History log of /dragonfly/crypto/libressl/include/openssl/opensslv.h (Results 1 – 21 of 21)
Revision (<<< Hide revision tags) (Show revision tags >>>) Date Author Comments
# de0e0e4d 26-Nov-2022 Antonio Huete Jimenez <tuxillo@quantumachine.net>

vendor/LIBRESSL: Import LibreSSL 3.6.1

For a full list of changes:

https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.2.6-relnotes.txt
https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.2

vendor/LIBRESSL: Import LibreSSL 3.6.1

For a full list of changes:

https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.2.6-relnotes.txt
https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.2.7-relnotes.txt
https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.3.2-relnotes.txt
https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.3.3-relnotes.txt
https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.3.4-relnotes.txt
https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.3.5-relnotes.txt
https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.3.6-relnotes.txt
https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.4.0-relnotes.txt
https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.4.1-relnotes.txt
https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.4.3-relnotes.txt
https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.5.1-relnotes.txt
https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.5.2-relnotes.txt
https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.5.3-relnotes.txt
https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.0-relnotes.txt
https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.1-relnotes.txt

show more ...


Revision tags: v6.2.2, v6.2.1, v6.2.0, v6.3.0, v6.0.1, v6.0.0, v6.0.0rc1, v6.1.0
# b6dec7da 26-Mar-2021 Daniel Fojt <df@neosystem.org>

vendor/libressl: upgrade from 3.2.4 to 3.2.5

Fixes possible use-after-free caused by TLS client using session
resumption.


# 2eb7d3b8 17-Feb-2021 Daniel Fojt <df@neosystem.org>

vendor/libressl: upgrade from 3.2.3 to 3.2.4

Bug and interoperability fixes:

* Switch back to certificate verification code from LibreSSL 3.1.x. The
new verifier is not bug compatible with the

vendor/libressl: upgrade from 3.2.3 to 3.2.4

Bug and interoperability fixes:

* Switch back to certificate verification code from LibreSSL 3.1.x. The
new verifier is not bug compatible with the old verifier causing issues
with applications expecting behavior of the old verifier.

* Unbreak DTLS retransmissions for flights that include a CCS

* Only check BIO_should_read() on read and BIO_should_write() on write

* Implement autochain for the TLSv1.3 server

* Use the legacy verifier for autochain

* Implement exporter for TLSv1.3

* Free alert_data and phh_data in tls13_record_layer_free()

* Plug leak in x509_verify_chain_dup()

* Free the policy tree in x509_vfy_check_policy()

show more ...


# f1828659 10-Dec-2020 Daniel Fojt <df@neosystem.org>

vendor/libressl: upgrade from 3.2.2 to 3.2.3

Fixes ASN.1 vulnerability (aka CVE-2020-1971):

* Malformed ASN.1 in a certificate revocation list or a timestamp
response token can lead to a NULL poi

vendor/libressl: upgrade from 3.2.2 to 3.2.3

Fixes ASN.1 vulnerability (aka CVE-2020-1971):

* Malformed ASN.1 in a certificate revocation list or a timestamp
response token can lead to a NULL pointer dereference

show more ...


# 8edacedf 03-Nov-2020 Daniel Fojt <df@neosystem.org>

vendor/libressl: upgrade from 3.1.4 to 3.2.2

Summary of notable changes:

* new TLSv1.3 implementation enabled by default for both client
and server

* new X509 certificate chain validator t

vendor/libressl: upgrade from 3.1.4 to 3.2.2

Summary of notable changes:

* new TLSv1.3 implementation enabled by default for both client
and server

* new X509 certificate chain validator that correctly handles
multiple paths through intermediate certificates

* new name constraints verification implementation which passes
the bettertls.com certificate validation check suite

* numerous leaks and out-of-bounds write fixed

* many improvements, refactoring, optimizations and code cleanups

See ChangeLog for details.

show more ...


Revision tags: v5.8.3, v5.8.2
# f015dc58 11-Sep-2020 Daniel Fojt <df@neosystem.org>

vendor/libressl: upgrade from 3.1.3 to 3.1.4

Interoperability and bug fixes for the TLSv1.3 client:

* Improve client certificate selection to allow EC certificates
instead of only RSA certifica

vendor/libressl: upgrade from 3.1.3 to 3.1.4

Interoperability and bug fixes for the TLSv1.3 client:

* Improve client certificate selection to allow EC certificates
instead of only RSA certificates.

* Do not error out if a TLSv1.3 server requests an OCSP response as
part of a certificate request.

* Fix SSL_shutdown behavior to match the legacy stack. The previous
behaviour could cause a hang.

* Fix a memory leak and add a missing error check in the handling of
the key update message.

