| /dflybsd-src/crypto/libressl/crypto/x509/ |
| H A D | x509_verify.c | 2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4
Bug and interoperability fixes:
* Switch back to certificate verification code from LibreSSL 3.1.x. The new verifier is not bug compatible with the old verifier causing issues with applications expecting behavior of the old verifier.
* Unbreak DTLS retransmissions for flights that include a CCS
* Only check BIO_should_read() on read and BIO_should_write() on write
* Implement autochain for the TLSv1.3 server
* Use the legacy verifier for autochain
* Implement exporter for TLSv1.3
* Free alert_data and phh_data in tls13_record_layer_free()
* Plug leak in x509_verify_chain_dup()
* Free the policy tree in x509_vfy_check_policy()
|
| H A D | x509_vpm.c | 2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4
Bug and interoperability fixes:
* Switch back to certificate verification code from LibreSSL 3.1.x. The new verifier is not bug compatible with the old verifier causing issues with applications expecting behavior of the old verifier.
* Unbreak DTLS retransmissions for flights that include a CCS
* Only check BIO_should_read() on read and BIO_should_write() on write
* Implement autochain for the TLSv1.3 server
* Use the legacy verifier for autochain
* Implement exporter for TLSv1.3
* Free alert_data and phh_data in tls13_record_layer_free()
* Plug leak in x509_verify_chain_dup()
* Free the policy tree in x509_vfy_check_policy()
|
| H A D | x509_vfy.c | 2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4
Bug and interoperability fixes:
* Switch back to certificate verification code from LibreSSL 3.1.x. The new verifier is not bug compatible with the old verifier causing issues with applications expecting behavior of the old verifier.
* Unbreak DTLS retransmissions for flights that include a CCS
* Only check BIO_should_read() on read and BIO_should_write() on write
* Implement autochain for the TLSv1.3 server
* Use the legacy verifier for autochain
* Implement exporter for TLSv1.3
* Free alert_data and phh_data in tls13_record_layer_free()
* Plug leak in x509_verify_chain_dup()
* Free the policy tree in x509_vfy_check_policy()
|
| /dflybsd-src/crypto/libressl/ssl/ |
| H A D | tls13_key_schedule.c | 2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4
Bug and interoperability fixes:
* Switch back to certificate verification code from LibreSSL 3.1.x. The new verifier is not bug compatible with the old verifier causing issues with applications expecting behavior of the old verifier.
* Unbreak DTLS retransmissions for flights that include a CCS
* Only check BIO_should_read() on read and BIO_should_write() on write
* Implement autochain for the TLSv1.3 server
* Use the legacy verifier for autochain
* Implement exporter for TLSv1.3
* Free alert_data and phh_data in tls13_record_layer_free()
* Plug leak in x509_verify_chain_dup()
* Free the policy tree in x509_vfy_check_policy()
|
| H A D | d1_both.c | 2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4
Bug and interoperability fixes:
* Switch back to certificate verification code from LibreSSL 3.1.x. The new verifier is not bug compatible with the old verifier causing issues with applications expecting behavior of the old verifier.
* Unbreak DTLS retransmissions for flights that include a CCS
* Only check BIO_should_read() on read and BIO_should_write() on write
* Implement autochain for the TLSv1.3 server
* Use the legacy verifier for autochain
* Implement exporter for TLSv1.3
* Free alert_data and phh_data in tls13_record_layer_free()
* Plug leak in x509_verify_chain_dup()
* Free the policy tree in x509_vfy_check_policy()
|
| H A D | tls13_server.c | 2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4
Bug and interoperability fixes:
* Switch back to certificate verification code from LibreSSL 3.1.x. The new verifier is not bug compatible with the old verifier causing issues with applications expecting behavior of the old verifier.
* Unbreak DTLS retransmissions for flights that include a CCS
* Only check BIO_should_read() on read and BIO_should_write() on write
* Implement autochain for the TLSv1.3 server
* Use the legacy verifier for autochain
* Implement exporter for TLSv1.3
* Free alert_data and phh_data in tls13_record_layer_free()
* Plug leak in x509_verify_chain_dup()
* Free the policy tree in x509_vfy_check_policy()
|
| H A D | tls13_internal.h | 2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4
Bug and interoperability fixes:
* Switch back to certificate verification code from LibreSSL 3.1.x. The new verifier is not bug compatible with the old verifier causing issues with applications expecting behavior of the old verifier.
* Unbreak DTLS retransmissions for flights that include a CCS
* Only check BIO_should_read() on read and BIO_should_write() on write
* Implement autochain for the TLSv1.3 server
* Use the legacy verifier for autochain
* Implement exporter for TLSv1.3
* Free alert_data and phh_data in tls13_record_layer_free()
* Plug leak in x509_verify_chain_dup()
* Free the policy tree in x509_vfy_check_policy()
|
| H A D | ssl_both.c | 2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4
Bug and interoperability fixes:
* Switch back to certificate verification code from LibreSSL 3.1.x. The new verifier is not bug compatible with the old verifier causing issues with applications expecting behavior of the old verifier.
