/dragonfly/crypto/libressl/crypto/cms/ |
H A D | cms_lib.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
H A D | cms_sd.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
H A D | cms_asn1.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
H A D | cms_enc.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
H A D | cms_env.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
H A D | cms_pwri.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
/dragonfly/crypto/libressl/ssl/ |
H A D | ssl_kex.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
H A D | tls13_handshake_msg.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
H A D | tls13_record.h | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
H A D | ssl_transcript.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
/dragonfly/crypto/libressl/tls/ |
H A D | tls_ocsp.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
H A D | tls_conninfo.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
H A D | tls_internal.h | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
/dragonfly/crypto/libressl/apps/openssl/ |
H A D | cms.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
H A D | ca.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
H A D | certhash.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
H A D | ciphers.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
H A D | ecparam.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
/dragonfly/crypto/libressl/crypto/ec/ |
H A D | ec_kmeth.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
/dragonfly/crypto/libressl/crypto/hkdf/ |
H A D | hkdf.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
/dragonfly/crypto/libressl/man/ |
H A D | openssl.cnf.5 | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
/dragonfly/crypto/libressl/crypto/curve25519/ |
H A D | curve25519.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
/dragonfly/crypto/libressl/crypto/rsa/ |
H A D | rsa_meth.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
/dragonfly/crypto/libressl/crypto/conf/ |
H A D | conf_err.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|
/dragonfly/crypto/libressl/crypto/pkcs7/ |
H A D | pk7_doit.c | cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog. cca6fc52 Sat Jul 18 07:42:07 GMT 2020 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 2.9.1 to 3.1.3
Summary of notable changes:
- fixed CVE-2019-1547 and CVE-2019-1563 - various side channels in DSA and ECDSA were addressed - fixed PVK format output issue with openssl(1) dsa and rsa subcommand - added cms subcommand to openssl(1) - added -addext option to openssl(1) req subcommand - added -groups option to openssl(1) s_server subcommand - improved compatibility by backporting functionality and documentation from OpenSSL 1.1.1 - added RSA-PSS and RSA-OAEP methods from OpenSSL 1.1.1 - completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API - ported Cryptographic Message Syntax (CMS) implementation from OpenSSL 1.1.1 and enabled by default - completed initial TLS 1.3 implementation, TLS 1.3 is now enabled by default for the client side, with the server side to be enabled in a future release - provided TLSv1.3 cipher suite aliases to match the names used in RFC 8446
For details see ChangeLog.
|