OpenBSD CVS

CVS log for src/lib/libssl/ssl3.h


[BACK] Up to [local] / src / lib / libssl

Request diff between arbitrary revisions


Default branch: MAIN


Revision 1.60 / (download) - annotate - [select for diffs], Sat Mar 2 11:47:41 2024 UTC (3 months, 1 week ago) by tb
Branch: MAIN
CVS Tags: OPENBSD_7_5_BASE, OPENBSD_7_5, HEAD
Changes since 1.59: +1 -2 lines
Diff to previous 1.59 (colored)

Garbage collect TLS1_FLAGS_SKIP_CERT_VERIFY

And here goes another weird-ass thing of dubious pedigree.

ok jsing

Revision 1.59 / (download) - annotate - [select for diffs], Sat Mar 2 11:46:55 2024 UTC (3 months, 1 week ago) by tb
Branch: MAIN
Changes since 1.58: +1 -14 lines
Diff to previous 1.58 (colored)

Make {SSL3,TLS}_CT_* internal

And here goes a bunch of unused macros that just had to be in two
headers so they could get out of sync. Three of these constants
are used in a single function...

ok jsing

Revision 1.58 / (download) - annotate - [select for diffs], Sat Feb 3 15:58:33 2024 UTC (4 months, 1 week ago) by beck
Branch: MAIN
Changes since 1.57: +2 -2 lines
Diff to previous 1.57 (colored)

Remove GOST and STREEBOG support from libssl.

This version of GOST is old and not anywhere close to compliant with
modern GOST standards. It is also very intrusive in libssl and
makes a mess everywhere.  Efforts to entice a suitably minded anyone
to care about it have been unsuccessful.

At this point it is probably best to remove this, and if someone
ever showed up who truly needed a working version, it should be
a clean implementation from scratch, and have it use something
closer to the typical API in libcrypto so it would integrate less
painfully here.

This removes it from libssl in preparation for it's removal from
libcrypto with a future major bump

ok tb@

Revision 1.57 / (download) - annotate - [select for diffs], Fri Sep 10 14:49:13 2021 UTC (2 years, 9 months ago) by tb
Branch: MAIN
CVS Tags: OPENBSD_7_4_BASE, OPENBSD_7_4, OPENBSD_7_3_BASE, OPENBSD_7_3, OPENBSD_7_2_BASE, OPENBSD_7_2, OPENBSD_7_1_BASE, OPENBSD_7_1, OPENBSD_7_0_BASE, OPENBSD_7_0
Changes since 1.56: +1 -25 lines
Diff to previous 1.56 (colored)

Remove SSL3_RECORD and SSL3_BUFFER

with/ok jsing

Revision 1.56 / (download) - annotate - [select for diffs], Fri Sep 10 14:47:24 2021 UTC (2 years, 9 months ago) by tb
Branch: MAIN
Changes since 1.55: +1 -2 lines
Diff to previous 1.55 (colored)

Remove TLS1_RT_HEARTBEAT

ok jsing

Revision 1.55 / (download) - annotate - [select for diffs], Wed Jun 30 18:04:06 2021 UTC (2 years, 11 months ago) by jsing
Branch: MAIN
Changes since 1.54: +1 -16 lines
Diff to previous 1.54 (colored)

Move some structs from public to private headers.

Move struct ssl_cipher_st, struct ssl_method_st, struct ssl_session_st and
struct ssl3_state_st from public to private headers. These are already
under #ifdef LIBRESSL_INTERNAL and are no longer publicly visible.

ok inoguchi@ tb@

Revision 1.54 / (download) - annotate - [select for diffs], Sun Jun 13 15:47:11 2021 UTC (2 years, 11 months ago) by jsing
Branch: MAIN
Changes since 1.53: +3 -1 lines
Diff to previous 1.53 (colored)

Define SSL_AD_* as actual values.

