| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
|
|
|
|
|
|
|
| |
If X509_TRUST_add() or X509_PURPOSE_add() fail, they will leave the
object in an inconsistent state since the name is already freed.
This commit avoids changing the original name unless the *_add() call
will succeed.
Based on BoringSSL's commit: ab2815eaff6219ef57aedca2f7b1b72333c27fd0
ok miod@
|
|
|
|
|
|
| |
breaking the hardlink between file system entries, confusing apropos(1).
Split malloc.conf(5) out of malloc(3) as suggested by deraadt@.
Feedback and OK jmc@, OK deraadt@ tedu@ jasper@.
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
the associated peer_rsa_tmp goop.
This was only needed for export cipher handling and intentional RFC
violations. The export cipher suites have already been removed and
previous cleanup means that we will never send ServerKeyExchange messages
from the server side for RSA.
|
|
|
|
|
|
|
|
| |
storing and processing in wire encoded form.
Inspired by boringssl.
ok miod@
|
|
|
|
|
|
|
|
| |
The EC curve handling code assumes this to be the case and will read one
byte off the end of the curve list during processing, in the case where it
is not.
ok miod@
|
|
|
|
|
|
|
| |
the buffer. The later size check would catch this, however reading first
and checking later is less than ideal.
ok miod@
|
|
|
|
| |
using it.
|
| |
|
|
|
|
|
|
|
| |
This is needed by the portable tree to point directly to the newly-built
binaries when running unit tests.
discussed with jsing@ and others
|
|
|
|
|
|
|
|
|
|
|
|
| |
Several functions that need to be redefined for a Windows port are right
in the middle of other code that is relatively portable. This patch
isolates the functions that need Windows-specific implementations so
they can be built conditionally in the portable tree.
Add calls to BIO_sock_init() as-needed to openssl(1) so that socket IO works on
Windows. Sorry, these are no-op on other platforms.
ok jsing@ deraadt@
|
|
|
|
|
|
|
|
|
| |
Several functions that need to be redefined for a Windows port are right
in the middle of other code that is relatively portable. This patch
isolates the functions that need Windows-specific implementations so
they can be built conditionally in the portable tree.
ok jsing@ deraadt@
|
|
|
|
| |
ok jsing@ deraadt@
|
|
|
|
|
| |
EC_POINT_point2oct so that later allocation does not overflow
with miod
|
|
|
|
| |
ok miod
|
|
|
|
|
|
|
| |
string we are testing.
Add tests to verify that we get SIGSEGV when passed a NULL src or dst.
It is better to crash than for an implementation to check for NULL
and try to recover.
|
|
|
|
| |
from OpenSSL HEAD via Thomas Jakobi.
|
| |
|
|
|
|
|
|
| |
conversions in the tree, because the original code is very rotten and
fragile. Please test and report any failures.
Assistance from millert, bcook, and jsing.
|
|
|
|
| |
Also looked at by bcook
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
The former is not used anywhere in NetBSD, FreeBSD, or DragonFly
and not supported by groff, so i'm going to delete it from mandoc(1).
We don't need two macros for the same thing.
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
(potentially) MD versions (function dependent, not filename dependent)
split out memcpy/memmove/bcopy and strchr/index/strrchr/rindex
Bring back amd64 .S versions
And the final touch: switch all architectures temporarily to MI
memcpy.c, which contains syslog + abort for overlapping copies. A nice
harsh undefined behaviour. We will clean the entire userland of the
remaining issues in this catagory, then switch to the optimised memcpy
which skips the memmove check.
I tried to cut this change into pieces, but testing each sub-step on
every architecture is too time consuming and mindnumbing.
ok miod
|
|
|
|
| |
found because the groff_mdoc(7) macros warn about it.
|
|
|
|
|
|
|
| |
ssl3_send_client_key_exchange(), rather than checking it in the key
exchange algorithm specific code.
ok beck@ miod@
|
|
|
|
|
|
| |
Reported by Felix Groebert of the Google Security Team.
ok beck@ miod@
|
|
|
|
|
|
|
|
|
|
|
|
| |
crafted server response used in conjunction with an anonymous DH or
anonymous ECDH ciphersuite.
Fixes CVE-2014-3510, which is effectively a repeat of CVE-2014-3470 in
copied code.
Reported by Felix Groebert of the Google Security Team.
ok beck@ miod@
|
|
|
|
| |
ok tedu@ miod@ deraadt@
|
|
|
|
| |
ok beck@ tedu@ miod@ guenther@ doug@ deraadt@
|
|
|
|
| |
ok beck@ tedu@ miod@
|
|
|
|
|
|
|
|
|
|
| |
Remove the remaining random casts on optval. Fixups for this can be handled by
the portability layer all in once place.
Remove remaining fake socklen_t unions, though beck@ points out that this also
removes support for socklen_t changing its length at runtime. RIP.
ok tedu@ beck@ miod@ deraadt@
|
|
|
|
| |
ok beck@ miod@ tedu@ deraadt@
|
| |
|
|
|
|
|
| |
Remove the bug about rand() being faster.
Add a bug about historical implementations seeding very poorly.
|
|
|
|
| |
the same text from random.3.
|
|
|
|
| |
entries.
|
| |
|
|
|
|
| |
better to find one instead of continuing to mangle this mess.
|
|
|
|
| |
only doing what's needed for crypt_hashpass. sigh.
|
|
|
|
| |
write out a hash. also simplify writing out the hash.
|
| |
|
| |
|
| |
|
| |
|