summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/recallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2017-08-21Delete non-existent function SSL_flush_sessions();schwarze1-12/+4
from Rich Salz <rsalz at openssl dot org> via OpenSSL commit 1722496f Jun 8 15:18:38 2017 -0400.
2017-08-21Delete non-existent functions SSL_add_session() and SSL_remove_session() andschwarze1-18/+6
clarify that SSL_CTX_remove_session(3) marks the session as non-resumable. From Rich Salz <rsalz at openssl dot org> via OpenSSL commit 1722496f Jun 8 15:18:38 2017 -0400 and from Matt Caswell <matt at openssl dot org> via OpenSSL commit b8964668 Apr 26 15:16:18 2017 +0100.
2017-08-20New manual page X509_check_private_key(3), using informationschwarze3-4/+69
from the OpenSSL manual and from code inspection. Use my own Copyright and license because no Copyright-worthy amount of text from OpenSSL remains. And, no, these functions do *NOT* check private keys, not at all.
2017-08-20fix a pasto in the description of UI_get0_result_string(3);schwarze1-4/+4
from Richard Levitte <levitte at openssl dot org> via OpenSSL commit e9c9971b Jul 1 18:28:50 2017 +0200
2017-08-20Add a BUGS section stating that RSA_PKCS1_PADDING is weak by design;schwarze1-3/+11
from Emilia Kasper <emilia at openssl dot org> via OpenSSL commit 1e3f62a3 Jul 17 16:47:13 2017 +0200.
2017-08-20Add a BUGS sectionschwarze1-3/+10
stating that RSA_padding_check_PKCS1_type_2(3) is weak by design; from Emilia Kasper <emilia at openssl dot org> via OpenSSL commit 1e3f62a3 Jul 17 16:47:13 2017 +0200.
2017-08-20import PEM_bytes_read_bio(3) from OpenSSL,schwarze4-7/+124
dropping the secmem stuff that we don't want
2017-08-20mention CRYPTO_mem_leaks_cb(3) because OpenSSLschwarze1-4/+18
now also documents it, in OPENSSL_malloc.pod
2017-08-20import EVP_PKEY_meth_get_count.pod from OpenSSL, pruning the functions weschwarze2-1/+75
don't have, which implies renaming the file to EVP_PKEY_meth_get0_info.3
2017-08-20fix wrong function name;schwarze1-6/+7
from Rich Salz <rsalz at openssl dot org> via OpenSSL commit 1722496f Jun 8 15:18:38 2017 -0400
2017-08-20sync with OpenSSL:schwarze1-4/+14
1. mention three additional functions for stitched ciphers from Steven Collison <steven at raycoll dot com> via OpenSSL commit 209fac9f Mar 28 12:46:07 2017 -0700 2. fix wrong data type of an automatic variable in an example from Paul Yang <paulyang dot inf at gmail dot com> via OpenSSL commit 719b289d May 22 23:18:45 2017 +0800 3. fix memory leak in sample encryption code and check return value of fopen from Greg Zaverucha <gregz at microsoft dot com> via OpenSSL commit 519a5d1e Jun 27 17:38:25 2017 -0700
2017-08-20zap trailing whitespace;jmc1-2/+2
2017-08-20sprinkle a few missing dependencies on perl scripts internal bits.espie3-11/+17
'it works' deraadt@
2017-08-20remove a duplicate BIO_do_accept() call from an example;schwarze1-12/+6
from Beat Bolli <dev at drbeat dot li> via OpenSSL commit 7a67a3ba Jan 18 23:49:43 2017 +0100
2017-08-20Sync with OpenSSL: document several new functions, plus some additionalschwarze1-48/+227
minor improvements. Mostly from Todd Short <tshort at akamai dot com> via OpenSSL commit cf37aaa3 Aug 4 11:24:03 2017 +1000.
2017-08-20clarify deprecation notice;schwarze1-6/+7
from Rich Salz, OpenSSL commit a95d7574, July 2, 2017
2017-08-20New ASN1_STRING_TABLE_add(3) manual page, based on information fromschwarze2-1/+94
the OpenSSL manual page committed on July 27, 2017, and on source code inspection. Use my own Copyright and license because no copyright-worthy amount of text from OpenSSL remains. NOTA BENE: BUGS Most aspects of the semantics considerably differ from OpenSSL.
2017-08-20two MALLOC_STATS only tweaks; one from David CARLIER, the other found by clangotto1-8/+4
2017-08-19fix .Xr ordering, found with mandoc -Tlintschwarze2-6/+6
2017-08-19Import SSL_CTX_set_min_proto_version(3) from OpenSSL, suggested by jsing@.schwarze5-7/+134
While importing: * Fix the prototypes, they all contained wrong datatypes. * Delete SSL3_VERSION which is no longer supported. * Delete TLS1_3_VERSION and DTLS1_2_VERSION, not yet supported. * Delete the lie that these would be macros. * Improve SEE ALSO and HISTORY sections.