Rather than having SSL_AD_* as defines that refer to SSL3_AD_* or
TLS1_AD_*, just give them actual values directly since it is more readable
and the indirection provides no value. Place SSL3_AD_* and TLS1_AD_* under
#ifndef LIBRESSL_INTERNAL to prevent further usage.

ok tb@

Revision 1.53 / (download) - annotate - [select for diffs], Mon May 10 17:10:57 2021 UTC (3 years, 1 month ago) by tb
Branch: MAIN
Changes since 1.52: +2 -2 lines
Diff to previous 1.52 (colored)

Make SSL_CIPHER, SSL_CTX, SSL_SESSION, {DTLS1,SSL3}_STATE
and a few other structs in libssl opaque.

from/ok jsing

Revision 1.52 / (download) - annotate - [select for diffs], Sun May 2 18:10:32 2021 UTC (3 years, 1 month ago) by tb
Branch: MAIN
Changes since 1.51: +3 -1 lines
Diff to previous 1.51 (colored)

Prevent future internal use of some #defines

After jsing's recent commits, SSL3_CC_{READ,WRITE,CLIENT,SERVER}
and the derived SSL3_CHANGE_CIPHER_{CLIENT,SERVER}_{READ,WRITE}
are no longer used by LibreSSL and should never be used again.

discussed with jsing

Revision 1.51 / (download) - annotate - [select for diffs], Fri Jun 5 18:14:05 2020 UTC (4 years ago) by jsing
Branch: MAIN
CVS Tags: OPENBSD_6_9_BASE, OPENBSD_6_9, OPENBSD_6_8_BASE, OPENBSD_6_8
Changes since 1.50: +2 -2 lines
Diff to previous 1.50 (colored)

Use IANA allocated GOST ClientCertificateTypes.

IANA has allocated numbers for GOST ClientCertificateType. Use them in
addition to private values (left in place for compatibility).

Diff from Dmitry Baryshkov <dbaryshkov@gmail.com>

Sponsored by ROSA Linux

ok inoguchi@ tb@

Revision 1.50 / (download) - annotate - [select for diffs], Thu Mar 12 17:01:53 2020 UTC (4 years, 3 months ago) by jsing
Branch: MAIN
CVS Tags: OPENBSD_6_7_BASE, OPENBSD_6_7
Changes since 1.49: +3 -1 lines
Diff to previous 1.49 (colored)

Use internal versions of SSL3_BUFFER, SSL3_RECORD and DTLS1_RECORD_DATA.

SSL3_BUFFER, SSL3_RECORD and DTLS1_RECORD_DATA are currently still in
public headers, even though their usage is internal. This moves to
using _INTERNAL suffixed versions that are in internal headers, which
then allows us to change them without any potential public API fallout.

ok inoguchi@ tb@

Revision 1.49 / (download) - annotate - [select for diffs], Thu Nov 8 22:28:52 2018 UTC (5 years, 7 months ago) by jsing
Branch: MAIN
CVS Tags: OPENBSD_6_6_BASE, OPENBSD_6_6, OPENBSD_6_5_BASE, OPENBSD_6_5
Changes since 1.48: +2 -2 lines
Diff to previous 1.48 (colored)

Clean up and simplify the handshake transcript code.

This provides a cleaner, simpler and more readable API, with code that uses
a BUF_MEM instead of a BIO.

ok beck@ ("hurry up") and tb@.

Revision 1.48 / (download) - annotate - [select for diffs], Wed Oct 24 18:04:50 2018 UTC (5 years, 7 months ago) by jsing
Branch: MAIN
Changes since 1.47: +1 -13 lines
Diff to previous 1.47 (colored)

Make more of libssl's record layer state internal.

In January 2017, we changed large amounts of libssl's data structures to
be non-visible/internal, however intentionally left things that the
software ecosystem was needing to use. The four or so applications that
reached into libssl for record layer related state now implement
alternative code. As such, make these data structures internal.

ok tb@

Revision 1.47 / (download) - annotate - [select for diffs], Sat Apr 7 16:55:13 2018 UTC (6 years, 2 months ago) by jsing
Branch: MAIN
CVS Tags: OPENBSD_6_4_BASE, OPENBSD_6_4
Changes since 1.46: +1 -5 lines
Diff to previous 1.46 (colored)

Nuke SSL3_FLAGS_DELAY_CLIENT_FINISHED and SSL3_FLAGS_POP_BUFFER.

