summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* Expand ASN.1 template macros - no change in generated assembly.jsing2015-07-244-54/+342
|
* Expand ASN.1 template macros - the generated assembly only differs byjsing2015-07-242-102/+682
| | | | changes to line numbers.
* an TLS -> a TLS; from thanos tsouanasjmc2015-07-245-14/+14
|
* Expand ASN1_ITEM_TEMPLATE/ASN1_EX_TEMPLATE_TYPE/ASN1_ITEM_TEMPLATE_ENDjsing2015-07-248-44/+212
| | | | macros - the generated assembly only differs by changes to line numbers.
* Expand IMPLEMENT_ASN1_MSTRING macros - the generated assembly only differsjsing2015-07-244-12/+84
| | | | by changes to line numbers.
* Convert tls1_process_ticket to CBS.doug2015-07-244-62/+76
| | | | ok miod@ jsing@
* Convert tls1_process_sigalgs to CBS.doug2015-07-242-10/+28
| | | | ok miod@ jsing@
* Convert ssl3_get_record to CBS.doug2015-07-242-44/+58
| | | | ok miod@ jsing@
* call it bcrypt in the man page tootedu2015-07-231-3/+3
|
* permit "bcrypt" as an alias for "blowfish". this is, after all, whattedu2015-07-231-11/+27
| | | | | | | 99% of the world calls it. allow just "bcrypt" without params to mean auto-tune ("bcrypt,a"). default remains 8 rounds (for now) ok deraadt
* Revert ca.c r1.7 - BN_to_ASN1_INTEGER() only allocates an ASN.1 integerjsing2015-07-221-6/+2
| | | | | | | | | when it is not passed a reference to one. In this case, it is passed a reference to an ASN.1 integer that is part of the X509 ASN.1 data structure. Freeing this causes bad things to happen, since it is used and then freed later on. Found the hard way by kinichiro inoguchi.
* Convert openssl(1) nseq to new option handling.jsing2015-07-211-40/+51
| | | | ok bcook@ doug@
* Convert openssl(1) pkcs7 to new option handling.jsing2015-07-211-93/+111
| | | | ok doug@
* remove superfluous strings.hbcook2015-07-211-2/+1
|
* Remove duplicate check in libssl.doug2015-07-212-6/+2
| | | | | | | If len == 0, it already set try_session_cache so there's no need to check len again. Fixes Coverity issue 21687. ok bcook@
* Correct #if/else logic in BIO's dgram_ctrl.doug2015-07-202-6/+6
| | | | | | | | | Coverity issue 72741 noticed that ret is being overwritten before use. The actual issue is that the #if/else logic is guarding the wrong lines. Besides impacting ret, this also made the case's break logic wrong because it was in the wrong location. ok bcook@ beck@
* app_tminterval moved to apps_posix.c, we don't need sys/times.hbcook2015-07-201-2/+1
|
* prefer string.h to strings.h ok guenther@ doug@bcook2015-07-202-4/+4
|
* No need to recheck for NULL in openssl(1) ecparam.doug2015-07-201-5/+1
| | | | | | Fixes Coverity issue 78802. ok bcook@
* Don't try to run ECDH if ecdh_checks fails in openssl(1) speed.doug2015-07-201-17/+23
| | | | | | | Coverity 72744 noticed that rsa_count was overwitten. The underlying issue is that this code is supposed to be in an else block. ok bcook@
* Avoid NULL deref in openssl(1) s_cb.doug2015-07-201-5/+14
| | | | | | Fixes Coverity issue 24956. ok bcook@
* Avoid possible NULL deref in openssl(1) s_server.doug2015-07-201-2/+5
| | | | | | Fixes Coverity issue 78873. ok miod@
* check the sigbuf value before using it.rpointel2015-07-201-2/+7
| | | | ok miod@ (thanks).
