summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/recallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2022-06-30Add tests for times missing seconds, and to be able to testbeck1-3/+43
invalid generalized times specifically
2022-06-30whitespace nittb1-2/+2
2022-06-30Remove obj_mac.h include. Requested by jsingtb1-2/+1
2022-06-29Don't check the signature if a cert is self signed.tb1-2/+7
ok beck jsing
2022-06-29Make ssl_cert_add{0,1}_chain_cert() take ssl/ctxtb4-22/+30
ok beck jsing
2022-06-29ssl_cert_set{0,1}_chain() take ssl/ctxtb4-19/+36
ok beck jsing
2022-06-29Add a security check to ssl_set_cert()tb1-1/+7
ok beck jsing
2022-06-29Make ssl_set_{cert,pkey} take an ssl/ctxtb1-12/+20
ok beck jsing
2022-06-29Refactor use_certificate_chain_* to take ssl/ctx instead of a certtb3-21/+45
ok beck jsing
2022-06-29Add functions that check security level in certs and cert chains.tb2-2/+147
ok beck jsing
2022-06-29Make sure the verifier checks the security level in cert chainstb1-2/+9
ok beck jsing
2022-06-29Remove a confusing commenttb1-7/+2
discussed with jsing
2022-06-29Parse the @SECLEVEL=n annotation in cipher stringstb3-15/+28
To this end, hand the SSL_CERT through about 5 levels of indirection to set an integer on it. ok beck jsing
2022-06-29Add support for sending QUIC transport parametersbeck8-8/+466
This is the start of adding the boringssl API for QUIC support, and the TLS extensions necessary to send and receive QUIC transport data. Inspired by boringssl's https://boringssl-review.googlesource.com/24464 ok jsing@ tb@
2022-06-29Use relative paths so beck can run regress in his git tree and havetb4-8/+12
the correct ssl_local.h etc be picked up.
2022-06-29whitespace nittb1-2/+2
2022-06-29missing blank linetb1-1/+2
2022-06-29Refactor asn1 time parsing to use CBS - enforce valid times in ASN.1 parsing.beck3-68/+155
While we're here enforce valid days for months and leap years. Inspired by same in boringssl. ok jsing@
2022-06-29Also check the security level in SSL_get1_supported_cipherstb1-2/+5
ok beck jsing
2022-06-29Check security level when convertin a cipher list to bytestb1-1/+4
ok beck jsing
2022-06-29Also check the security level when choosing a shared ciphertb1-1/+5
ok beck jsing
2022-06-29There's tentacles, tentacles everywheretb1-1/+7
ok beck jsing
2022-06-29Also check the security level of the 'tmp dh'tb3-3/+24
ok beck jsing
2022-06-29Check the security of DH key sharestb6-6/+42
ok beck, looks good to jsing
2022-06-29Rename one s to ssl for consistencytb1-2/+2
2022-06-29Check sigalg security level when selecting them.tb1-1/+4
ok beck jsing
2022-06-29Check the security bits of the sigalgs' pkeytb1-1/+7
ok beck jsing
2022-06-29Check the security level when building sigalgstb4-12/+20
ok beck jsing
2022-06-29Annotate sigalgs with their security level.tb2-2/+23
ok beck jsing
2022-06-28Add prototypes for ssl{_ctx,}_security()tb1-1/+5
ok beck jsing sthen
2022-06-28Add error code definstb1-1/+6
ok beck jsing sthen
2022-06-28Add a period to a commenttb1-2/+2
Pointed out by jsing
2022-06-28Security level >= 3 requires a ciphersuite with PFStb1-3/+4
ok beck jsing sthen
2022-06-28Add a secop handler for tmp_dhtb1-1/+19
This disallows DHE keys weaker than 1024 bits at level 0 to match OpenSSL behavior. ok beck jsing sthen
2022-06-28Add security level related error codes.tb1-1/+6
ok beck jsing sthen
2022-06-28Sort error stringstb1-3/+3
ok beck jsing sthen
2022-06-28Implement ssl{,_ctx}_security()tb1-1/+15
ok beck jsing sthen
2022-06-28Copy the security level stuff in ssl_cert_dup()tb1-1/+5
ok beck jsing sthen
2022-06-28Set up the default callback in SSL_CERTtb1-1/+8
ok beck jsing sthen
2022-06-28Implement the default security level callbacktb3-2/+202
And here is where the fun starts. The tentacles will grow everywhere. ok beck jsing sthen
2022-06-28Provide OPENSSL_TLS_SECURITY_LEVEL definetb1-1/+7
ok beck jsing sthen
2022-06-28Implement SSL_{CTX_}_{g,s}et_security_level(3)tb1-1/+25
ok beck jsing sthen
2022-06-28Add security callback, level and ex_data fields to SSL_CERTtb1-1/+6
ok beck jsing sthen
2022-06-28Add #defines and prototypes for security level APItb1-1/+72
This marks the start of one of the worst API additions in the history of this library. And as everybody knows the bar is high. Very high. ok beck jsing sthen
2022-06-28Negate unsigned then cast to signed.jsing1-2/+2
Avoid undefined behaviour by negating the unsigned value, before casting to int64_t, rather than casting to int64_t then negating. Fixes oss-fuzz #48499 ok tb@
2022-06-28Take away bogus error assignment before callback call.beck1-2/+1
Keep the depth which was needed. This went an error too far, and broke openssl-ruby's callback and error code sensitivity in it's tests. With this removed, both my newly committed regress to verify the same error codes and depths in the callback, and openssl-ruby's tests pass again. ok tb@
2022-06-28Botan 2.19.2 has removed support for the OpenSSL crypto provider.bluhm2-24/+1
It was incompatible with OpenSSL 3.0. Remove the regression test to check that LibreSSL crypto works with Botan tests. This is better than to keep an outdated Botan in ports. discussed with tb@ beck@
2022-06-28Free ciphers before assigning to themtb1-6/+6
While this is not a leak currently, it definitely looks like one. Pointed out by jsing on review of a diff that touched the vicinity a while ago. ok jsing
2022-06-28Only asn1time needs to be static for now.tb1-2/+4
2022-06-28Make this regress test link staticly and use internal symbolsbeck1-1/+2
so that it works and compiles during the tb@ pre-bump shuffle(tm).