* Unbreak DTLS retransmissions for flights that include a CCS
* Only check BIO_should_read() on read and BIO_should_write() on write
* Implement autochain for the TLSv1.3 server
* Use the legacy verifier for autochain
* Implement exporter for TLSv1.3
* Free alert_data and phh_data in tls13_record_layer_free()
* Plug leak in x509_verify_chain_dup()
* Free the policy tree in x509_vfy_check_policy()
|
| H A D | tls13_lib.c | 2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4
Bug and interoperability fixes:
* Switch back to certificate verification code from LibreSSL 3.1.x. The new verifier is not bug compatible with the old verifier causing issues with applications expecting behavior of the old verifier.
* Unbreak DTLS retransmissions for flights that include a CCS
* Only check BIO_should_read() on read and BIO_should_write() on write
* Implement autochain for the TLSv1.3 server
* Use the legacy verifier for autochain
* Implement exporter for TLSv1.3
* Free alert_data and phh_data in tls13_record_layer_free()
* Plug leak in x509_verify_chain_dup()
* Free the policy tree in x509_vfy_check_policy()
|
| H A D | tls13_record_layer.c | 2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4
Bug and interoperability fixes:
* Switch back to certificate verification code from LibreSSL 3.1.x. The new verifier is not bug compatible with the old verifier causing issues with applications expecting behavior of the old verifier.
* Unbreak DTLS retransmissions for flights that include a CCS
* Only check BIO_should_read() on read and BIO_should_write() on write
* Implement autochain for the TLSv1.3 server
* Use the legacy verifier for autochain
* Implement exporter for TLSv1.3
* Free alert_data and phh_data in tls13_record_layer_free()
* Plug leak in x509_verify_chain_dup()
* Free the policy tree in x509_vfy_check_policy()
|
| H A D | tls13_legacy.c | 2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4
Bug and interoperability fixes:
* Switch back to certificate verification code from LibreSSL 3.1.x. The new verifier is not bug compatible with the old verifier causing issues with applications expecting behavior of the old verifier.
* Unbreak DTLS retransmissions for flights that include a CCS
* Only check BIO_should_read() on read and BIO_should_write() on write
* Implement autochain for the TLSv1.3 server
* Use the legacy verifier for autochain
* Implement exporter for TLSv1.3
* Free alert_data and phh_data in tls13_record_layer_free()
* Plug leak in x509_verify_chain_dup()
* Free the policy tree in x509_vfy_check_policy()
|
| H A D | ssl_lib.c | 2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4
Bug and interoperability fixes:
* Switch back to certificate verification code from LibreSSL 3.1.x. The new verifier is not bug compatible with the old verifier causing issues with applications expecting behavior of the old verifier.
* Unbreak DTLS retransmissions for flights that include a CCS
* Only check BIO_should_read() on read and BIO_should_write() on write
* Implement autochain for the TLSv1.3 server
* Use the legacy verifier for autochain
* Implement exporter for TLSv1.3
* Free alert_data and phh_data in tls13_record_layer_free()
* Plug leak in x509_verify_chain_dup()
* Free the policy tree in x509_vfy_check_policy()
|
| /dflybsd-src/crypto/libressl/ |
| H A D | ChangeLog | 2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4
Bug and interoperability fixes:
* Switch back to certificate verification code from LibreSSL 3.1.x. The new verifier is not bug compatible with the old verifier causing issues with applications expecting behavior of the old verifier.
* Unbreak DTLS retransmissions for flights that include a CCS
* Only check BIO_should_read() on read and BIO_should_write() on write
* Implement autochain for the TLSv1.3 server
* Use the legacy verifier for autochain
* Implement exporter for TLSv1.3
* Free alert_data and phh_data in tls13_record_layer_free()
* Plug leak in x509_verify_chain_dup()
* Free the policy tree in x509_vfy_check_policy()
|
| H A D | VERSION | 2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4
Bug and interoperability fixes:
* Switch back to certificate verification code from LibreSSL 3.1.x. The new verifier is not bug compatible with the old verifier causing issues with applications expecting behavior of the old verifier.
* Unbreak DTLS retransmissions for flights that include a CCS
* Only check BIO_should_read() on read and BIO_should_write() on write
* Implement autochain for the TLSv1.3 server
* Use the legacy verifier for autochain
* Implement exporter for TLSv1.3
* Free alert_data and phh_data in tls13_record_layer_free()
* Plug leak in x509_verify_chain_dup()
* Free the policy tree in x509_vfy_check_policy()
|
| /dflybsd-src/crypto/libressl/include/openssl/ |
| H A D | opensslv.h | 2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4
Bug and interoperability fixes:
* Switch back to certificate verification code from LibreSSL 3.1.x. The new verifier is not bug compatible with the old verifier causing issues with applications expecting behavior of the old verifier.
* Unbreak DTLS retransmissions for flights that include a CCS
* Only check BIO_should_read() on read and BIO_should_write() on write
* Implement autochain for the TLSv1.3 server
* Use the legacy verifier for autochain
* Implement exporter for TLSv1.3
* Free alert_data and phh_data in tls13_record_layer_free()
* Plug leak in x509_verify_chain_dup()
* Free the policy tree in x509_vfy_check_policy()
|