summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/reallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2018-11-09In verbose mode netcat reports to stderr when the listen systembluhm1-16/+29
call has finished. This allows to write race free scripts as they can check that the server is up and running. OK sthen@ tb@
2018-11-09Add const to the data argument of ASN1_set{,_int}_octetstring().tb2-6/+6
From Ben L bobsayshilol () live ! co ! uk ok jsing
2018-11-09Add header guards and hidden declarations.jsing2-2/+19
2018-11-09Add header guards and hidden declarations.jsing1-1/+10
2018-11-09Reimplement the sigalgs processing code into a new implementationbeck9-253/+340
that will be usable with TLS 1.3 with less eye bleed. ok jsing@ tb@
2018-11-08First skeleton of the TLS 1.3 state machine. Based on RFC 8446 andtb3-4/+607
inspired by s2n's state machine. Lots of help and input from jsing. ok beck, jsing
2018-11-08KNFbeck1-3/+4
2018-11-08Clean up and simplify the handshake transcript code.jsing10-166/+144
This provides a cleaner, simpler and more readable API, with code that uses a BUF_MEM instead of a BIO. ok beck@ ("hurry up") and tb@.
2018-11-08Add missing NULL checks on allocation, style(9) and consistently usejsing1-35/+34
goto err instead of handrolling.
2018-11-08Add missing BN_free() calls.jsing1-1/+3
From Ben L <bobsayshilol at live dot co dot uk>.
2018-11-08Use ASN1_TYPE_new()/ASN1_TYPE_free() to avoid leaking memory.jsing1-12/+17
From Ben L <bobsayshilol at live dot co dot uk>.
2018-11-08Stop pretending that a cert member in a SSL and SSL_CTX can be NULL.jsing8-121/+18
ok beck@ tb@
2018-11-08Move #include <openssl/evp.h> to the header.tb2-3/+4
discussed with beck and jsing
2018-11-08Ensure the handshake transcript is cleaned up.jsing2-3/+20
Add a check at the completion of the client/server handshake to ensure that the handshake transcript has been freed. Fix the case where a server asks the client for a certificate, but it does not have one, resulting in the handshake transcript being left around post-handshake. ok bcook@ tb@
2018-11-08Remove some function prototypes that should have been removed in thejsing1-10/+2
previous clean up. Spotted by bcook@
2018-11-08LibreSSL 2.9.0bcook1-3/+3
2018-11-08zap last remains of malloc.conf; prompted by and ok jmc@otto1-6/+6
2018-11-07Use in-place (un)wrapping in the keywrap tests.tb1-5/+8
2018-11-07Add in key_schedule regress tests to regress buildbeck1-1/+2
2018-11-07Add a self test for each SSL library by connecting client withbluhm5-23/+88
server. Check that the highest available TLS version is selected. LibreSSL TLS 1.3 check is disabled until the feature becomes available.
2018-11-07Add initial TLS 1.3 key schedule support with basic regress testsbeck5-2/+685
ok jsing@ tb@
2018-11-07Add interop test with OpenSSL 1.1. TLS 1.3 should be used automaticallybluhm5-10/+55
when it becomes available in LibreSSL. thanks to sthen@ for the new OpenSSL port
2018-11-07Use memmove() instead of memcpy() to get rid of the need fortb1-3/+3
non-overlapping *in and *out buffers as we're already implementing the "in place (un)wrapping" algorithms as given in RFC 3394. This removes a gratuitous API difference to OpenSSLin these undocumented functions. Found while working on wycheproof regress tests. ok beck jsing
2018-11-07Print SSLeay, OpenSSL, and LibreSSL version strings. Make clientbluhm7-12/+71
and server compile with OpenSSL 1.1. Check runtime version string of SSL library.
2018-11-07Add TLSv1.3 cipher suites (with appropriate guards).jsing6-9/+100
ok beck@ tb@
2018-11-07+interopbluhm1-1/+2
2018-11-07Test TLS interoperability between LibreSSL and OpenSSL.bluhm10-0/+549
Implement simple SSL client and server in C. Create four binaries by linking them with LibreSSL or OpenSSL. This way API compatibility is tested. Connect and accept with netcat to test protocol compatibility with libtls. Currently OpenSSL 1.0.2p from ports is used. Plan is to move to OpenSSL 1.1 and and test TLS 1.3. idea from beck@; help from jsing@
2018-11-06Add TLS extension type values for TLSv1.3 (under guards).jsing1-2/+16
ok tb@
2018-11-06Use TLS_CA_CERT_FILE instead of a separate define.jsing2-7/+4
ok beck@ bluhm@ tb@
2018-11-06Define TLS_CA_CERT_FILE rather than having every application create theirjsing3-6/+6
own define for /etc/ssl/cert.pem. ok beck@ bluhm@ tb@
2018-11-06better failure printing, add more checkstb1-9/+35
2018-11-06rm FILES section; prompted by Janne Johanssonotto1-7/+2
2018-11-06Use the new vm.malloc_conf sysctl; ok millert@ deraadt@otto1-6/+11
2018-11-06unrevert the use of bn_rand_interval().tb6-35/+26
ok beck jsing
2018-11-06Unset Z_is_zero after applying coordinate blinding andtb1-3/+4
re-enable coordinate blinding. ok jsing
2018-11-06link rand/ to buildtb1-2/+4
2018-11-06add a regression test for bn_rand_interval()tb2-0/+98
2018-11-06Flip reversed test in bn_rand_interval().tb1-2/+2
ok jsing
2018-11-06Unbreak following elliptic curves to supported groups rename.jsing1-3/+3
Reported by Katherine <luigi30 at gmail dot com> on tech@
2018-11-06disable EC_POINT coordinate blinding due to failures in ECDHE and TLStb1-1/+3
2018-11-06revert use of bn_rand_interval due to failures with ECDHE and TLStb5-24/+33
2018-11-06Add TLSv1.3 to version regress tests.jsing1-4/+80
2018-11-06Include TLSv1.3 in version handling code.jsing1-3/+9
This is effectively a no-op, since most of the code clamps to the maximum version supported by the TLS method (which are still at TLSv1.2). ok beck@ bluhm@ tb@
2018-11-06Add TLS1_3_VERSION and SSL_OP_NO_TLSv1_3 defines under guards.jsing2-2/+13
ok beck@ bluhm@ tb@
2018-11-06Start working towards adding feature flags (rather than anti-feature flags)jsing1-1/+10
for LibreSSL. Add a (commented out) feature flag for TLSv1.3 and define the OPENSSL_NO_TLS1_3 anti-feature flag based on the feature flag. ok beck@ bluhm@ tb@
2018-11-06Unbreak regress following Supported Elliptic Curve extension rename.jsing1-49/+49
2018-11-05Make use of bn_rand_interval() where appropriate.tb5-33/+24
ok beck jsing
2018-11-05Introduce bn_rand_interval() that allows specifying an interval [a, b)tb2-2/+30
from which a a BIGNUM is chosen uniformly at random. ok beck jsing
2018-11-05Eliminate a few "} else" branches, a few unneeded NULL checks beforetb3-43/+33
freeing and indent nearby labels. ok beck jsing
2018-11-05Remove two unnecessary BN_FLG_CONSTTIME dances: BN_mod_exp_ct() alreadytb2-21/+7
takes care of this internally. ok beck jsing