These flags enabled experimental behaviour in the write path, which nothing
uses. Removing this code greatly simplifies ssl3_write().

ok beck@ inoguchi@ sthen@ tb@

Revision 1.46 / (download) - annotate - [select for diffs], Mon Aug 28 17:36:58 2017 UTC (6 years, 9 months ago) by jsing
Branch: MAIN
CVS Tags: OPENBSD_6_3_BASE, OPENBSD_6_3, OPENBSD_6_2_BASE, OPENBSD_6_2
Changes since 1.45: +1 -7 lines
Diff to previous 1.45 (colored)

Completely remove NPN remnants.

Based on a diff from doug@, similar diff from inoguchi@

Revision 1.45 / (download) - annotate - [select for diffs], Sun Jan 22 09:02:07 2017 UTC (7 years, 4 months ago) by jsing
Branch: MAIN
CVS Tags: OPENBSD_6_1_BASE, OPENBSD_6_1
Changes since 1.44: +2 -115 lines
Diff to previous 1.44 (colored)

Move most of the SSL3_STATE fields to internal - the ones that remain are
known to be used by ports.

ok beck@

Revision 1.44 / (download) - annotate - [select for diffs], Sun Jan 22 03:50:45 2017 UTC (7 years, 4 months ago) by jsing
Branch: MAIN
Changes since 1.43: +5 -1 lines
Diff to previous 1.43 (colored)

Convert publically visible structs to translucent structs.

This change adds an internal opaque struct for each of the significant
publically visible structs. The opaque struct is then allocated and
attached to the publically visible struct when the appropriate *_new()
function is called, then cleared and freed as necessary.

This will allow for changes to be made to the internals of libssl, without
requiring a major bump each time the publically visible structs are
modified.

ok beck@

Revision 1.43 / (download) - annotate - [select for diffs], Fri Dec 30 15:10:57 2016 UTC (7 years, 5 months ago) by jsing
Branch: MAIN
Changes since 1.42: +2 -1 lines
Diff to previous 1.42 (colored)

Explicitly include openssl/opensslconf.h in headers that use OPENSSL_NO_*
defines - do not rely on another heading making those available for us.

Revision 1.42 / (download) - annotate - [select for diffs], Wed Dec 21 16:44:31 2016 UTC (7 years, 5 months ago) by jsing
Branch: MAIN
Changes since 1.41: +3 -1 lines
Diff to previous 1.41 (colored)

Add support for ECDHE with X25519.

Testing of an earlier revision by naddy@.

ok beck@

Revision 1.41 / (download) - annotate - [select for diffs], Sun Jul 19 06:23:51 2015 UTC (8 years, 10 months ago) by doug
Branch: MAIN
Changes since 1.40: +1 -10 lines
Diff to previous 1.40 (colored)

Crank major and remove legacy variables.

Libtls is riding this crank.

ok miod@ bcook@

Revision 1.40 / (download) - annotate - [select for diffs], Sat Jul 18 19:41:54 2015 UTC (8 years, 10 months ago) by doug
Branch: MAIN
Changes since 1.39: +2 -2 lines
Diff to previous 1.39 (colored)

Remove SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER workaround.

This was a hack to work around problems on IE 6 with SSLv3.

ok miod@ bcook@

Revision 1.39 / (download) - annotate - [select for diffs], Fri Jul 17 15:50:37 2015 UTC (8 years, 10 months ago) by doug
Branch: MAIN
Changes since 1.38: +5 -4 lines
Diff to previous 1.38 (colored)

Remove compat hack that disabled ECDHE-ECDSA on OS X.