* Fix a memory leak in tls13_record_layer_set_traffic_key.

* Avoid calling freezero with a negative size if a server sends a
malformed plaintext of all zeroes.

* Ensure that only PSS may be used with RSA in TLSv1.3 in order
to avoid using PKCS1-based signatures.

* Add the P-521 curve to the list of curves supported by default
in the client.

show more ...


# cca6fc52 18-Jul-2020 Daniel Fojt <df@neosystem.org>

vendor/libressl: upgrade from 2.9.1 to 3.1.3

Summary of notable changes:

- fixed CVE-2019-1547 and CVE-2019-1563
- various side channels in DSA and ECDSA were addressed
- fixed PVK format output is

vendor/libressl: upgrade from 2.9.1 to 3.1.3

Summary of notable changes:

- fixed CVE-2019-1547 and CVE-2019-1563
- various side channels in DSA and ECDSA were addressed
- fixed PVK format output issue with openssl(1) dsa and rsa subcommand
- added cms subcommand to openssl(1)
- added -addext option to openssl(1) req subcommand
- added -groups option to openssl(1) s_server subcommand
- improved compatibility by backporting functionality and documentation
from OpenSSL 1.1.1
- added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1
- completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API
- ported Cryptographic Message Syntax (CMS) implementation from OpenSSL
1.1.1 and enabled by default
- completed initial TLS 1.3 implementation, TLS 1.3 is now enabled
by default for the client side, with the server side to be enabled
in a future release
- provided TLSv1.3 cipher suite aliases to match the names used
in RFC 8446

For details see ChangeLog.

show more ...


Revision tags: v5.8.1, v5.8.0, v5.9.0, v5.8.0rc1, v5.6.3, v5.6.2, v5.6.1, v5.6.0, v5.6.0rc1, v5.7.0, v5.4.3
# 72c33676 20-Apr-2019 Maxim Ag <mewabg@yandex.ru>

Update LibreSSL from version 2.4.4 => 2.9.1

Submitted-by: Maxim + v2 update to 2.9.1 stable


Revision tags: v5.4.2, v5.4.1, v5.4.0, v5.5.0, v5.4.0rc1, v5.2.2, v5.2.1, v5.2.0, v5.3.0, v5.2.0rc, v5.0.2, v5.0.1, v5.0.0, v5.0.0rc2, v5.1.0, v5.0.0rc1, v4.8.1, v4.8.0, v4.6.2, v4.9.0, v4.8.0rc
# 530c17a6 13-Jan-2017 John Marino <draco@marino.st>

Update LibreSSL from version 2.4.3 => 2.4.4


Revision tags: v4.6.1
# 0acf6c5c 03-Oct-2016 John Marino <draco@marino.st>

Update LibreSSL from version 2.4.2 => 2.4.3


# f5b1c8a1 06-Sep-2016 John Marino <draco@marino.st>

Import LibreSSL v2.4.2 to vendor branch


Revision tags: v6.2.2, v6.2.1, v6.2.0, v6.3.0, v6.0.1, v6.0.0, v6.0.0rc1, v6.1.0
# b6dec7da 26-Mar-2021 Daniel Fojt <df@neosystem.org>

vendor/libressl: upgrade from 3.2.4 to 3.2.5

Fixes possible use-after-free caused by TLS client using session
resumption.


# 2eb7d3b8 17-Feb-2021 Daniel Fojt <df@neosystem.org>

vendor/libressl: upgrade from 3.2.3 to 3.2.4

Bug and interoperability fixes:

* Switch back to certificate verification code from LibreSSL 3.1.x. The
new verifier is not bug compatible with the

vendor/libressl: upgrade from 3.2.3 to 3.2.4

Bug and interoperability fixes:

* Switch back to certificate verification code from LibreSSL 3.1.x. The
new verifier is not bug compatible with the old verifier causing issues
with applications expecting behavior of the old verifier.

* Unbreak DTLS retransmissions for flights that include a CCS

* Only check BIO_should_read() on read and BIO_should_write() on write

* Implement autochain for the TLSv1.3 server

* Use the legacy verifier for autochain

* Implement exporter for TLSv1.3

* Free alert_data and phh_data in tls13_record_layer_free()

* Plug leak in x509_verify_chain_dup()

* Free the policy tree in x509_vfy_check_policy()

show more ...


# f1828659 10-Dec-2020 Daniel Fojt <df@neosystem.org>

vendor/libressl: upgrade from 3.2.2 to 3.2.3

Fixes ASN.1 vulnerability (aka CVE-2020-1971):

* Malformed ASN.1 in a certificate revocation list or a timestamp
response token can lead to a NULL poi

vendor/libressl: upgrade from 3.2.2 to 3.2.3

Fixes ASN.1 vulnerability (aka CVE-2020-1971):

* Malformed ASN.1 in a certificate revocation list or a timestamp
response token can lead to a NULL pointer dereference

show more ...


