summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/malloc.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2017-08-31Remove OPENSSL_NO_NEXTPROTONEG - some software creates conflictingjsing1-1/+0
prototypes if we have both OPENSSL_NO_NEXTPROTONEG and the prototypes defined.
2017-08-31Mention strtok_r in STANDARDSjca1-2/+6
POSIX 2001 instead of POSIX.1c suggested by millert@ and jmc@, ok jmc@
2017-08-30Move the full extension building into tlsext_{client,server}hello_build(),jsing2-47/+26
leaving ssl_add_{client,server}hello_tlsext() as pointer to CBB wrappers. ok doug@
2017-08-30Bump libssl/libtls minors due to symbol (re)addition.jsing2-2/+2
2017-08-30Bring back the NPN related symbols.jsing3-3/+36
Several pieces of software make use of these based on a conditional around OPENSSL_NPN_NEGOTIATED, rather than using the presence of the symbols, the non-existence of a OPENSSL_NO_NEXTPROTONEG define or even the existence of the TLS extension type. Unfortunately we cannot remove OPENSSL_NPN_NEGOTIATED since the API for ALPN was effectively botched and reuses two parts from the NPN implementation, rather than providing ALPN specific or generic versions.
2017-08-30Bring back the RSA_SSLV23_PADDING define.jsing1-1/+2
Several pieces of software expect this to be available unconditionally.
2017-08-30Fix ifdef to if in gcm128.cinoguchi1-2/+2
ok deraadt@ bcook@
2017-08-29When OCSP status type is unknown, ignore the extension.doug1-1/+6
This needs to skip past the CBS data or it will be treated as a decode error even though it returns 1. ok jsing@
2017-08-29When parsing extensions by calling the parse functions directly, ensurejsing1-2/+82
that we have consumed all of the extension data. This catches the ALPN extension handling issue that was just fixed.
2017-08-29Actually parse the ALPN extension in a client hello, even if no ALPNjsing1-4/+4
callback has been installed. This ensures that the ALPN extension is valid and avoids leaving unprocessed extension data, which leads to a decode error. Found the hard way by jsg@
2017-08-28ECDHE-RSA-DES-CBC3-SHA should not be marked HIGH.jsing1-2/+2
Spotted by Andreas Bartelt <obsd at bartula dot de>
2017-08-28Some style(9).jsing1-3/+6
2017-08-28Remove chacha20-poly1305-old regress and test vectors.jsing2-627/+0
2017-08-28Remove SSLv23 padding mode.jsing2-7/+5
2017-08-28Bump lib{crypto,ssl,tls} majors due to symbol removals.jsing3-6/+6
2017-08-28Remove EVP_aead_chacha20_poly1305_old() now that the original/oldjsing3-83/+28
chacha20-poly1305 cipher suites have been removed from libssl.
2017-08-28Remove documentation for EVP_aead_chacha20_poly1305_ietf() - this wasjsing1-13/+3
removed/renamed a long time back.
2017-08-28Put the opening curly brace in the right place.jsing1-2/+3
2017-08-28Remove RSA_padding_add_SSLv23()/RSA_padding_check_SSLv23() and relatedjsing9-202/+11
code. We removed SSLv2/SSLv3 a long time ago... Discussed with doug@
2017-08-28Define OPENSSL_NO_NEXTPROTONEG since there is no longer any NPN.jsing1-0/+1
2017-08-28Completely remove NPN remnants.jsing7-107/+9
Based on a diff from doug@, similar diff from inoguchi@
2017-08-28Use current chacha20-poly1305 cipher suite values.jsing1-7/+7
2017-08-28Update due to removal of original chacha20-poly1305 cipher suites.jsing1-42/+39
2017-08-28Remove the original (pre-IETF) chacha20-poly1305 cipher suites.jsing4-73/+5
Support for the IETF standardised chacha20-poly1305 cipher suites was added 16 months ago, which means they exist in both of the currently supported OpenBSD releases. Also prompted by Andreas Bartelt <obsd at bartula dot de>. ok beck@ doug@
2017-08-28Fix unchecked return nitbeck1-2/+5
ok bcook@ jsing@
2017-08-27Rewrite SRTP extension using CBB/CBS and the new extension framework.doug6-275/+652
input + ok beck@, jsing@
2017-08-27check return value from CBB_initbeck1-2/+3
2017-08-27Make the symbol for ASN1_time_tm_clamp_notafter visible so libtlsbeck4-5/+10
can get at it, so libtls can also deal with notafter's past the realm of 32 bit time in portable
2017-08-26Rewrite ALPN extension using CBB/CBS and the new extension framework.doug5-144/+540
ok bcook@ beck@ input + ok jsing@
2017-08-23Work around bug in F5's handling of the supported elliptic curves extension.doug1-2/+16
RFC 4492 only defines elliptic_curves for ClientHello. However, F5 is sending it in ServerHello. We need to skip over it since our TLS extension parsing code is now more strict. Thanks to Armin Wolfermann and WJ Liu for reporting the issue. input + ok jsing@
2017-08-21import SSL_export_keying_material(3) from OpenSSLschwarze3-3/+132
2017-08-21merge the applicable parts of SSL_set_tlsext_host_name(3) documentation;schwarze1-4/+28
from Paul Yang <yang dot yang at baishancloud dot com> via OpenSSL commit 190b9a03 Jun 28 15:46:13 2017 +0800
2017-08-21Selectively merge OpenSSL commit e091367d May 5 11:56:45 2017 +0100schwarze1-16/+15
from Matt Caswell <matt at openssl dot org>. In particular, stop talking about SSL 2.0 and SSL 3.0, but do not start talking about TLS 1.3 just yet.