For a few old releases, ECDHE-ECDSA was broken on OS X.  This option
cannot differentiate between working and broken OS X so it disabled
ECDHE-ECDSA support on all OS X >= 10.6.  10.8-10.8.3 were the faulty
releases but these are no longer relevant.  Tested on OS X 10.10 by jsing.

ok jsing@

Revision 1.38 / (download) - annotate - [select for diffs], Fri Jul 17 07:04:41 2015 UTC (8 years, 10 months ago) by doug
Branch: MAIN
Changes since 1.37: +2 -2 lines
Diff to previous 1.37 (colored)

Remove workaround for TLS padding bug from SSLeay days.

OpenSSL doesn't remember which clients were impacted and the
functionality has been broken in their stable releases for 2 years.

Based on OpenSSL commit a8e4ac6a2fe67c19672ecf0c6aeafa15801ce3a5.

ok jsing@

Revision 1.37 / (download) - annotate - [select for diffs], Thu Jun 18 22:51:05 2015 UTC (8 years, 11 months ago) by doug
Branch: MAIN
Changes since 1.36: +1 -12 lines
Diff to previous 1.36 (colored)

Remove Microsoft Server Gated Crypto.

Another relic due to the old US crypto policy.

From OpenSSL commit 63eab8a620944a990ab3985620966ccd9f48d681 and
95275599399e277e71d064790a1f828a99fc661a.

ok jsing@ miod@

Revision 1.36 / (download) - annotate - [select for diffs], Sun Feb 22 15:54:27 2015 UTC (9 years, 3 months ago) by jsing
Branch: MAIN
Changes since 1.35: +5 -2 lines
Diff to previous 1.35 (colored)

Reluctantly add server-side support for TLS_FALLBACK_SCSV.

This allows for clients that willingly choose to perform a downgrade and
attempt to establish a second connection at a lower protocol after the
previous attempt unexpectedly failed, to be notified and have the second
connection aborted, if the server does in fact support a higher protocol.

TLS has perfectly good version negotiation and client-side fallback is
dangerous. Despite this, in order to maintain maximum compatability with
broken web servers, most mainstream browsers implement this. Furthermore,
TLS_FALLBACK_SCSV only works if both the client and server support it and
there is effectively no way to tell if this is the case, unless you control
both ends.

Unfortunately, various auditors and vulnerability scanners (including
certain online assessment websites) consider the presence of a not yet
standardised feature to be important for security, even if the clients do
not perform client-side downgrade or the server only supports current TLS
protocols.

Diff is loosely based on OpenSSL with some inspiration from BoringSSL.

Discussed with beck@ and miod@.

ok bcook@

Revision 1.35 / (download) - annotate - [select for diffs], Thu Feb 12 03:45:25 2015 UTC (9 years, 4 months ago) by jsing
Branch: MAIN
Changes since 1.34: +1 -9 lines
Diff to previous 1.34 (colored)

unifdef -m -UOPENSSL_NO_NEXTPROTONEG - NPN is being replaced with ALPN,
however it is not likely to be removed any time soon.

ok beck@ miod@

Revision 1.34 / (download) - annotate - [select for diffs], Mon Feb 9 10:53:28 2015 UTC (9 years, 4 months ago) by jsing
Branch: MAIN
Changes since 1.33: +1 -9 lines
Diff to previous 1.33 (colored)

Jettison DTLS over SCTP.

OpenBSD does not have SCTP support and it sees little use in the wild.
OPENSSL_NO_SCTP is already specified via opensslfeatures.h, hence this
is a code removal only and symbols should remain unchanged.

ok beck@ miod@ tedu@

Revision 1.33 / (download) - annotate - [select for diffs], Sun Dec 14 21:49:29 2014 UTC (9 years, 5 months ago) by bcook
Branch: MAIN
Changes since 1.32: +2 -15 lines
Diff to previous 1.32 (colored)

unconditionally align SSL payloads

Remove support for conditional payload alignment, since we would never
want to turn it off. Also, consistently use size_t for calculating the
alignment.

ok miod@

Revision 1.32 / (download) - annotate - [select for diffs], Sun Dec 14 16:07:26 2014 UTC (9 years, 5 months ago) by jsing
Branch: MAIN
Changes since 1.31: +4 -2 lines
Diff to previous 1.31 (colored)

Provide functions for starting, finishing and writing SSL handshake
messages. This will allow for removal of repeated/duplicated code.

