| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
| |
|
|
|
|
|
| |
OPENSSL_NO_X509_VERIFY. We're not going to build with these and the same
removal has already been done for libssl.
|
|
|
|
|
|
| |
load_config() once when we start.
ok miod@
|
|
|
|
|
|
|
| |
instances. This one for OPENSSL_ALLOW_PROXY_CERTS gets turned off first,
especially since it had this special comment:
/* A hack to keep people who don't want to modify their software happy */
ok beck jsing
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- first, BN_free == BN_clear_free in our libcrypto, so we do not need to
treat CBIGNUM (crypto BN) separately from BIGNUM (regular BN).
- then, in bn_i2c(), since BN_bn2bin returns BN_num_bytes(input), take
advantage of this to avoid calling BN_num_bytes() a second time.
BN_num_bytes() is cheap, but this not a reason to perform redundant
work.
- finally, in bn_c2i, if bn_new() fails, return early. Otherwise
BN_bin2bn will try to create a BN too, and although this will probably
fail since we were already out of memory, if we are on a threaded
process and suddenly the allocation succeeds, we will leak it since it
will never be stored in *pval.
ok jsing@
|
|
|
|
|
| |
NULL.
ok deraadt@ guenther@ jsing@
|
|
|
|
|
|
|
| |
Improves readability, keeps the code smaller so that it is warmer in your
cache.
review & ok deraadt@
|
| |
|
|
|
|
|
| |
keep linux distros happy that don't have it.
ok bcook@
|
|
|
|
|
| |
X509_STORE_CTX_free() accept NULL pointers as input without dereferencing them,
like all the other well-behaved *_CTX_free() functions do.
|
| |
|
| |
|
|
|
|
|
|
| |
now using this as upstream code. The particular problem is systems
that contain older arc4random derivations lacking arc4random_uniform().
ok tedu miod
|
|
|
|
|
| |
using O_NOFOLLOW - cope with it as best as possible by trying two
different paths. - written by deraadt@ and kettenis@
|
|
|
|
| |
ok beck@ miod@
|
| |
|
|
|
|
|
| |
to interleave them within the conditions. Also fix wrapping and
indentation.
|
|
|
|
|
| |
From Thijs Alkemade via OpenSSL trunk
ok miod@
|
|
|
|
| |
ok guenther
|
|
|
|
| |
is
|
| |
|
|
|
|
|
|
|
|
|
|
| |
consistent and secure-by-default API for SSL clients (and soon servers).
This is a long way from complete and the interface will likely change
substantially - committing now so that further work can happen in the tree.
Initiated by tedu@ and inspired by discussions with tedu@, beck@ and
other developers.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
bounds check, after reading the 2-, 3- or 4-byte size of the next chunk to
process. But the size fields themselves are not checked for being entirely
contained in the buffer.
Since reading past your bounds is bad practice, and may not possible if you
are using a secure memory allocator, we need to add the necessary bounds check,
at the expense of some readability.
As a bonus, a wrong size GOST session key will now trigger an error instead of
a printf to stderr and it being handled as if it had the correct size.
Creating this diff made my eyes bleed (in the real sense); reviewing it
made guenther@'s and beck@'s eyes bleed too (in the literal sense).
ok guenther@ beck@
|
|
|
|
|
| |
detect versions distinct from OPENSSL_BLAH_WOOF..
ok jsing@ tedu@ deraadt@
|
|
|
|
| |
RT.
|
|
|
|
| |
OpenSSL trunk
|
| |
|
|
|
|
| |
ok bcook@
|
|
|
|
| |
ok miod@
|
|
|
|
| |
ok miod@ bcook@
|
| |
|
|
|
|
|
|
| |
Jeff Trawick, Jean-Paul Calderone, Michal Bozon, Jeffrey Walton and Rich Salz,
via OpenSSL trunk (with some parts not applying to us, such as SSLv2 support,
at least partially removed).
|
|
|
|
| |
the CCS_OK flag. From OpenSSL trunk.
|
|
|
|
| |
Coverity via OpenSSL trunk
|
|
|
|
| |
PR #3439 via OpenSSL trunk
|
|
|
|
| |
via OpenSSL trunk.
|
|
|
|
| |
but without a memory leak.
|
| |
|
|
|
|
| |
PR #3418 via OpenSSL trunk
|
|
|
|
|
| |
larger than 4096-bit RSA which the most paranoid of us are using; OpenSSL
PR #319 via OpenSSL trunk.
|
|
|
|
|
| |
for apps that haven't had time to make the appropriate changes was added.
time's up.
|
|
|
|
| |
trunk
|
|
|
|
| |
ok bcook@
|
|
|
|
| |
ok bcook@
|
|
|
|
| |
constructed form. OpenSSL PR #2438 via OpenSSL trunk
|
|
|
|
|
|
|
|
| |
Internal pointers in CCM, GCM and XTS contexts should either be
NULL or set to point to the appropriate key schedule. This needs
to be adjusted when copying contexts.
OpenSSL PR #3272 with further fixes, from OpenSSL trunk
|
| |
|
|
|
|
| |
OpenSSL PR #2746 via OpenSSL trunk
|
|
|
|
| |
as it may have a non-standard key size; OpenSSL PR #3206 via OpenSSL trunk.
|
| |
|