2017-08-21Mention three functions related to protocol selection by the clientschwarze1-3/+48
that are deprecated no-ops in LibreSSL, but that OpenSSL explicitly documented on April 19, 2017, without deprecating them.
2017-08-21Delete non-existent function SSL_flush_sessions();schwarze1-12/+4
from Rich Salz <rsalz at openssl dot org> via OpenSSL commit 1722496f Jun 8 15:18:38 2017 -0400.
2017-08-21Delete non-existent functions SSL_add_session() and SSL_remove_session() andschwarze1-18/+6
clarify that SSL_CTX_remove_session(3) marks the session as non-resumable. From Rich Salz <rsalz at openssl dot org> via OpenSSL commit 1722496f Jun 8 15:18:38 2017 -0400 and from Matt Caswell <matt at openssl dot org> via OpenSSL commit b8964668 Apr 26 15:16:18 2017 +0100.
2017-08-20New manual page X509_check_private_key(3), using informationschwarze3-4/+69
from the OpenSSL manual and from code inspection. Use my own Copyright and license because no Copyright-worthy amount of text from OpenSSL remains. And, no, these functions do *NOT* check private keys, not at all.
2017-08-20fix a pasto in the description of UI_get0_result_string(3);schwarze1-4/+4
from Richard Levitte <levitte at openssl dot org> via OpenSSL commit e9c9971b Jul 1 18:28:50 2017 +0200
2017-08-20Add a BUGS section stating that RSA_PKCS1_PADDING is weak by design;schwarze1-3/+11
from Emilia Kasper <emilia at openssl dot org> via OpenSSL commit 1e3f62a3 Jul 17 16:47:13 2017 +0200.
2017-08-20Add a BUGS sectionschwarze1-3/+10
stating that RSA_padding_check_PKCS1_type_2(3) is weak by design; from Emilia Kasper <emilia at openssl dot org> via OpenSSL commit 1e3f62a3 Jul 17 16:47:13 2017 +0200.
2017-08-20import PEM_bytes_read_bio(3) from OpenSSL,schwarze4-7/+124
dropping the secmem stuff that we don't want
2017-08-20mention CRYPTO_mem_leaks_cb(3) because OpenSSLschwarze1-4/+18
now also documents it, in OPENSSL_malloc.pod
2017-08-20import EVP_PKEY_meth_get_count.pod from OpenSSL, pruning the functions weschwarze2-1/+75
don't have, which implies renaming the file to EVP_PKEY_meth_get0_info.3
2017-08-20fix wrong function name;schwarze1-6/+7
from Rich Salz <rsalz at openssl dot org> via OpenSSL commit 1722496f Jun 8 15:18:38 2017 -0400
2017-08-20sync with OpenSSL:schwarze1-4/+14
1. mention three additional functions for stitched ciphers from Steven Collison <steven at raycoll dot com> via OpenSSL commit 209fac9f Mar 28 12:46:07 2017 -0700 2. fix wrong data type of an automatic variable in an example from Paul Yang <paulyang dot inf at gmail dot com> via OpenSSL commit 719b289d May 22 23:18:45 2017 +0800 3. fix memory leak in sample encryption code and check return value of fopen from Greg Zaverucha <gregz at microsoft dot com> via OpenSSL commit 519a5d1e Jun 27 17:38:25 2017 -0700
2017-08-20zap trailing whitespace;jmc1-2/+2
2017-08-20sprinkle a few missing dependencies on perl scripts internal bits.espie3-11/+17
'it works' deraadt@
2017-08-20remove a duplicate BIO_do_accept() call from an example;schwarze1-12/+6
from Beat Bolli <dev at drbeat dot li> via OpenSSL commit 7a67a3ba Jan 18 23:49:43 2017 +0100
2017-08-20Sync with OpenSSL: document several new functions, plus some additionalschwarze1-48/+227
minor improvements. Mostly from Todd Short <tshort at akamai dot com> via OpenSSL commit cf37aaa3 Aug 4 11:24:03 2017 +1000.
2017-08-20clarify deprecation notice;schwarze1-6/+7
from Rich Salz, OpenSSL commit a95d7574, July 2, 2017