Additionally, DTLS was written by wholesale copying of the SSL/TLS code,
with some DTLS specifics being added to the duplicated code. Since these
SSL handshake message functions know how to handle both SSL/TLS and DTLS,
upon conversion the duplicate versions will become identical (or close to),
at which point the DTLS versions can be removed and the SSL/TLS versions
used for both protocols.

Partially based on similar changes in OpenSSL.

ok miod@

Revision 1.31 / (download) - annotate - [select for diffs], Sun Dec 14 15:30:50 2014 UTC (9 years, 5 months ago) by jsing
Branch: MAIN
Changes since 1.30: +14 -14 lines
Diff to previous 1.30 (colored)

Remove trailing whitespace.

Revision 1.30 / (download) - annotate - [select for diffs], Wed Dec 10 14:58:56 2014 UTC (9 years, 6 months ago) by jsing
Branch: MAIN
Changes since 1.29: +15 -1 lines
Diff to previous 1.29 (colored)

Add support for ALPN.

Based on OpenSSL and BoringSSL.

ok bcook@

Revision 1.29 / (download) - annotate - [select for diffs], Tue Nov 18 05:33:43 2014 UTC (9 years, 6 months ago) by miod
Branch: MAIN
Changes since 1.28: +2 -2 lines
Diff to previous 1.28 (colored)

Update the GOST code in libssl, as contributed by Dmitry Eremin-Solenikov.

This causes a libssl major version bump as this affects the layout of some
internal-but-unfortunately-made-visible structs.

Revision 1.28 / (download) - annotate - [select for diffs], Fri Oct 31 15:34:06 2014 UTC (9 years, 7 months ago) by jsing
Branch: MAIN
Changes since 1.27: +1 -3 lines
Diff to previous 1.27 (colored)

Remove now unused remnants from public structs.

Revision 1.27 / (download) - annotate - [select for diffs], Fri Oct 31 14:51:01 2014 UTC (9 years, 7 months ago) by jsing
Branch: MAIN
Changes since 1.26: +2 -2 lines
Diff to previous 1.26 (colored)

Remove support for ephemeral/temporary RSA private keys.

The only use for these is via SSL_OP_EPHEMERAL_RSA (which is effectively
a standards violation) and for RSA sign-only, should only be possible if
you are using an export cipher and have an RSA private key that is more
than 512 bits in size (however we no longer support export ciphers).

ok bcook@ miod@

Revision 1.26 / (download) - annotate - [select for diffs], Mon Aug 11 01:10:42 2014 UTC (9 years, 10 months ago) by jsing
Branch: MAIN
Changes since 1.25: +2 -1 lines
Diff to previous 1.25 (colored)

Currently, ssl3_put_char_by_bytes(NULL, NULL) is just a long handed way
of writing "2". Add a define for the SSL3_CIPHER_VALUE_SIZE (rather than
using a less-readable hardcoded constant everywhere) and replace the
ssl3_put_char_by_bytes(NULL, NULL) calls with it.

ok bcook@ miod@

Revision 1.25 / (download) - annotate - [select for diffs], Thu Jul 10 09:26:08 2014 UTC (9 years, 11 months ago) by jsing
Branch: MAIN
Changes since 1.24: +1 -2 lines
Diff to previous 1.24 (colored)

Put back some parts of the public SSL API that should not have been
completely decompressed.

