Home
last modified time | relevance | path

Searched hist:"2 eb7d3b81ae617871ac1158372b5f1e8dde4ffba" (Results 1 – 15 of 15) sorted by relevance

/dflybsd-src/crypto/libressl/crypto/x509/
H A Dx509_verify.c2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4

Bug and interoperability fixes:

* Switch back to certificate verification code from LibreSSL 3.1.x. The
new verifier is not bug compatible with the old verifier causing issues
with applications expecting behavior of the old verifier.

* Unbreak DTLS retransmissions for flights that include a CCS

* Only check BIO_should_read() on read and BIO_should_write() on write

* Implement autochain for the TLSv1.3 server

* Use the legacy verifier for autochain

* Implement exporter for TLSv1.3

* Free alert_data and phh_data in tls13_record_layer_free()

* Plug leak in x509_verify_chain_dup()

* Free the policy tree in x509_vfy_check_policy()

H A Dx509_vpm.c2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4

Bug and interoperability fixes:

* Switch back to certificate verification code from LibreSSL 3.1.x. The
new verifier is not bug compatible with the old verifier causing issues
with applications expecting behavior of the old verifier.

* Unbreak DTLS retransmissions for flights that include a CCS

* Only check BIO_should_read() on read and BIO_should_write() on write

* Implement autochain for the TLSv1.3 server

* Use the legacy verifier for autochain

* Implement exporter for TLSv1.3

* Free alert_data and phh_data in tls13_record_layer_free()

* Plug leak in x509_verify_chain_dup()

* Free the policy tree in x509_vfy_check_policy()

H A Dx509_vfy.c2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4

Bug and interoperability fixes:

* Switch back to certificate verification code from LibreSSL 3.1.x. The
new verifier is not bug compatible with the old verifier causing issues
with applications expecting behavior of the old verifier.

* Unbreak DTLS retransmissions for flights that include a CCS

* Only check BIO_should_read() on read and BIO_should_write() on write

* Implement autochain for the TLSv1.3 server

* Use the legacy verifier for autochain

* Implement exporter for TLSv1.3

* Free alert_data and phh_data in tls13_record_layer_free()

* Plug leak in x509_verify_chain_dup()

* Free the policy tree in x509_vfy_check_policy()

/dflybsd-src/crypto/libressl/ssl/
H A Dtls13_key_schedule.c2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4

Bug and interoperability fixes:

* Switch back to certificate verification code from LibreSSL 3.1.x. The
new verifier is not bug compatible with the old verifier causing issues
with applications expecting behavior of the old verifier.

* Unbreak DTLS retransmissions for flights that include a CCS

* Only check BIO_should_read() on read and BIO_should_write() on write

* Implement autochain for the TLSv1.3 server

* Use the legacy verifier for autochain

* Implement exporter for TLSv1.3

* Free alert_data and phh_data in tls13_record_layer_free()

* Plug leak in x509_verify_chain_dup()

* Free the policy tree in x509_vfy_check_policy()

H A Dd1_both.c2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4

Bug and interoperability fixes:

* Switch back to certificate verification code from LibreSSL 3.1.x. The
new verifier is not bug compatible with the old verifier causing issues
with applications expecting behavior of the old verifier.

* Unbreak DTLS retransmissions for flights that include a CCS

* Only check BIO_should_read() on read and BIO_should_write() on write

* Implement autochain for the TLSv1.3 server

* Use the legacy verifier for autochain

* Implement exporter for TLSv1.3

* Free alert_data and phh_data in tls13_record_layer_free()

* Plug leak in x509_verify_chain_dup()

* Free the policy tree in x509_vfy_check_policy()

H A Dtls13_server.c2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4

Bug and interoperability fixes:

* Switch back to certificate verification code from LibreSSL 3.1.x. The
new verifier is not bug compatible with the old verifier causing issues
with applications expecting behavior of the old verifier.

* Unbreak DTLS retransmissions for flights that include a CCS

* Only check BIO_should_read() on read and BIO_should_write() on write

* Implement autochain for the TLSv1.3 server

* Use the legacy verifier for autochain

* Implement exporter for TLSv1.3

* Free alert_data and phh_data in tls13_record_layer_free()

* Plug leak in x509_verify_chain_dup()

* Free the policy tree in x509_vfy_check_policy()

H A Dtls13_internal.h2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4

Bug and interoperability fixes:

* Switch back to certificate verification code from LibreSSL 3.1.x. The
new verifier is not bug compatible with the old verifier causing issues
with applications expecting behavior of the old verifier.

* Unbreak DTLS retransmissions for flights that include a CCS

* Only check BIO_should_read() on read and BIO_should_write() on write

* Implement autochain for the TLSv1.3 server

* Use the legacy verifier for autochain

* Implement exporter for TLSv1.3

* Free alert_data and phh_data in tls13_record_layer_free()

* Plug leak in x509_verify_chain_dup()

* Free the policy tree in x509_vfy_check_policy()

H A Dssl_both.c2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4

Bug and interoperability fixes:

* Switch back to certificate verification code from LibreSSL 3.1.x. The
new verifier is not bug compatible with the old verifier causing issues
with applications expecting behavior of the old verifier.

