summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
...
* Unchecked malloc() return value in SSL_COMP_add_compression_method(), in themiod2014-05-262-0/+8
| | | | | !OPENSSL_NO_COMP case. Does not affect OpenBSD as we compile the opposite code path.
* We don't really to keep history in constructs such as:miod2014-05-264-24/+2
| | | | | | | | #if 1 /* new with openssl 0.9.4 */ current code; #else obsolete code; #endif
* tls_decrypt_ticket(): memory leak and uncleaned EVP_CIPHER_CTX upon error.miod2014-05-262-2/+8
|
* Make sure all error paths in dtls1_buffer_record() invoke SSLErr bymiod2014-05-262-40/+24
| | | | | | factoring error handling. ok jsing@
* There is no need to include <openssl/e_os2.h> here, except for the factjsing2014-05-265-5/+2
| | | | | that it brings in <openssl/opensslconf.h>, so just do that instead (currently via apps.h).
* Update the aead regress to work with the improved EVP AEAD API.jsing2014-05-261-22/+14
|
* Implement an improved version of the EVP AEAD API. Thejsing2014-05-2610-212/+218
| | | | | | | | | | | | | | | | EVP_AEAD_CTX_{open,seal} functions previously returned an ssize_t that was overloaded to indicate success/failure, along with the number of bytes written as output. This change adds an explicit *out_len argument which is used to return the number of output bytes and the return value is now an int that is purely used to identify success or failure. This change effectively rides the last libcrypto crank (although I do not expect there to be many users of the EVP AEAD API currently). Thanks to Adam Langley for providing the improved code that this diff is based on. ok miod@
* Use C99 initialisers for BIO_METHOD.jsing2014-05-262-18/+18
|
* KNF.jsing2014-05-266-720/+958
|
* repair some KNF missed by the script; ok jsingderaadt2014-05-262-12/+20
|
* KNF.jsing2014-05-2614-1076/+1312
|
* KNF.jsing2014-05-2612-2886/+3110
|
* move all stats collecting under MALLOC_STATS; ok krw@otto2014-05-261-28/+33
|
* Fix resource descriptor leaks.logan2014-05-251-0/+4
| | | | | | CID: 966576 & 966577 OK from guenther@ and "Yup. looks good." from tedu@
* -noout mentions a CRL, which is incorrect. Use "no output of encoded sessionlogan2014-05-251-1/+1
| | | | | | | | info." instead. From Martin Kaiser. OK from tedu@
* heartbearts->heartbeats fixlogan2014-05-252-2/+2
| | | | | | From Marcos Marado: OK from tedu@
* calloc instead of malloc/memset. from Benjamin Baiertedu2014-05-2526-80/+42
|
* "for every change..."tedu2014-05-252-2/+2
|
* remove OPENSSL_memcmp before somebody tries to use it. ok beck miodtedu2014-05-252-12/+0
|
* remove OPENSSL_isservice. not used internally, no sane posix software willtedu2014-05-252-12/+0
| | | | | call it, and windows service software can figure this out on its own. ok beck miod
* remove unused shit. from Alexander Schrijvertedu2014-05-258-42/+4
|
* define LIBRESSL_INTERNAL, and use it to hide the bad stuff from ourselvestedu2014-05-254-4/+8
| | | | ok beck
* Remove TLS_DEBUG, SSL_DEBUG, CIPHER_DEBUG and OPENSSL_RI_DEBUG. Much ofjsing2014-05-2518-296/+0
| | | | | | | this is sporadic, hacked up and can easily be put back in an improved form should we ever need it. ok miod@
* There is little interest in supporting Watt-32 TCP/IP debugging. Forderaadt2014-05-251-7/+0
| | | | | reference, check out http://www.watt-32.net/ ok jsing
* Turn off MemCheck_on and MemCheck_off. These calls are pointless since thejsing2014-05-254-30/+6
| | | | | | crypto memory debugging code has been castrated. ok miod@ "kill it" beck@
* The ssl_ciper_get_evp() function is currently overloaded to also return thejsing2014-05-2513-62/+107
| | | | | | | | | | | compression associated with the SSL session. Based on one of Adam Langley's chromium diffs, factor out the compression handling code into a separate ssl_cipher_get_comp() function. Rewrite the compression handling code to avoid pointless duplication and so that failures are actually returned to and detectable by the caller. ok miod@
* Whitespace fixes to align define values.jsing2014-05-252-170/+172
|
* In ssl_cipher_get_evp(), fix off-by-one in index validation before accessingmiod2014-05-242-4/+4
| | | | | | arrays. "kind of scary" deraadt@, ok guenther@
* I'm so sorry to learn that the Diab compiler can't (or used not to) parse Cmiod2014-05-242-10/+2
| | | | code. Remove workaround.
