| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
ok miod@ jsing@
|
| |
|
|
|
|
|
|
|
| |
99% of the world calls it.
allow just "bcrypt" without params to mean auto-tune ("bcrypt,a").
default remains 8 rounds (for now)
ok deraadt
|
|
|
|
|
|
|
|
|
| |
when it is not passed a reference to one. In this case, it is passed a
reference to an ASN.1 integer that is part of the X509 ASN.1 data
structure. Freeing this causes bad things to happen, since it is used and
then freed later on.
Found the hard way by kinichiro inoguchi.
|
|
|
|
| |
ok bcook@ doug@
|
|
|
|
| |
ok doug@
|
| |
|
|
|
|
|
|
|
| |
If len == 0, it already set try_session_cache so there's no need to
check len again. Fixes Coverity issue 21687.
ok bcook@
|
|
|
|
|
|
|
|
|
| |
Coverity issue 72741 noticed that ret is being overwritten before use.
The actual issue is that the #if/else logic is guarding the wrong
lines. Besides impacting ret, this also made the case's break logic
wrong because it was in the wrong location.
ok bcook@ beck@
|
| |
|
| |
|
|
|
|
|
|
| |
Fixes Coverity issue 78802.
ok bcook@
|
|
|
|
|
|
|
| |
Coverity 72744 noticed that rsa_count was overwitten. The underlying
issue is that this code is supposed to be in an else block.
ok bcook@
|
|
|
|
|
|
| |
Fixes Coverity issue 24956.
ok bcook@
|
|
|
|
|
|
| |
Fixes Coverity issue 78873.
ok miod@
|
|
|
|
| |
ok miod@ (thanks).
|
|
|
|
|
|
| |
Move NULL check before use. Fixes Coverity issue 21746.
ok miod@ jsing@
|
|
|
|
|
|
|
|
|
|
|
| |
There were two issues here:
1) in == NULL is never true because it's checked above here.
(Fixes Coverity 21705)
2) All error handling is in the if (in == NULL) guard, so effectively
there's no error handling and it continues on.
ok miod@ jsing@
|
|
|
|
| |
ok doug@
|
|
|
|
|
|
|
| |
Make sure ASN1_primitive_new() will return NULL in *pval in all error
situations.
ok bcook@ doug@
|
| |
|
|
|
|
|
| |
do not forgot to nevertheless keep freeing the other fields.
ok doug@ guenther@
|
|
|
|
|
| |
error stack, not only the first one.
ok guenther@ doug@
|
|
|
|
|
| |
needed for fetching ports distfiles.
ok sthen@
|
|
|
|
|
|
| |
Fixes Coverity issue 21645.
ok bcook@
|
|
|
|
|
|
| |
Fixes Coverity issue 21655.
ok bcook@
|
|
|
|
|
|
|
| |
Fixes coverity issue 78799 as group == NULL was already an error
condition above here.
ok beck@
|
|
|
|
|
|
| |
Fixes Coverity issues 78795 and 78803.
ok bcook@
|
| |
|
|
|
|
|
|
|
|
|
| |
OpenSSL stopped building it last year and removed it this year.
Based on OpenSSL commit c436e05bdc7f49985a750df64122c960240b3ae1.
Also cranked major version in libcrypto, libssl and libtls.
"fine with me" bcook@ miod@
|
|
|
|
|
|
| |
This mimics free()'s behavior which makes error handling simpler.
ok bcook@ miod@
|
|
|
|
|
| |
not 16-bit MS-DOS anymore.
ok bcook@ tedu@
|
|
|
|
| |
ok bcook@ doug@
|
|
|
|
|
| |
type.
ok guenther@ doug@
|
| |
|
|
|
|
| |
ok miod@
|
|
|
|
|
|
| |
Pointed out by guenther.
ok guenther@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Use these instead of SSLv23_*method when you want to make sure TLS is
used.
By default, we disable SSLv3 but it's still possible for the user to
re-enable it. TLS_*method does not allow SSLv3.
Both BoringSSL and (next version of) OpenSSL have these methods.
However, they have changed the implementation significantly. We will
as well, but not right now.
Riding the libssl major bump.
ok miod@ bcook@
|
|
|
|
|
|
| |
Libtls is riding this crank.
ok miod@ bcook@
|
|
|
|
|
|
| |
changed in an incompatible way regarding partial writes.
OK miod@ deraadt@
|
|
|
|
|
|
| |
Fixes coverity 78835.
ok bcook@
|
|
|
|
| |
ok beck@
|
|
|
|
|
| |
fails, check its return value and correctly mop up after ourselves.
ok beck@ doug@
|
|
|
|
|
|
| |
Fixes coverity 78916.
ok miod@ bcook@
|
|
|
|
|
|
| |
Fixes coverity 78824.
ok bcook@ miod@
|
|
|
|
|
|
| |
Fixes coverity 78826.
ok miod@ bcook@
|
|
|
|
| |
ok miod@ bcook@
|
|
|
|
| |
ok bcook@ doug@
|
|
|
|
|
|
|
|
|
| |
raw byte sequences. The toolchains have had some time to update and assemble
the instructions correctly (except for p{ins,ext}rd which are not supported
yet by as(1) under OpenBSD, but will be fixed shortly).
Inspired by a discussion between tedu@ and John-Mark Gurney.
Verified to still work on Mac OS X and average Linux distros by bcook@
|
|
|
|
| |
same four bytes, unobfuscated.
|