2017-08-19fix a typo and mention OpenBSD in HISTORY;schwarze1-3/+5
both pointed out by jsing@
2017-08-16test locale priorities and overridesschwarze1-1/+36
2017-08-16test isalpha_l(3), tolower_l(3), wctype_l(3), iswctype_l(3),schwarze1-4/+149
wctrans_l(3), towctrans_l(3), wcscasecmp_l(3), wcsncasecmp_l(3), and strerror_l(3)
2017-08-16test nl_langinfo_l(3), iswalpha_l(3), towupper_l(3)schwarze2-3/+44
2017-08-15refactor in preparation for testing more functions; no functional changeschwarze2-114/+117
2017-08-14Use sendsyslog() directly instead of syslog_r() for the "backwards memcpy"guenther1-3/+12
messages, to avoid pulling in piles of other machinery unnecessarily problem observed by schwarze@ ok deraadt@ millert@
2017-08-14fix missing bracket on ARMbcook1-15/+15
ok beck@
2017-08-13match function implementation with declaration, ok beck@, doug@bcook1-2/+2
2017-08-13Add ability to clamp a notafter to values representable in a 32 bit time_tbeck3-7/+41
This will only be used in portable. As noted, necessary to make us conformant to RFC 5280 4.1.2.5. ok jsing@ bcook@
2017-08-13Switch to -Werror with clang for libressl.doug4-8/+8
Discussed with beck@ and jsing@ ok beck@
2017-08-13move endian/word size checks from runtime to compile timebcook4-325/+340
ok guenther@
2017-08-13Make SSL{,_CTX}_set_alpn_protos() do atomic updates and handle NULL.doug1-10/+38
Previously, the code would accept NULL and 0 length and try to malloc/memcpy it. On OpenBSD, malloc(0) does not return NULL. It could also fail in malloc and leave the old length. Also, add a note that this public API has backwards semantics of what you would expect where 0 is success and 1 is failure. input + ok jsing@ beck@
2017-08-13Convert the sigma and tau initialisers to byte arrays, rather than usingjsing1-3/+12
strings. The original code is perfectly valid C, however it causes some compilers to complain since it lacks room for a string NUL terminator and the compiler is not smart enough to realise that these are only used as byte arrays and never treated as strings. ok bcook@ beck@ inoguchi@
2017-08-13Remove support for the TLS padding extension.jsing2-39/+4
This was added as a workaround for broken F5 TLS termination, which then created issues talking to broken IronPorts. The size of the padding is hardcoded so it cannot be used in any generic sense. ok bcook@ beck@ doug@
2017-08-13Nuke SSL_OP_CRYPTOPRO_TLSEXT_BUG.jsing2-27/+4
This was a workaround for a server that needed to talk GOST to old/broken CryptoPro clients. This has no impact on TLS clients that are using GOST. ok bcook@ beck@ doug@
2017-08-12Rewrite the TLS status request extension to use the new TLS extension framework.beck4-178/+307
ok jsing@
2017-08-12Minimize #includes, particularly to avoid thread_private.hguenther2-7/+3
ok tedu@
2017-08-12Add regress coverage for the TLS signature algorithms extension.jsing1-1/+163
2017-08-12Convert TLS signature algorithms extension handling to the new framework.jsing6-63/+99
ok beck@ doug@
2017-08-12bump to 2.6.1bcook1-3/+3
2017-08-12Rewrite session ticket TLS extension handling using CBB/CBS and the newdoug4-66/+447
extension framework. ok jsing@ beck@
2017-08-12Remove NPN test coverage.jsing2-129/+1
2017-08-12Remove NPN support - the -nextprotoneg options now become no-ops.jsing4-113/+13
ok bcook@ beck@ doug@
2017-08-12Remove NPN support.jsing7-377/+28
NPN was never standardised and the last draft expired in October 2012. ALPN was standardised in July 2014 and has been supported in LibreSSL since December 2014. NPN has also been removed from Chromium in May 2016. TLS clients and servers that try to use/enable NPN will fail gracefully and fallback to the default protocol, since it will essentially appear that the otherside does not support NPN. At some point in the future we will actually remove the NPN related symbols entirely. ok bcook@ beck@ doug@
2017-08-12errant whitespacebeck1-3/+3
2017-08-12fix resource leaks, ok @guentherbcook1-3/+7
2017-08-12Import the SSL_CTX_set1_groups(3) manual page from OpenSSL, deletingschwarze5-6/+173
the read accessors we don't have and fixing the prototypes - the data type of each and every argument differs in the OpenSSL manuals. Reference the new page from SSL_set_tmp_ecdh(3) as suggested by jsing@.
2017-08-12New manual page SSL_set_tmp_ecdh(3) written from scratch.schwarze4-7/+112
Feedback and OK jsing@.
2017-08-12Remove lots of outdated information found by jsing@.schwarze1-192/+14
OK jsing.
2017-08-12Document tls_config_set_dheparams().jsing1-4/+13