summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/malloc.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2015-06-19Return the failing engine ID in the error stack.bcook2-4/+8
Noted by doug@ in an earlier revision of the dynamic engine removal patch, but I had forgotten to include it in the latest version.
2015-06-19Add standard headers, C++ support to tls.h.bcook1-1/+12
This makes using libtls easier to include by including dependent headers, making something like this work as expected: #include <iostream> #include <tls.h> int main() { std::cout << "tls_init: " << tls_init() << "\n"; } This also makes building a standalone libtls-portable simpler. ok doug@, jsing@
2015-06-19Disable ENGINE_load_dynamic (dynamic engine support).bcook34-1060/+22
We do not build, test or ship any dynamic engines, so we can remove the dynamic engine loader as well. This leaves a stub initialization function in its place. ok beck@, reyk@, miod@
2015-06-19Convert tls1_alpn_handle_client_hello() to CBS.doug2-40/+28
tweak + ok miod@ jsing@
2015-06-19Add CBS_dup() to initialize a new CBS with the same values.doug4-4/+28
This is useful for when you need to check the data ahead and then continue on from the same spot. input + ok jsing@ miod@
2015-06-18Extend the input types for CBB_add_*() to help catch bugs.doug4-26/+50
While the previous types were correct, they can silently accept bad data via truncation or signed conversion. We now take size_t as input for CBB_add_u*() and do a range check. discussed with deraadt@ input + ok jsing@ miod@
2015-06-18Remove Microsoft Server Gated Crypto.doug16-264/+52
Another relic due to the old US crypto policy. From OpenSSL commit 63eab8a620944a990ab3985620966ccd9f48d681 and 95275599399e277e71d064790a1f828a99fc661a. ok jsing@ miod@
2015-06-18Change DTLS client cert request code to match TLS.doug2-12/+12
DTLS currently doesn't check whether a client cert is expected. This change makes the logic in dtls1_accept() match that from ssl3_accept(). From OpenSSL commit c8d710dc5f83d69d802f941a4cc5895eb5fe3d65 input + ok jsing@ miod@
2015-06-18spelling fixes from theo buehler;jmc1-4/+4
2015-06-17add DST Root CA X3 certificate, already present in most browser cert stores.sthen1-0/+77
"O=Digital Signature Trust Co., CN=DST Root CA X3". This CA is cross signing the issuing intermediates for letsencrypt.org so is expected to be important for at least ports distfile fetching in the future. ok ajacoutot@ juanfra@
2015-06-17Clean up alert codes and add references.jsing2-42/+58
2015-06-17Keep alerts sorted by alert code.jsing5-14/+15
2015-06-17Remove pointless comments.jsing2-14/+6
2015-06-17Convert ssl_next_proto_validate to CBS.doug2-22/+24
ok miod@, tweak + ok jsing@
2015-06-17Convert tls1_check_curve to CBS.doug2-8/+20
ok miod@ jsing@
2015-06-17KNF whitespace.doug4-34/+38
ok miod@ jsing@
2015-06-17Use explicit int in bs_cbs.c.doug4-44/+48
ok miod@ jsing@
2015-06-17Use explicit int in bs_ber.c.doug2-16/+16
ok miod@ jsing@
2015-06-17Add tests for CBS_offset() and CBS_write_bytes().doug1-2/+70
"no problem" miod@, tweak + ok jsing@
2015-06-17Add CBS_write_bytes() to copy the remaining CBS bytes to the caller.doug4-4/+48
This is a common operation when dealing with CBS. ok miod@ jsing@
2015-06-17Add a new function CBS_offset() to report the current offset in the data.doug4-4/+30
"why not" miod@, sure jsing@
2015-06-17Cleanup SSL_OP_* compat flags in ssl.h.doug2-62/+48
These were recently removed and are now set to 0: SSL_OP_NETSCAPE_CA_DN_BUG SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG SSL_OP_SSLEAY_080_CLIENT_DH_BUG The code associated with these was deleted in the past at some point and these are also now 0: SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION SSL_OP_EPHEMERAL_RSA SSL_OP_MICROSOFT_SESS_ID_BUG SSL_OP_NETSCAPE_CHALLENGE_BUG SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG The SSL_OP_ALL macro has been updated to reflect the removals. ok miod@ jsing@
2015-06-16Be more strict about BER and DER terminology.doug5-71/+84
bs_ber.c does not convert BER to DER. It's a hack to convert a DER-like encoding with one violation (indefinite form) to strict DER. Rename the functions to reflect this. ok miod@ jsing@
2015-06-16Simplify cbs_get_any_asn1_element_internal based on comments from jsing@doug4-34/+26
2015-06-16Add support for OPTION_DISCARD.doug1-1/+4
ok jsing@
2015-06-15Make CBS_get_any_asn1_element() more compliant with DER encoding.doug6-56/+172
CBS_get_any_asn1_element violates DER encoding by allowing indefinite form. All callers except bs_ber.c expect DER encoding. The callers must check to see if it was indefinite or not. Rather than exposing all callers to this behavior, cbs_get_any_asn1_element_internal() allows specifying whether you want to allow the normally forbidden indefinite form. This is used by CBS_get_any_asn1_element() for strict DER encoding and by a new static function in bs_ber.c for the relaxed version. While I was here, I added comments to differentiate between ASN.1 restrictions and CBS limitations. ok miod@
2015-06-15Remove ancient SSL_OP_NETSCAPE_CA_DN_BUG from SSLeay days.doug8-106/+40
This commit matches the OpenSSL removal in commit 3c33c6f6b10864355553961e638514a6d1bb00f6. ok deraadt@
2015-06-15Remove ancient compat hack SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG.doug5-81/+11
This was imported into OpenSSL from SSLeay. It was recently deleted in OpenSSL commit 7a4dadc3a6a487db92619622b820eb4f7be512c9
2015-06-15Remove 1997's compat hack SSL_OP_SSLEAY_080_CLIENT_DH_BUG.doug4-22/+16
This is a hack for an old version of SSLeay which predates OpenSSL.