* Avoid dereferencing a NULL.doug2015-07-201-5/+7
| | | | | | Move NULL check before use. Fixes Coverity issue 21746. ok miod@ jsing@
* Remove condition that never happens and fix error handling.doug2015-07-201-6/+5
| | | | | | | | | | | There were two issues here: 1) in == NULL is never true because it's checked above here. (Fixes Coverity 21705) 2) All error handling is in the if (in == NULL) guard, so effectively there's no error handling and it continues on. ok miod@ jsing@
* Various memory leaks upon error or unchecked allocations.miod2015-07-202-8/+26
| | | | ok doug@
* Use V_ASN1_UNDEF instead of -1.miod2015-07-202-14/+14
| | | | | | | Make sure ASN1_primitive_new() will return NULL in *pval in all error situations. ok bcook@ doug@
* Check the return value of asn1_enc_save(). ok bcook@ doug@miod2015-07-202-4/+8
|
* When freeing an X509_CRL, if freeing the user-maintained meth_data fails,miod2015-07-202-6/+8
| | | | | do not forgot to nevertheless keep freeing the other fields. ok doug@ guenther@
* In X509_PKEY_new(), make sure all allocation failures push an error to themiod2015-07-202-14/+30
| | | | | error stack, not only the first one. ok guenther@ doug@
* add NetLock Kft. CA root certificate, already present in web browsers andsteven2015-07-201-0/+80
| | | | | needed for fetching ports distfiles. ok sthen@
* Check return value for ENGINE_ctrl and ENGINE_ctrl_cmd.doug2015-07-201-4/+15
| | | | | | Fixes Coverity issue 21645. ok bcook@
* Check return value in openssl(1) s_socket.doug2015-07-201-3/+6
| | | | | | Fixes Coverity issue 21655. ok bcook@
* Remove check that is never true.doug2015-07-201-3/+1
| | | | | | | Fixes coverity issue 78799 as group == NULL was already an error condition above here. ok beck@
* Warn when rename() fails in openssl(1) apps.doug2015-07-201-8/+36
| | | | | | Fixes Coverity issues 78795 and 78803. ok bcook@
* Add VIS_DQ to escape double quotes. OK deraadt@ semarie@ reyk@millert2015-07-201-1/+3
|
* Remove OpenSSL engine RSAX.doug2015-07-1914-1409/+12
| | | | | | | | | OpenSSL stopped building it last year and removed it this year. Based on OpenSSL commit c436e05bdc7f49985a750df64122c960240b3ae1. Also cranked major version in libcrypto, libssl and libtls. "fine with me" bcook@ miod@
* Allow *_free() functions in libssl to handle NULL input.doug2015-07-199-9/+34
| | | | | | This mimics free()'s behavior which makes error handling simpler. ok bcook@ miod@
* Drop stupid (int) casts for the arguments of malloc() and friends. This ismiod2015-07-1918-48/+48
| | | | | not 16-bit MS-DOS anymore. ok bcook@ tedu@
* unifdef -UCBC_HANDLES_TRUNCATED_IOmiod2015-07-192-38/+2
| | | | ok bcook@ doug@
* Verify ASN1 objects types before attempting to access them as a particularmiod2015-07-194-4/+12
| | | | | type. ok guenther@ doug@
* tweak previous; ok dougjmc2015-07-191-4/+4
|
* Convert ssl3_get_certificate_request to CBS.doug2015-07-192-62/+66
| | | | ok miod@
* Fix symbol collision with libtls.doug2015-07-197-36/+36
| | | | | | Pointed out by guenther. ok guenther@
* Add TLS_method, TLS_client_method and TLS_server_method.doug2015-07-199-9/+321
| | | | | | | | | | | | | | | | Use these instead of SSLv23_*method when you want to make sure TLS is used. By default, we disable SSLv3 but it's still possible for the user to re-enable it. TLS_*method does not allow SSLv3. Both BoringSSL and (next version of) OpenSSL have these methods. However, they have changed the implementation significantly. We will as well, but not right now. Riding the libssl major bump. ok miod@ bcook@
* Crank major and remove legacy variables.doug2015-07-196-30/+6
| | | | | | Libtls is riding this crank. ok miod@ bcook@
* Crank the major of libtls: the behaviour of tls_write() has beenreyk2015-07-191-1/+1
| | | | | | changed in an incompatible way regarding partial writes. OK miod@ deraadt@
* Free memory when finished.doug2015-07-191-2/+6
| | | | | | Fixes coverity 78835. ok bcook@
* Add documentation on how to use TLS_{READ,WRITE}_AGAIN.doug2015-07-191-2/+29
| | | | ok beck@
* Now that it is safe to invoke X509_STORE_CTX_cleanup() if X509_STORE_CTX_init()miod2015-07-194-16/+32
| | | | | fails, check its return value and correctly mop up after ourselves. ok beck@ doug@