# 8edacedf 03-Nov-2020 Daniel Fojt <df@neosystem.org>

vendor/libressl: upgrade from 3.1.4 to 3.2.2

Summary of notable changes:

* new TLSv1.3 implementation enabled by default for both client
and server

* new X509 certificate chain validator t

vendor/libressl: upgrade from 3.1.4 to 3.2.2

Summary of notable changes:

* new TLSv1.3 implementation enabled by default for both client
and server

* new X509 certificate chain validator that correctly handles
multiple paths through intermediate certificates

* new name constraints verification implementation which passes
the bettertls.com certificate validation check suite

* numerous leaks and out-of-bounds write fixed

* many improvements, refactoring, optimizations and code cleanups

See ChangeLog for details.

show more ...


Revision tags: v5.8.3, v5.8.2
# f015dc58 11-Sep-2020 Daniel Fojt <df@neosystem.org>

vendor/libressl: upgrade from 3.1.3 to 3.1.4

Interoperability and bug fixes for the TLSv1.3 client:

* Improve client certificate selection to allow EC certificates
instead of only RSA certifica

vendor/libressl: upgrade from 3.1.3 to 3.1.4

Interoperability and bug fixes for the TLSv1.3 client:

* Improve client certificate selection to allow EC certificates
instead of only RSA certificates.

* Do not error out if a TLSv1.3 server requests an OCSP response as
part of a certificate request.

* Fix SSL_shutdown behavior to match the legacy stack. The previous
behaviour could cause a hang.

* Fix a memory leak and add a missing error check in the handling of
the key update message.

* Fix a memory leak in tls13_record_layer_set_traffic_key.

* Avoid calling freezero with a negative size if a server sends a
malformed plaintext of all zeroes.

* Ensure that only PSS may be used with RSA in TLSv1.3 in order
to avoid using PKCS1-based signatures.

* Add the P-521 curve to the list of curves supported by default
in the client.

show more ...


# cca6fc52 18-Jul-2020 Daniel Fojt <df@neosystem.org>

vendor/libressl: upgrade from 2.9.1 to 3.1.3

Summary of notable changes:

- fixed CVE-2019-1547 and CVE-2019-1563
- various side channels in DSA and ECDSA were addressed
- fixed PVK format output is

vendor/libressl: upgrade from 2.9.1 to 3.1.3

Summary of notable changes:

- fixed CVE-2019-1547 and CVE-2019-1563
- various side channels in DSA and ECDSA were addressed
- fixed PVK format output issue with openssl(1) dsa and rsa subcommand
- added cms subcommand to openssl(1)
- added -addext option to openssl(1) req subcommand
- added -groups option to openssl(1) s_server subcommand
- improved compatibility by backporting functionality and documentation
from OpenSSL 1.1.1
- added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1
- completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API
- ported Cryptographic Message Syntax (CMS) implementation from OpenSSL
1.1.1 and enabled by default
- completed initial TLS 1.3 implementation, TLS 1.3 is now enabled
by default for the client side, with the server side to be enabled
in a future release
- provided TLSv1.3 cipher suite aliases to match the names used
in RFC 8446

For details see ChangeLog.

show more ...


Revision tags: v5.8.1, v5.8.0, v5.9.0, v5.8.0rc1, v5.6.3, v5.6.2, v5.6.1, v5.6.0, v5.6.0rc1, v5.7.0, v5.4.3
# 72c33676 20-Apr-2019 Maxim Ag <mewabg@yandex.ru>

Update LibreSSL from version 2.4.4 => 2.9.1

Submitted-by: Maxim + v2 update to 2.9.1 stable


Revision tags: v5.4.2, v5.4.1, v5.4.0, v5.5.0, v5.4.0rc1, v5.2.2, v5.2.1, v5.2.0, v5.3.0, v5.2.0rc, v5.0.2, v5.0.1, v5.0.0, v5.0.0rc2, v5.1.0, v5.0.0rc1, v4.8.1, v4.8.0, v4.6.2, v4.9.0, v4.8.0rc
# 530c17a6 13-Jan-2017 John Marino <draco@marino.st>

Update LibreSSL from version 2.4.3 => 2.4.4


Revision tags: v4.6.1
# 0acf6c5c 03-Oct-2016 John Marino <draco@marino.st>

Update LibreSSL from version 2.4.2 => 2.4.3


# f5b1c8a1 06-Sep-2016 John Marino <draco@marino.st>

Import LibreSSL v2.4.2 to vendor branch