* Use C99 initialisers for SSL3_ENC_METHOD structs.jsing2014-05-248-108/+126
| | | | ok miod@
* Remove the _shadow_ indirection, which is unnecessary in a world withoutjsing2014-05-246-14/+8
| | | | | | OPENSSL_EXPORT_VAR_AS_FUNCTION. ok miod@
* KNF.jsing2014-05-2430-4436/+3826
|
* More KNF.jsing2014-05-242-4/+4
|
* Add the RFC 7027 test vectors; from OpenSSL HEADmiod2014-05-241-0/+171
|
* KNF.jsing2014-05-248-182/+182
|
* Enable three brainpool elliptic curves for TLS, as specified in RFC 7027;miod2014-05-242-2/+26
| | | | | | from OpenSSL HEAD. ok beck@ deraadt@ jsing@
* Code using malloc() in ssl23_get_client_hello() got removed 12 years ago,miod2014-05-242-64/+54
| | | | | it's time to remove the test for a possible need to free(). ok jsing@
* Use sizeof(cryptopro_ext) instead of 36 when applicable.miod2014-05-242-8/+8
| | | | ok jsing@
* Invoke OPENSSL_cleanse() with the size of the variable you are cleaning.miod2014-05-242-2/+2
| | | | ok jsing@
* We have shared global variables - unifdef OPENSSL_EXPORT_VAR_AS_FUNCTION.jsing2014-05-245-146/+0
| | | | ok miod@ beck@
* Move ssltest.c to a regress test.jsing2014-05-247-0/+330
|
* remove OPENSSL_malloc and CRYPTO_malloc goo from the regress tests.beck2014-05-246-77/+22
| | | | ok miod@ jsing@ guenther@
* make this compile again - actually include stdio and friends ourselves.beck2014-05-241-1/+3
|
* Move the regress tests that are in lib/libssl to usr.sbin/openssl,jsing2014-05-248-245/+0
| | | | | | | since they are really testing openssl(1) (although this also tests libcrypto and libssl), rather than actual parts of the libssl library. Discussed with miod@
* Expand the OPENSSL_.*GLOBAL.* macros and stop including e_os2.h.jsing2014-05-246-16/+14
| | | | ok miod@ beck@
* Include <openssl/opensslconf.h> - currently ssl.h is relying on it beingjsing2014-05-242-2/+4
| | | | | | | pulled in elsewhere, even though it is makes use of the OPENSSL_NO_* defines. While here, remove kssl.h since it is a no-op. ok beck@ miod@
* DeIMPLEMENT libssl. Expand the IMPLEMENT_* macros since it is far morejsing2014-05-2424-412/+1308
| | | | | | | | readable and one less layer of abstraction. Use C99 initialisers for clarity, grepability and to protect from future field reordering/removal. ok miod@ (tedu@ also thought it was a wonderful idea, beck@ also agreed, but ran away squealing since it reminded him of the VOP layer...)
* Another e_os2.h -> opensslconf.h.jsing2014-05-242-2/+6
|
* e_os2.h is not needed here.jsing2014-05-242-2/+2
|
* Explicitly include <openssl/openssl.conf>. des.h still needs e_os2.h (atjsing2014-05-242-4/+6
| | | | least for a little while longer...)