2015-06-15Update SSL_OP_* to remove ancient hacks that are no longer enabled.doug2-26/+22
2015-06-13Split up the logic in CBB_flush to separately handle the lengths.doug2-42/+64
Also, add comments about assuming short-form. ok miod@, tweak + ok jsing@
2015-06-13Explain the ASN.1 restriction that requires extra logic for encoding.doug2-4/+36
ok miod@ jsing@
2015-06-13When initial capacity is 0, always use NULL buffer.doug2-14/+16
malloc(0) is implementation defined and there's no reason to introduce that ambiguity here. Added a few cosmetic changes in sizeof and free. ok miod@ jsing@
2015-06-13Add comments about how the CBS constants are constructed.doug2-24/+86
Also, introduce a few more #defines to make it obvious. ok miod@ jsing@
2015-06-13Reject long-form tags in CBS_peek_asn1_tag.doug2-2/+16
Currently, CBS only handles short-form tags. ok miod@ jsing@
2015-06-13Fix bad indenting in LibreSSL.doug10-24/+24
jsg@ noticed that some of the lines in libssl and libcrypto are not indented properly. At a quick glance, it looks like it has a different control flow than it really does. I checked the history in our tree and in OpenSSL to make sure these were simple mistakes. ok miod@ jsing@
2015-06-13Remove unneeded sys/sysctl.h on linux.bcook2-4/+2
This only provides the sysctl wrapper in glibc, which we do not use and is not available in other libc implementations for Linux. Thanks to ncopa from github.
2015-06-11Avoid an infinite loop that can occur when verifying a message with anlibressl-v2.2.0jsing2-4/+4
unknown hash function OID. Diff based on OpenSSL. Fixes CVE-2015-1792 (however, this code is not enabled/built in LibreSSL). ok doug@ miod@
2015-06-11Avoid a potential out-of-bounds read in X509_cmp_time(), due to missingjsing2-8/+54
length checks. Diff based on changes in OpenSSL. Fixes CVE-2015-1789. ok doug@
2015-06-11Avoid an infinite loop that can be triggered by parsing an ASN.1jsing2-6/+16
ECParameters structure that has a specially malformed binary polynomial field. Issue reported by Joseph Barr-Pixton and fix based on OpenSSL. Fixes CVE-2015-1788. ok doug@ miod@
2015-06-05Link ssl and crypto via BSDOBJDIR, works with native and cross buildstobiasu1-3/+3
ok mpi@
2015-06-05Fix library search path so we link against the freshly built libcrypto.sotobiasu1-2/+2
instead of a stale one. ok miod@ mpi@
2015-06-04force reseeding if pid has changed.eric1-2/+7
ok deraadt@
2015-05-29Need to operate of CXXFLAGS now.miod1-3/+3
2015-05-26Use a relative path against BSDOBJDIR to pick libcrypto; makes cross-libmiod1-2/+2
work again.
2015-05-26Add OPENSSL_NO_EGD to opensslfeatures.h.bcook2-0/+2
Since RAND_egd has been removed from LibreSSL, simplify porting software that relies on it. See https://github.com/libressl-portable/openbsd/pull/34 from Bernard Spil, ok deraadt@
2015-05-25Make SSL_CIPHER_get_bits() report ChaCha20-Poly1305 ciphers as usingguenther2-8/+8
256bit keys problem noted by Tim Kuijsten (info (at) netsend.nl) ok deraadt@ miod@ bcook@
2015-05-24Maximilian dot Fillinger at uni-duesseldorf dot deschwarze3-74/+109
starts helping with the pod2mdoc(1)-based conversion of LibreSSL crypto manuals from perlpod(1) to mdoc(7). Here comes the first file, slightly tweaked by me.
2015-05-23bump to version 2.2bcook2-4/+4
ok deraadt@
2015-05-20No need to check the return value of memcpy() if you actually checked thismiod2-6/+4
pointer for NULL the line above; ok doug@