Revision 1.24 / (download) - annotate - [select for diffs], Thu Jul 10 08:51:15 2014 UTC (9 years, 11 months ago) by tedu
Branch: MAIN
Changes since 1.23: +1 -15 lines
Diff to previous 1.23 (colored)

decompress libssl. ok beck jsing

Revision 1.23 / (download) - annotate - [select for diffs], Fri Jun 13 11:52:03 2014 UTC (10 years ago) by jsing
Branch: MAIN
Changes since 1.22: +2 -1 lines
Diff to previous 1.22 (colored)

Add support for handling SSL_CIPHER_ALGORITHM2_AEAD ciphers, which are
those that use EVP_AEAD instead ov EVP_CIPHER. This means being able to
change cipher state with an EVP_AEAD and being able to encrypt/decrypt
TLS using the EVP_AEAD. This has no change on existing
non-SSL_CIPHER_ALGORITHM2_AEAD ciphers.

Based on Adam Langley's chromium patches.

Rides the recent libssl bump.

Tested by sthen@

Revision 1.22 / (download) - annotate - [select for diffs], Fri Jun 13 04:29:13 2014 UTC (10 years ago) by miod
Branch: MAIN
Changes since 1.21: +1 -10 lines
Diff to previous 1.21 (colored)

Remove support for the `opaque PRF input' extension, which draft has expired
7 years ago and never made it into an RFC. That code wasn't compiled in
anyway unless one would define the actual on-the-wire extension id bytes;
crank libssl major.

With help and enlightenment from Brendan MacDonell.

Revision 1.21 / (download) - annotate - [select for diffs], Thu Jun 12 15:49:31 2014 UTC (10 years ago) by deraadt
Branch: MAIN
Changes since 1.20: +1 -1 lines
Diff to previous 1.20 (colored)

tags as requested by miod and tedu

Revision 1.20 / (download) - annotate - [select for diffs], Sun Jun 8 15:10:14 2014 UTC (10 years ago) by jsing
Branch: MAIN
Changes since 1.19: +3 -2 lines
Diff to previous 1.19 (colored)

Add a define for the SSLv3 sequence size and use it, rather than sprinkling
magic numbers around.

ok deraadt@

Revision 1.19 / (download) - annotate - [select for diffs], Thu Jun 5 15:46:24 2014 UTC (10 years ago) by jsing
Branch: MAIN
Changes since 1.18: +1 -0 lines
Diff to previous 1.18 (colored)

Be selective as to when ChangeCipherSpec messages will be accepted.
Without this an early ChangeCipherSpec message would result in session
keys being generated, along with the Finished hash for the handshake,
using an empty master secret.

For a detailed analysis see:

  https://www.imperialviolet.org/2014/06/05/earlyccs.html

This is a fix for CVE-2014-0224, from OpenSSL.

This issue was reported to OpenSSL by KIKUCHI Masashi. Unfortunately the
recent OpenSSL commit was the first we were made aware of the issue.

ok deraadt@ sthen@

Revision 1.18 / (download) - annotate - [select for diffs], Sat May 31 10:53:39 2014 UTC (10 years ago) by jsing
Branch: MAIN
Changes since 1.17: +0 -2 lines
Diff to previous 1.17 (colored)

ECDH and ECDSA will not work overly well if there is no EC, so unifdef
OPENSSL_NO_EC.

ok tedu@

Revision 1.17 / (download) - annotate - [select for diffs], Sat May 31 10:49:28 2014 UTC (10 years ago) by jsing
Branch: MAIN
Changes since 1.16: +0 -2 lines
Diff to previous 1.16 (colored)

TLS would not be entirely functional without extensions, so unifdef
OPENSSL_NO_TLSEXT.

ok tedu@

Revision 1.16 / (download) - annotate - [select for diffs], Fri May 30 14:30:50 2014 UTC (10 years ago) by tedu
Branch: MAIN
Changes since 1.15: +0 -16 lines
Diff to previous 1.15 (colored)

remove some #if 0 code. we don't need any more reminders that we're using
a not quite appropriate data structure. ok jsing

Revision 1.15 / (download) - annotate - [select for diffs], Thu May 29 18:11:13 2014 UTC (10 years ago) by tedu
Branch: MAIN
Changes since 1.14: +0 -4 lines
Diff to previous 1.14 (colored)

unidef DH, ECDH, and ECDSA. there's no purpose to a libssl without them.
ok deraadt jsing

Revision 1.14 / (download) - annotate - [select for diffs], Sun May 25 12:19:38 2014 UTC (10 years ago) by jsing
Branch: MAIN
Changes since 1.13: +86 -85 lines
Diff to previous 1.13 (colored)

Whitespace fixes to align define values.

