jkim
ed55404d57
Update OpenSSL to 1.1.1.
...
Note it does not update build infrastructure.
2018-09-13 20:40:51 +00:00
jkim
58e331e535
Merge OpenSSL 1.0.2p.
2018-08-14 17:48:02 +00:00
jkim
28f14cb177
Merge OpenSSL 1.0.2o.
2018-03-27 17:17:58 +00:00
jkim
2aa41898b2
Merge OpenSSL 1.0.2n.
2017-12-07 18:02:57 +00:00
jkim
986f17341f
Merge OpenSSL 1.0.2l.
2017-05-25 20:52:16 +00:00
jkim
4834c2f7b9
Merge OpenSSL 1.0.2k.
2017-01-26 19:10:29 +00:00
jkim
97091e1369
Merge OpenSSL 1.0.2i.
2016-09-22 13:27:44 +00:00
jkim
00a878d06e
Merge OpenSSL 1.0.2h.
...
Relnotes: yes
2016-05-03 18:50:10 +00:00
jkim
f91c9c2798
Merge OpenSSL 1.0.2f.
...
Relnotes: yes
2016-01-28 20:15:22 +00:00
jkim
8d77ecefb7
Merge OpenSSL 1.0.2e.
2015-12-03 21:13:35 +00:00
jkim
6b741bee15
Merge OpenSSL 1.0.2d.
2015-10-30 20:51:33 +00:00
jkim
810d2d455b
Merge OpenSSL 1.0.1o.
2015-06-12 16:48:26 +00:00
jkim
d675e841ef
Merge OpenSSL 1.0.1n.
2015-06-11 19:00:55 +00:00
jkim
d962da16eb
Merge OpenSSL 1.0.1m.
2015-03-20 19:16:18 +00:00
jkim
4f9b1cef1a
Merge OpenSSL 1.0.1k.
2015-01-08 23:42:41 +00:00
jkim
411d431d45
Merge OpenSSL 1.0.1j.
2014-10-15 19:12:05 +00:00
jkim
3299c3be1a
Merge OpenSSL 1.0.1i.
2014-08-07 18:56:10 +00:00
jkim
68fed3306b
Merge OpenSSL 1.0.1h.
...
Approved by: so (delphij)
2014-06-09 05:50:57 +00:00
jkim
89b378c4b3
Merge OpenSSL 1.0.1g.
...
Approved by: benl (maintainer)
2014-04-08 21:06:58 +00:00
delphij
26c4b55c2e
Fix NFS deadlock vulnerability. [SA-14:05]
...
Fix "Heartbleed" vulnerability and ECDSA Cache Side-channel
Attack in OpenSSL. [SA-14:06]
2014-04-08 18:27:32 +00:00
jkim
a8c44ea5cf
Merge OpenSSL 1.0.1f.
...
Approved by: so (delphij), benl (silence)
2014-01-22 19:57:11 +00:00
jkim
754bee5776
Merge OpenSSL 1.0.1e.
...
Approved by: secteam (simon), benl (silence)
2013-02-13 23:07:20 +00:00
jkim
e393e47b1e
Merge OpenSSL 1.0.1c.
...
Approved by: benl (maintainer)
2012-07-12 19:30:53 +00:00
jkim
299ab12592
Merge OpenSSL 0.9.8x.
...
Reviewed by: stas
Approved by: benl (maintainer)
MFC after: 3 days
2012-06-27 18:44:36 +00:00
simon
4fe7a7870a
Fix Incorrectly formatted ClientHello SSL/TLS handshake messages could
...
cause OpenSSL to parse past the end of the message.
Note: Applications are only affected if they act as a server and call
SSL_CTX_set_tlsext_status_cb on the server's SSL_CTX. This includes
Apache httpd >= 2.3.3, if configured with "SSLUseStapling On".
Security: http://www.openssl.org/news/secadv_20110208.txt
Security: CVE-2011-0014
Obtained from: OpenSSL CVS
2011-02-12 21:30:46 +00:00
simon
7a23485c98
Merge OpenSSL 0.9.8p into head.
...
Security: CVE-2010-3864
Security: http://www.openssl.org/news/secadv_20101116.txt
2010-11-22 18:23:44 +00:00
simon
0d816bbd98
Merge OpenSSL 0.9.8m into head.
...
This also "reverts" some FreeBSD local changes so we should now
be back to using entirely stock OpenSSL. The local changes were
simple $FreeBSD$ lines additions, which were required in the CVS
days, and the patch for FreeBSD-SA-09:15.ssl which has been
superseded with OpenSSL 0.9.8m's RFC5746 'TLS renegotiation
extension' support.
MFC after: 3 weeks
2010-03-13 19:22:41 +00:00
simon
5fb395764b
Merge OpenSSL 0.9.8k into head.
...
Approved by: re
2009-06-14 19:45:16 +00:00
simon
64fcbc70db
Flatten OpenSSL vendor tree.
2008-08-23 10:51:00 +00:00
simon
ee48ceb6a8
Vendor import of OpenSSL 0.9.8e.
2007-03-15 20:03:30 +00:00
simon
fb3c70eda8
Vendor import of OpenSSL 0.9.8b
2006-07-29 19:10:21 +00:00
kris
54c77f990d
Initial import of OpenSSL 0.9.5a
2000-04-13 06:33:22 +00:00
kris
2e467dc342
Initial import of OpenSSL 0.9.4, sans IDEA and RSA code for patent
...
infringement reasons.
2000-01-10 06:22:05 +00:00