index
:
openssl.git
OpenSSL_0_9_6-stable
OpenSSL_0_9_7-stable
OpenSSL_0_9_8-stable
OpenSSL_1_0_0-stable
OpenSSL_1_0_1-stable
OpenSSL_1_0_2-stable
OpenSSL_1_1_0-stable
feature/SSL_CTX_get_ciphers
fix-ssl_next_proto_validate
fix/EC_KEY_set_private_key-null
fix/x509-store-ex-data
fix/x509-store-remove-old
ky/bn-print-fix
ky/pem-read-fix-unsigned-cast
ky/ssl-fix-get-session-cb
master
topic/SSL_get_max_early_data-typofix
topic/X509_load_cert_crl_file-errorleakfix
topic/bn-bn2dec-fix
topic/chacha20-flags
topic/ec-group-get-ecparameters-memory-leak
topic/evp-chacha20-poly1305-cleanup-typofix
topic/evp-chacha20-poly1305-init-segv
topic/fix-asn1-integer-decode
topic/fix-config-parse-oid_section
rhe's working repository
about
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
CHANGES.md
Commit message (
Expand
)
Author
Age
Files
Lines
*
Document the exporter change in CHANGES.md and NEWS.md
Richard Levitte
2023-11-15
1
-0
/
+7
*
Add CHANGES.md and NEWS.md entry for CVE-2023-5678
Tomas Mraz
2023-11-08
1
-1
/
+14
*
Sync CHANGES.md and NEWS.md with 3.1 branch
Tomas Mraz
2023-11-08
1
-2
/
+6
*
CHANGES.md: note BLAKE2s supports BLAKE2b-like "size" setting
наб
2023-11-08
1
-1
/
+4
*
CHANGES.md: document BLAKE2b's "size"-setting support
наб
2023-11-02
1
-0
/
+5
*
Prepare for 3.3
Richard Levitte
2023-10-27
1
-0
/
+8
*
changes and news entries for CVE-2023-5363
Pauli
2023-10-24
1
-1
/
+10
*
* Enable extra Arm64 optimization on Windows for GHASH, RAND and AES
Evgeny Karpov
2023-10-10
1
-0
/
+4
*
CHANGES.md: Mention new features added after 3.2 alpha1
Tomas Mraz
2023-10-04
1
-0
/
+11
*
Prepare for 3.2 alpha 3
Matt Caswell
2023-09-28
1
-1
/
+1
*
Prepare for release of 3.2 alpha 2
openssl-3.2.0-alpha2
Matt Caswell
2023-09-28
1
-1
/
+1
*
Add CVE-2023-4807 fix to CHANGES.md and NEWS.md
Tomas Mraz
2023-09-11
1
-1
/
+22
*
Sync changes between 3.2 and 3.1 branches
Tomas Mraz
2023-09-11
1
-0
/
+4
*
Prepare for 3.2 alpha 2
Matt Caswell
2023-09-07
1
-1
/
+1
*
Prepare for release of 3.2 alpha 1
openssl-3.2.0-alpha1
Matt Caswell
2023-09-07
1
-1
/
+1
*
Added 'saltlen' option to the OpenSSL enc command line app.
slontis
2023-09-04
1
-0
/
+3
*
Change PBES2 KDF default salt length to 16 bytes.
slontis
2023-09-04
1
-0
/
+10
*
Add CHANGES.md entry for ess_cert_id_alg default change
Tomas Mraz
2023-08-31
1
-0
/
+7
*
Optimize SM2 on aarch64
Xu Yizhou
2023-08-24
1
-0
/
+7
*
Update CHANGES.md and NEWS.md for the upcoming 3.2 release
Tomas Mraz
2023-08-23
1
-26
/
+181
*
Add CHANGES.md and NEWS.md entries for CVE-2023-3817
Tomas Mraz
2023-07-27
1
-2
/
+20
*
Update CHANGES/NEWS for CVE-2023-3446
Matt Caswell
2023-07-19
1
-0
/
+20
*
Fix typos found by codespell
Dimitri Papadopoulos
2023-07-18
1
-1
/
+1
*
Add CHANGES.md and NEWS.md entries for CVE-2023-2975
Tomas Mraz
2023-07-14
1
-0
/
+21
*
Add a NEWS entry covering the FIPS related changes.
Pauli
2023-07-14
1
-1
/
+10
*
Enable QUIC by default
Matt Caswell
2023-07-06
1
-0
/
+4
*
Add support for SHA256/192
Fergus Dall
2023-06-28
1
-0
/
+4
*
add no-http
Vladimír Kotal
2023-06-19
1
-0
/
+5
*
Partially revert #18070 (Add support for Windows CA certificate store)
Hugo Landau
2023-06-15
1
-16
/
+5
*
Fix typos found by codespell
Dimitri Papadopoulos
2023-06-15
1
-3
/
+3
*
Make link to RFC 1578 in CHANGES.md be a proper link
Tomas Mraz
2023-06-06
1
-3
/
+2
*
Restrict the size of OBJECT IDENTIFIERs that OBJ_obj2txt will translate
Richard Levitte
2023-06-06
1
-0
/
+27
*
[feat] SSL RTT in both client and server statem. SSL_get_handshake_rtt makes ...
Jairus Christensen
2023-06-02
1
-0
/
+7
*
Add missing CHANGES.md entries
Tomas Mraz
2023-05-29
1
-0
/
+10
*
Add some documentation for the new QUIC mode in s_client
Matt Caswell
2023-05-08
1
-0
/
+7
*
Correct the CHANGES entry for CVE-2023-1255
Tomas Mraz
2023-04-26
1
-3
/
+3
*
aesv8-armx.pl: Avoid buffer overrread in AES-XTS decryption
Tomas Mraz
2023-04-20
1
-0
/
+10
*
Alternative fix for CVE-2022-4304
Bernd Edlinger
2023-04-04
1
-0
/
+11
*
Add some documentation for the new advanced s_client command mode
Matt Caswell
2023-03-30
1
-0
/
+9
*
changes: note the banning of truncated hashes with DRBGs
Pauli
2023-03-29
1
-0
/
+7
*
RFC7250 (RPK) support
Todd Short
2023-03-28
1
-0
/
+8
*
Fix documentation of X509_VERIFY_PARAM_add0_policy()
Tomas Mraz
2023-03-28
1
-0
/
+8
*
Updated CHANGES.md and NEWS.md for CVE-2023-0465
Matt Caswell
2023-03-28
1
-0
/
+12
*
changes: note about policy tree size limits and circumvention
Pauli
2023-03-22
1
-1
/
+12
*
providers: add Argon2 KDF
Čestmír Kalina
2023-03-17
1
-0
/
+5
*
Add option to FIPS module to enforce EMS check during KDF TLS1_PRF.
slontis
2023-03-07
1
-0
/
+7
*
CMS_add0_cert: if cert already present, do not throw error but ignore it
Dr. David von Oheimb
2023-02-24
1
-0
/
+7
*
first cut at sigalg loading
Michael Baentsch
2023-02-24
1
-0
/
+9
*
update changes entry to note EdDSA is not FIPS approved
Pauli
2023-02-22
1
-2
/
+2
*
Correct a copy&paste error in a link URL
Tomas Mraz
2023-02-11
1
-1
/
+1
[next]