Revision 1.13 / (download) - annotate - [select for diffs], Tue Apr 15 12:00:25 2014 UTC (10 years, 1 month ago) by jsing
Branch: MAIN
Changes since 1.12: +34 -36 lines
Diff to previous 1.12 (colored)

First pass at applying KNF to the OpenSSL code, which almost makes it
readable. This pass is whitespace only and can readily be verified using
tr and md5.

There is still a huge amount of inconsistency within these headers.

Revision 1.12 / (download) - annotate - [select for diffs], Sun Apr 13 15:25:34 2014 UTC (10 years, 2 months ago) by miod
Branch: MAIN
Changes since 1.11: +15 -0 lines
Diff to previous 1.11 (colored)

Merge conflicts; remove MacOS, Netware, OS/2, VMS and Windows build machinery.

Revision 1.1.1.8 / (download) - annotate - [select for diffs] (vendor branch), Sun Apr 13 15:16:36 2014 UTC (10 years, 2 months ago) by miod
Changes since 1.1.1.7: +15 -0 lines
Diff to previous 1.1.1.7 (colored)

Import OpenSSL 1.0.1g

Revision 1.11 / (download) - annotate - [select for diffs], Sat Oct 13 21:25:14 2012 UTC (11 years, 8 months ago) by djm
Branch: MAIN
Changes since 1.10: +31 -1 lines
Diff to previous 1.10 (colored)

resolve conflicts

Revision 1.1.1.7 / (download) - annotate - [select for diffs] (vendor branch), Sat Oct 13 21:23:49 2012 UTC (11 years, 8 months ago) by djm
Changes since 1.1.1.6: +31 -1 lines
Diff to previous 1.1.1.6 (colored)

import OpenSSL-1.0.1c

Revision 1.10 / (download) - annotate - [select for diffs], Thu Jan 5 23:01:39 2012 UTC (12 years, 5 months ago) by djm
Branch: MAIN
Changes since 1.9: +11 -0 lines
Diff to previous 1.9 (colored)

OpenSSL 1.0.0f: merge

Revision 1.1.1.6 / (download) - annotate - [select for diffs] (vendor branch), Thu Jan 5 22:59:09 2012 UTC (12 years, 5 months ago) by djm
Changes since 1.1.1.5: +11 -0 lines
Diff to previous 1.1.1.5 (colored)

OpenSSL 1.0.0f: import upstream source

Revision 1.9 / (download) - annotate - [select for diffs], Fri Oct 1 22:59:00 2010 UTC (13 years, 8 months ago) by djm
Branch: MAIN
Changes since 1.8: +102 -31 lines
Diff to previous 1.8 (colored)

resolve conflicts, fix local changes

Revision 1.1.1.5 / (download) - annotate - [select for diffs] (vendor branch), Fri Oct 1 22:54:16 2010 UTC (13 years, 8 months ago) by djm
Changes since 1.1.1.4: +98 -26 lines
Diff to previous 1.1.1.4 (colored)

import OpenSSL-1.0.0a

Revision 1.8 / (download) - annotate - [select for diffs], Tue Nov 10 09:09:40 2009 UTC (14 years, 7 months ago) by markus
Branch: MAIN
Changes since 1.7: +5 -4 lines
Diff to previous 1.7 (colored)

pull Ben Lauries blind prefix injection fix for CVE-2009-3555 from
openssl 0.9.8l; crank minor version; ok djm@ deraadt@; initially from jsg@

