparisons: - EC_GROUP_cmp shouldn't consider curves equal just because the curve name is the same. (They really *should* be the same in this case, but there's an EC_GROUP_set_curve_name API, which could be misused.) - EC_POINT_cmp shouldn't return 0 for ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED or EC_R_INCOMPATIBLE_OBJECTS errors because in a cmp API, 0 indicates equality (not an error). Reported by: king cope (cherry picked from commit ca567a03ad4595589b6062465a8404764da4e3fa) Conflicts: Configure17 September 2013, 08:20:04 UTC
e7e4d50 Dr. Stephen Henson20 August 2013, 15:33:02 UTCCorrect ECDSA example. (cherry picked from commit 3a918ea2bbf4175d9461f81be1403d3781b2c0dc)20 August 2013, 16:31:53 UTC
9204e7e Michael Tuexen13 August 2013, 17:53:19 UTCDTLS message_sequence number wrong in rehandshake ServerHello This fix ensures that * A HelloRequest is retransmitted if not responded by a ClientHello * The HelloRequest "consumes" the sequence number 0. The subsequent ServerHello uses the sequence number 1. * The client also expects the sequence number of the ServerHello to be 1 if a HelloRequest was received earlier. This patch fixes the RFC violation. Conflicts: ssl/d1_pkt.c (cherry picked from commit 6f87807e629ee10ec0006b39d8851af8c5ade67b)13 August 2013, 18:00:59 UTC
257df40 Michael Tuexen08 August 2013, 12:28:55 UTCDTLS handshake fix. Reported by: Prashant Jaikumar <rmstar@gmail.com> Fix handling of application data received before a handshake. (cherry picked from commit 0c75eeacd3285b395dc75b65c3e6fe6ffbef59f0)08 August 2013, 12:33:20 UTC
a44c9b9 Dr. Stephen Henson08 April 2013, 17:03:12 UTCSet s->d1 to NULL after freeing it. (cherry picked from commit 04638f2fc335a6dc2af8e5d556d36e29c261dcd2)08 April 2013, 17:40:39 UTC
1cbd745 Dr. Stephen Henson07 April 2013, 16:23:21 UTCPrint out DSA key if parameters absent. In DSA_print DSA parameters can be absent (e.g inherited) it is not a fatal error.07 April 2013, 21:50:55 UTC
e1e39a2 Dr. Stephen Henson19 March 2013, 13:46:28 UTCDisable compression for DTLS. The only standard compression method is stateful and is incompatible with DTLS. (cherry picked from commit e14b8410ca882da8e9579a2d928706f894c8e1ae)19 March 2013, 13:48:02 UTC
01de6e2 Andy Polyakov18 March 2013, 19:03:44 UTCx86cpuid.pl: make it work with older CPU. PR: 3005, from master18 March 2013, 19:03:44 UTC
05689a1 Michael Tuexen18 March 2013, 14:30:38 UTCAvoid unnecessary fragmentation. (cherry picked from commit 80ccc66d7eedb2d06050130c77c482ae1584199a)18 March 2013, 14:33:27 UTC
1643edc Dr. Stephen Henson18 March 2013, 14:19:40 UTCEncode INTEGER correctly. If an ASN1_INTEGER structure is allocated but not explicitly set encode it as zero: don't generate an invalid zero length INTEGER.18 March 2013, 14:19:40 UTC
1546fb7 Dr. Stephen Henson18 March 2013, 13:58:32 UTCTypo.18 March 2013, 13:58:32 UTC
b7d222c Dr. Stephen Henson26 February 2013, 17:13:37 UTCMerge branch 'OpenSSL_0_9_8-stable' of /home/steve/src/git/openssl into OpenSSL_0_9_8-stable26 February 2013, 17:13:37 UTC
a93cc7c Geoff Lowe26 February 2013, 17:12:13 UTCUse orig_len, not rec->orig_len26 February 2013, 17:12:13 UTC
8988407 Nick Alcock15 February 2013, 17:44:11 UTCFix POD errors to stop make install_docs dying with pod2man 2.5.0+ podlators 2.5.0 has switched to dying on POD syntax errors. This means that a bunch of long-standing erroneous POD in the openssl documentation now leads to fatal errors from pod2man, halting installation. Unfortunately POD constraints mean that you have to sort numeric lists in ascending order if they start with 1: you cannot do 1, 0, 2 even if you want 1 to appear first. I've reshuffled such (alas, I wish there were a better way but I don't know of one).15 February 2013, 18:43:49 UTC
b2afc0a Andy Polyakov16 May 2011, 18:11:45 UTCcms-test.pl: make it work with not-so-latest perl. (cherry picked from commit 9c437e2faded18b4ef6499d7041c65d6e216955b)14 February 2013, 15:40:55 UTC
a8655eb David Woodhouse12 February 2013, 15:09:44 UTCCheck DTLS_BAD_VER for version number. Need to check DTLS_BAD_VER as well as DTLS1_VERSION. PR:2984 (cherry picked from commit 6a14feb048c0b7ad4da341fca364171e273da325)12 February 2013, 15:12:52 UTC
f751dc4 Dr. Stephen Henson11 February 2013, 18:24:03 UTCFix for SSL_get_certificate Now we set the current certificate to the one used by a server there is no need to call ssl_get_server_send_cert which will fail if we haven't sent a certificate yet. (cherry picked from commit 147dbb2fe3bead7a10e2f280261b661ce7af7adc)11 February 2013, 18:27:41 UTC
fbe621d Dr. Stephen Henson11 February 2013, 18:17:50 UTCFix in ssltest is no-ssl2 configured (cherry picked from commit cbf9b4aed3e209fe8a39e1d6f55aaf46d1369dc4)11 February 2013, 18:27:33 UTC
2e9fd43 Dr. Stephen Henson11 February 2013, 15:05:49 UTCuse 10240 for tar record size11 February 2013, 15:20:57 UTC
1638ce7 Lutz Jaenicke11 February 2013, 10:29:05 UTCFAQ/README: we are now using Git instead of CVS (cherry picked from commit f88dbb8385c199a2a28e9525c6bba3a64bda96af) Conflicts: INSTALL.W3211 February 2013, 10:31:48 UTC
7ecd974 Dr. Stephen Henson10 February 2013, 13:30:04 UTCSet next version. Note: it was decided that after 0.9.8y it should be 0.9.8za then 0.9.8zb etc.10 February 2013, 13:30:04 UTC
db731da Andy Polyakov09 February 2013, 18:38:47 UTCssl/s3_[clnt|srvr].c: fix warning and linking error. PR: 297909 February 2013, 18:38:47 UTC
5864fd2 Andy Polyakov08 February 2013, 20:30:52 UTCs3_cbc.c: make CBC_MAC_ROTATE_IN_PLACE universal. (cherry picked from commit f93a41877d8d7a287debb7c63d7b646abaaf269c)08 February 2013, 20:38:06 UTC
ff58eaa Andy Polyakov08 February 2013, 15:59:26 UTCs3_cbc.c: get rid of expensive divisions [from master]. (cherry picked from commit e9baceab5a385e570706ca98dec768b2d89d1ac6)08 February 2013, 16:01:55 UTC
76c61a5 Andy Polyakov08 February 2013, 11:03:16 UTCssl/s3_enc.c: remove artefact.08 February 2013, 11:03:16 UTC
  • Newer
  • Older

ENEA — Copyright (C), ENEA. License: GNU AGPLv3+.
Legal notes  ::  JavaScript license information ::  Web API

back to top