<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/crypto/LPdir_nyi.c, branch vendor/openssl-3.0</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=vendor%2Fopenssl-3.0</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=vendor%2Fopenssl-3.0'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2026-01-29T01:30:35Z</updated>
<entry>
<title>openssl: import 3.0.19</title>
<updated>2026-01-29T01:30:35Z</updated>
<author>
<name>Enji Cooper</name>
<email>ngie@FreeBSD.org</email>
</author>
<published>2026-01-29T01:30:35Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=677808048e318ef0c4ad69c0c2cc8d82167bffbe'/>
<id>urn:sha1:677808048e318ef0c4ad69c0c2cc8d82167bffbe</id>
<content type='text'>
This change adds OpenSSL 3.0.19 from upstream [1].

The 3.0.19 artifact was been verified via PGP key [2] and by SHA256 checksum [3].

This is a security release, but also contains several bugfixes.

More information about the release (from a high level) can be found in
the release notes [4].

1. https://github.com/openssl/openssl/releases/download/openssl-3.0.19/openssl-3.0.19.tar.gz
2. https://github.com/openssl/openssl/releases/download/openssl-3.0.19/openssl-3.0.19.tar.gz.asc
3. https://github.com/openssl/openssl/releases/download/openssl-3.0.19/openssl-3.0.19.tar.gz.sha256
4. https://github.com/openssl/openssl/blob/openssl-3.0.19/NEWS.md
</content>
</entry>
<entry>
<title>OpenSSL: Vendor import of OpenSSL 3.0.13</title>
<updated>2024-02-02T09:48:38Z</updated>
<author>
<name>Cy Schubert</name>
<email>cy@FreeBSD.org</email>
</author>
<published>2024-02-02T04:39:16Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=9dd13e84fa8eca8f3462bd55485aa3da8c37f54a'/>
<id>urn:sha1:9dd13e84fa8eca8f3462bd55485aa3da8c37f54a</id>
<content type='text'>
* Fixed PKCS12 Decoding crashes ([CVE-2024-0727])
* Fixed Excessive time spent checking invalid RSA public keys
  ([CVE-2023-6237])
* Fixed POLY1305 MAC implementation corrupting vector registers on
  PowerPC CPUs which support PowerISA 2.07 ([CVE-2023-6129])
* Fix excessive time spent in DH check / generation with large Q
  parameter value ([CVE-2023-5678])

Release notes can be found at
	https://www.openssl.org/news/openssl-3.0-notes.html.
</content>
</entry>
<entry>
<title>Import OpenSSL 1.0.1c.</title>
<updated>2012-07-11T23:31:36Z</updated>
<author>
<name>Jung-uk Kim</name>
<email>jkim@FreeBSD.org</email>
</author>
<published>2012-07-11T23:31:36Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=0758ab5ea778e4ba36d2150af1bba602a48d6467'/>
<id>urn:sha1:0758ab5ea778e4ba36d2150af1bba602a48d6467</id>
<content type='text'>
Approved by:	benl (maintainer)
</content>
</entry>
<entry>
<title>Flatten OpenSSL vendor tree.</title>
<updated>2008-08-23T10:51:00Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2008-08-23T10:51:00Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=c4a78426bef17a0a7c81195c2b2399e7441f14ad'/>
<id>urn:sha1:c4a78426bef17a0a7c81195c2b2399e7441f14ad</id>
<content type='text'>
</content>
</entry>
</feed>
