Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | merge fix for CVE-2014-3509 -- basically a missing s->hit check; ok guenther | deraadt | 2014-08-06 | 2 | -18/+26 |
| | |||||
* | Prevent a possible use after free by mimicing the s3_srvr.c fixes contributed by | miod | 2014-08-06 | 2 | -8/+2 |
| | | | | | | | Adam Langley close to three years ago, which were commited in https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e7928282d0148af5f28fa3437a625a2006af0214 ok jsing@ | ||||
* | Allow B64_EOF to follow a base64 padding character. This restores previous | jsing | 2014-08-06 | 2 | -4/+6 |
| | | | | | | | | behaviour that allows a PEM block to be fed through the base64 decoder. Reported by Dmitry Eremin-Solenikov on tech@ ok deraadt@ tedu@ | ||||
* | Correct error checks in EVP_read_pw_string_min(): UI_add_input_string() | guenther | 2014-08-06 | 2 | -6/+6 |
| | | | | | | | | and UI_add_verify_string() return -1 (and maybe -2?) on failure and >=0 on success, instead of always zero on success problem reported by Mark Patruck (mark (at) wrapped.cx) ok miod@ | ||||
* | Add support for loading the public/private key from memory, rather than | jsing | 2014-08-06 | 4 | -13/+97 |
| | | | | directly from file. | ||||
* | Add $OpenBSD$ tags. | jsing | 2014-08-05 | 8 | -0/+8 |
| | |||||
* | Implement ressl_accept_socket, which allocates a new server connection | jsing | 2014-08-04 | 2 | -4/+45 |
| | | | | | context (if necessary) and handles the TLS/SSL handshake over the given socket. | ||||
* | Return -1 on error (not 1). | jsing | 2014-08-04 | 1 | -3/+3 |
| | |||||
* | A ressl server needs different configuration from a ressl client - provide | jsing | 2014-08-04 | 3 | -0/+41 |
| | | | | | a specific server configuration function and call this from ressl_configure. | ||||
* | Provide a function that returns a server connection context. | jsing | 2014-08-04 | 2 | -0/+15 |
| | |||||
* | Provide a utility function for loading a private/public keypair. | jsing | 2014-08-04 | 2 | -0/+21 |
| | |||||
* | Improve ressl_{read,write} handling of non-blocking reads/writes. | jsing | 2014-08-04 | 2 | -16/+31 |
| | |||||
* | Free the SSL context first and let the reference counting do its thing. | jsing | 2014-08-04 | 1 | -5/+2 |
| | |||||
* | In chacha_init(), allow for a NULL iv. Reported by znz on github. | miod | 2014-08-04 | 2 | -4/+6 |
| | | | | ok guenther@ jsing@ | ||||
* | X509_NAME_get_text_by_NID() returns -1 on error so the type | jsg | 2014-08-03 | 1 | -1/+1 |
| | | | | | | the return value is stored in must be signed. Fixes a test for error. ok jsing@ guenther@ | ||||
* | Fix a usage string; the proper spelling of 'alot' is 'a lot'. | blambert | 2014-07-29 | 1 | -2/+2 |
| | | | | ok bcook@ | ||||
* | Remove SRP code. It contains a bug (this should not surprise anyone), but | tedu | 2014-07-28 | 12 | -3635/+2 |
| | | | | | | | | | | | the details are under embargo. The original plan was to wait for the embargo to lift, but we've been waiting for quite some time, and there's no indication of when or even if it will end. No sense in dragging this out any longer. The SRP code has never been enabled in OpenBSD, though I understand it is in use by some other people. However, in light of this and other issues, we're officially saying SRP is outside the scope of libressl. (For now.) | ||||
* | The RSA, DH, and ECDH temporary key callbacks expect the number of keybits | guenther | 2014-07-28 | 6 | -18/+42 |
| | | | | | | | | | | | | | for the key (expressed in RSA key bits, which makes *no sense* for ECDH) as their second argument, not zero. (jsing@ notes that the RSA callback is only invoked for 'export' ciphers, which have been removed from LibreSSL, and for the SSL_OP_EPHEMERAL_RSA option, which is makes the application non-compliant. More fuel for the tedu fire...) jasper@ noted the breakage and bisected it down to the diff that broke this ok jsing@ miod@ | ||||
* | remove non-portable __progname extern from arc4random unit test. | bcook | 2014-07-28 | 1 | -2/+1 |
| | | | | ok @deraadt | ||||
* | Link dependencies on libssl and libcrypto were missing. | guenther | 2014-07-27 | 1 | -2/+3 |
| | | | | | | OPENSSL_NO_RC5 is #defined in the #includes, so it's not needed here. ok deraadt@ | ||||
* | Add missing year to copyright. | jsing | 2014-07-25 | 4 | -8/+8 |
| | |||||
* | BIO_free() returns immediately when the sole input is NULL. | doug | 2014-07-25 | 26 | -96/+61 |
| | | | | | | Remove unnecessary NULL check. ok miod@ | ||||
* | level_add_node(): if a memory allocation failure causes us to attempt to clean | miod | 2014-07-23 | 2 | -8/+14 |
| | | | | | | | up and return failure, be sure the cleanup work does NOT free objects which are still being referenced by other objects. ok guenther@ | ||||
* | Make sure PEM_def_callback() correctly handles negative buffer sizes; all uses | miod | 2014-07-23 | 2 | -20/+34 |