* Unbreak DTLS retransmissions for flights that include a CCS

* Only check BIO_should_read() on read and BIO_should_write() on write

* Implement autochain for the TLSv1.3 server

* Use the legacy verifier for autochain

* Implement exporter for TLSv1.3

* Free alert_data and phh_data in tls13_record_layer_free()

* Plug leak in x509_verify_chain_dup()

* Free the policy tree in x509_vfy_check_policy()

H A Dtls13_lib.c2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4

Bug and interoperability fixes:

* Switch back to certificate verification code from LibreSSL 3.1.x. The
new verifier is not bug compatible with the old verifier causing issues
with applications expecting behavior of the old verifier.

* Unbreak DTLS retransmissions for flights that include a CCS

* Only check BIO_should_read() on read and BIO_should_write() on write

* Implement autochain for the TLSv1.3 server

* Use the legacy verifier for autochain

* Implement exporter for TLSv1.3

* Free alert_data and phh_data in tls13_record_layer_free()

* Plug leak in x509_verify_chain_dup()

* Free the policy tree in x509_vfy_check_policy()

H A Dtls13_record_layer.c2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4

Bug and interoperability fixes:

* Switch back to certificate verification code from LibreSSL 3.1.x. The
new verifier is not bug compatible with the old verifier causing issues
with applications expecting behavior of the old verifier.

* Unbreak DTLS retransmissions for flights that include a CCS

* Only check BIO_should_read() on read and BIO_should_write() on write

* Implement autochain for the TLSv1.3 server

* Use the legacy verifier for autochain

* Implement exporter for TLSv1.3

* Free alert_data and phh_data in tls13_record_layer_free()

* Plug leak in x509_verify_chain_dup()

* Free the policy tree in x509_vfy_check_policy()

H A Dtls13_legacy.c2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4

Bug and interoperability fixes:

* Switch back to certificate verification code from LibreSSL 3.1.x. The
new verifier is not bug compatible with the old verifier causing issues
with applications expecting behavior of the old verifier.

* Unbreak DTLS retransmissions for flights that include a CCS

* Only check BIO_should_read() on read and BIO_should_write() on write

* Implement autochain for the TLSv1.3 server

* Use the legacy verifier for autochain

* Implement exporter for TLSv1.3

* Free alert_data and phh_data in tls13_record_layer_free()

* Plug leak in x509_verify_chain_dup()

* Free the policy tree in x509_vfy_check_policy()

H A Dssl_lib.c2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4

Bug and interoperability fixes:

* Switch back to certificate verification code from LibreSSL 3.1.x. The
new verifier is not bug compatible with the old verifier causing issues
with applications expecting behavior of the old verifier.

* Unbreak DTLS retransmissions for flights that include a CCS

* Only check BIO_should_read() on read and BIO_should_write() on write

* Implement autochain for the TLSv1.3 server

* Use the legacy verifier for autochain

* Implement exporter for TLSv1.3

* Free alert_data and phh_data in tls13_record_layer_free()

* Plug leak in x509_verify_chain_dup()

* Free the policy tree in x509_vfy_check_policy()

/dflybsd-src/crypto/libressl/
H A DChangeLog2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4

Bug and interoperability fixes:

* Switch back to certificate verification code from LibreSSL 3.1.x. The
new verifier is not bug compatible with the old verifier causing issues
with applications expecting behavior of the old verifier.

* Unbreak DTLS retransmissions for flights that include a CCS

* Only check BIO_should_read() on read and BIO_should_write() on write

* Implement autochain for the TLSv1.3 server

* Use the legacy verifier for autochain

* Implement exporter for TLSv1.3

* Free alert_data and phh_data in tls13_record_layer_free()

* Plug leak in x509_verify_chain_dup()

* Free the policy tree in x509_vfy_check_policy()

H A DVERSION2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4

Bug and interoperability fixes:

* Switch back to certificate verification code from LibreSSL 3.1.x. The
new verifier is not bug compatible with the old verifier causing issues
with applications expecting behavior of the old verifier.

* Unbreak DTLS retransmissions for flights that include a CCS

* Only check BIO_should_read() on read and BIO_should_write() on write

* Implement autochain for the TLSv1.3 server

* Use the legacy verifier for autochain

* Implement exporter for TLSv1.3

* Free alert_data and phh_data in tls13_record_layer_free()

* Plug leak in x509_verify_chain_dup()

* Free the policy tree in x509_vfy_check_policy()

/dflybsd-src/crypto/libressl/include/openssl/
H A Dopensslv.h2eb7d3b81ae617871ac1158372b5f1e8dde4ffba Wed Feb 17 18:29:12 GMT 2021 Daniel Fojt <df@neosystem.org> vendor/libressl: upgrade from 3.2.3 to 3.2.4

Bug and interoperability fixes:

* Switch back to certificate verification code from LibreSSL 3.1.x. The
new verifier is not bug compatible with the old verifier causing issues
with applications expecting behavior of the old verifier.

* Unbreak DTLS retransmissions for flights that include a CCS

* Only check BIO_should_read() on read and BIO_should_write() on write

* Implement autochain for the TLSv1.3 server

* Use the legacy verifier for autochain

* Implement exporter for TLSv1.3

* Free alert_data and phh_data in tls13_record_layer_free()

* Plug leak in x509_verify_chain_dup()

* Free the policy tree in x509_vfy_check_policy()