Revision 1.7 / (download) - annotate - [select for diffs], Sat Sep 6 12:17:53 2008 UTC (15 years, 9 months ago) by djm
Branch: MAIN
Changes since 1.6: +40 -1 lines
Diff to previous 1.6 (colored)

resolve conflicts

Revision 1.1.1.4 / (download) - annotate - [select for diffs] (vendor branch), Sat Sep 6 12:15:51 2008 UTC (15 years, 9 months ago) by djm
Changes since 1.1.1.3: +40 -1 lines
Diff to previous 1.1.1.3 (colored)

import of OpenSSL 0.9.8h

Revision 1.6 / (download) - annotate - [select for diffs], Mon May 12 02:18:40 2003 UTC (21 years, 1 month ago) by markus
Branch: MAIN
Changes since 1.5: +35 -13 lines
Diff to previous 1.5 (colored)

merge 0.9.7b with local changes; crank majors for libssl/libcrypto

Revision 1.1.1.3 / (download) - annotate - [select for diffs] (vendor branch), Sun May 11 21:36:42 2003 UTC (21 years, 1 month ago) by markus
Changes since 1.1.1.2: +35 -13 lines
Diff to previous 1.1.1.2 (colored)

import 0.9.7b (without idea and rc5)

Revision 1.1.1.2 / (download) - annotate - [select for diffs] (vendor branch), Thu Sep 5 12:51:38 2002 UTC (21 years, 9 months ago) by markus
Changes since 1.1.1.1: +127 -78 lines
Diff to previous 1.1.1.1 (colored)

import openssl-0.9.7-beta1

Revision 1.5 / (download) - annotate - [select for diffs], Wed May 15 02:29:20 2002 UTC (22 years, 1 month ago) by beck
Branch: MAIN
Changes since 1.4: +83 -8 lines
Diff to previous 1.4 (colored)

OpenSSL 0.9.7 stable 2002 05 08 merge

Revision 1.4 / (download) - annotate - [select for diffs], Fri Dec 15 02:58:40 2000 UTC (23 years, 6 months ago) by beck
Branch: MAIN
Changes since 1.3: +4 -1 lines
Diff to previous 1.3 (colored)

openssl-engine-0.9.6 merge

Revision 1.3 / (download) - annotate - [select for diffs], Sun Mar 19 11:13:31 2000 UTC (24 years, 2 months ago) by beck
Branch: MAIN
Changes since 1.2: +31 -64 lines
Diff to previous 1.2 (colored)

OpenSSL 0.9.5 merge

*warning* this bumps shared lib minors for libssl and libcrypto from 2.1 to 2.2
if you are using the ssl26 packages for ssh and other things to work you will
need to get new ones (see ~beck/libsslsnap/<arch>) on cvs or ~beck/src-patent.tar.gz on cvs

Revision 1.2 / (download) - annotate - [select for diffs], Wed Sep 29 04:37:29 1999 UTC (24 years, 8 months ago) by beck
Branch: MAIN
Changes since 1.1: +18 -14 lines
Diff to previous 1.1 (colored)

OpenSSL 0.9.4 merge

Revision 1.1.1.1 / (download) - annotate - [select for diffs] (vendor branch), Mon Oct 5 20:13:13 1998 UTC (25 years, 8 months ago) by ryker
Changes since 1.1: +0 -0 lines
Diff to previous 1.1 (colored)

Import of SSLeay-0.9.0b with RSA and IDEA stubbed + OpenBSD build
functionality for shared libs.

Note that routines such as sslv2_init and friends that use RSA will
not work due to lack of RSA in this library.

Needs documentation and help from ports for easy upgrade to full
functionality where legally possible.

Revision 1.1 / (download) - annotate - [select for diffs], Mon Oct 5 20:13:13 1998 UTC (25 years, 8 months ago) by ryker
Branch: MAIN

Initial revision

This form allows you to request diff's between any two revisions of a file. You may select a symbolic revision name using the selection box or you may type in a numeric name using the type-in text box.