| | | | | | | | within libcrypto are safe, but until we can change this function prototype to use size_t instead of int, better be safe than sorry. tweaks and ok guenther@ | ||||
* | Check the return value of the UI functions (including UI_new() which return | miod | 2014-07-23 | 2 | -12/+22 |
| | | | | | | value is happily dereferenced without checking it for being non-NULL). ok beck@ | ||||
* | Now that DES_random_key() can be trusted, use it to generate DES keys in the | miod | 2014-07-22 | 4 | -24/+20 |
| | | | | | | | EVP_CTRL_RAND_KEY method handlers, rather than generating a random odd key and not even checking it against the weak keys list. ok beck@ | ||||
* | In DES_random_key(), force the generated key to the odd parity before checking | miod | 2014-07-22 | 2 | -16/+16 |
| | | | | | | | | | | | it is not one of the weak and semi-weak keys. Even though the probability of generating a weak key with incorrect parity is abysmally small, there is no reason to be correct (although, if you're in a need for fresh DES keys nowadays, you should seriously consider switching to a stronger symmetric cipher algorithm). ok beck@ | ||||
* | Handle failure of NETSCAPE_SPKI_b64_encode() and don't leak memory | guenther | 2014-07-22 | 1 | -6/+10 |
| | | | | | | when BIO_new_{file,fp}() fails. inspired by a diff from logan@ ok miod@ | ||||
* | Use Cm instead of Li for 'MASK:' | guenther | 2014-07-22 | 1 | -2/+2 |
| | | | | (Overlooked among jmc@'s other suggestions) | ||||
* | Rewrite the description of the string_mask config file option to match | guenther | 2014-07-22 | 1 | -34/+30 |
| | | | | | | reality, and reformatting to be readable. formatting and wording suggestions miod@ jmc@ | ||||
* | Kill a bunch more BUF_strdup's - these are converted to have a check for | beck | 2014-07-22 | 12 | -30/+40 |
| | | | | | NULL before an intrinsic strdup. ok miod@ | ||||
* | better match proposed syscall api | bcook | 2014-07-22 | 2 | -16/+4 |
| | |||||
* | protect sysctl path with SYS__sysctl instead; from enh@google, ok bcook | deraadt | 2014-07-21 | 2 | -12/+12 |
| | |||||
* | Use explicit_bzero() instead of memset() on buffers going out of scope. | guenther | 2014-07-21 | 6 | -12/+18 |
| | | | | | | | Also, zero the SHA256 context. suggested by "eric" in a comment on an opensslrampage.org post ok miod@ deraadt@ | ||||
* | cast from void * before math; enh@google | deraadt | 2014-07-21 | 2 | -4/+4 |
| | |||||
* | missing newline | deraadt | 2014-07-21 | 1 | -1/+2 |
| | |||||
* | Switch from <sys/endian.h> or <machine/endian.h> to the new, | guenther | 2014-07-21 | 5 | -10/+10 |
| | | | | | | being-standardized <endian.h> ok deraadt@ millert@ beck@ | ||||
* | Move more OS-specific functionality to arc4random.h headers. | bcook | 2014-07-20 | 10 | -14/+88 |
| | | | | | | | | Move <sys/mman.h> and raise(SIGKILL) calls to OS-specific headers. On OpenBSD, move thread_private.h as well to arc4random.h. On Windows, use TerminateProcess on getentropy failure. ok deraadt@ | ||||
* | initial win32 ARC4_LOCK/UNLOCK implementation. | bcook | 2014-07-20 | 2 | -2/+42 |
| | | | | | It may make sense to later replace this with a Critical Section later. ok guenther@ | ||||
* | From ISO/IEC 9899:1999 and 9899:201x, | guenther | 2014-07-20 | 2 | -5/+5 |
| | | | | | | | | | 6.11.5 - Storage-class specifiers: The placement of a storage-class specifier other than at the beginning of the declaration specifiers in a declaration is an obsolescent feature. Diff from Jean-Philippe Ouellet (jean-philippe (at) ouellet.biz) | ||||
* | Demonstrate how new linux getrandom() will be called, at least until | deraadt | 2014-07-20 | 2 | -2/+74 |
| | | | | | | it shows up in libraries. Even the system call is probably not finalized. Bit dissapointed it has turned out to be a descriptor-less read() with EINVAL and EINTR error conditions, but we can work with it. | ||||
* | Mark the format string argument to BIO_*printf as not being allowed to be NULL | guenther | 2014-07-20 | 2 | -10/+14 |
| | | | | ok bcook@ | ||||
* | Fix ordering breakage, moving the fclose() test last again. | guenther | 2014-07-20 | 1 | -6/+22 |
| | | | | | | Also correct some format strings. From Doug Hogan (doug (at) acyclic.org) | ||||
* | Make sure the correct errno is reported by warn* or err* and not | guenther | 2014-07-20 | 7 | -7/+14 |
| | | | | | | the errno of an intervening cleanup operation like close/unlink/etc. Diff from Doug Hogan (doug (at) acyclic.org) | ||||
* | Delete unused variables found by -Wall | guenther | 2014-07-20 | 5 | -5/+2 |
| | |||||
* | Add missing include. Tickled by Doug Hogan (doug (at) acyclic.org) | guenther | 2014-07-20 | 1 | -0/+1 |
| | |||||
* | remove disabled main hook; we use phdr now; ok bcook | deraadt | 2014-07-19 | 6 | -42/+6 |
| | |||||
* | arc4random re-seeds with getentropy() now; ok deraadt@ jmc@ | naddy | 2014-07-19 | 1 | -3/+3 |
| | |||||
* | tab love | deraadt | 2014-07-19 | 2 | -6/+6 |
| | |||||
* | Move _ARC4_ATFORK handlers from thread_private.h in portable. | bcook | 2014-07-19 | 6 | -6/+30 |
| |