summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/recallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2017-08-28Update due to removal of original chacha20-poly1305 cipher suites.jsing1-42/+39
2017-08-28Remove the original (pre-IETF) chacha20-poly1305 cipher suites.jsing4-73/+5
Support for the IETF standardised chacha20-poly1305 cipher suites was added 16 months ago, which means they exist in both of the currently supported OpenBSD releases. Also prompted by Andreas Bartelt <obsd at bartula dot de>. ok beck@ doug@
2017-08-28Fix unchecked return nitbeck1-2/+5
ok bcook@ jsing@
2017-08-27Rewrite SRTP extension using CBB/CBS and the new extension framework.doug6-275/+652
input + ok beck@, jsing@
2017-08-27check return value from CBB_initbeck1-2/+3
2017-08-27Make the symbol for ASN1_time_tm_clamp_notafter visible so libtlsbeck4-5/+10
can get at it, so libtls can also deal with notafter's past the realm of 32 bit time in portable
2017-08-26Rewrite ALPN extension using CBB/CBS and the new extension framework.doug5-144/+540
ok bcook@ beck@ input + ok jsing@
2017-08-23Work around bug in F5's handling of the supported elliptic curves extension.doug1-2/+16
RFC 4492 only defines elliptic_curves for ClientHello. However, F5 is sending it in ServerHello. We need to skip over it since our TLS extension parsing code is now more strict. Thanks to Armin Wolfermann and WJ Liu for reporting the issue. input + ok jsing@
2017-08-21import SSL_export_keying_material(3) from OpenSSLschwarze3-3/+132
2017-08-21merge the applicable parts of SSL_set_tlsext_host_name(3) documentation;schwarze1-4/+28
from Paul Yang <yang dot yang at baishancloud dot com> via OpenSSL commit 190b9a03 Jun 28 15:46:13 2017 +0800
2017-08-21Selectively merge OpenSSL commit e091367d May 5 11:56:45 2017 +0100schwarze1-16/+15
from Matt Caswell <matt at openssl dot org>. In particular, stop talking about SSL 2.0 and SSL 3.0, but do not start talking about TLS 1.3 just yet.
2017-08-21Mention three functions related to protocol selection by the clientschwarze1-3/+48
that are deprecated no-ops in LibreSSL, but that OpenSSL explicitly documented on April 19, 2017, without deprecating them.
2017-08-21Delete non-existent function SSL_flush_sessions();schwarze1-12/+4
from Rich Salz <rsalz at openssl dot org> via OpenSSL commit 1722496f Jun 8 15:18:38 2017 -0400.
2017-08-21Delete non-existent functions SSL_add_session() and SSL_remove_session() andschwarze1-18/+6
clarify that SSL_CTX_remove_session(3) marks the session as non-resumable. From Rich Salz <rsalz at openssl dot org> via OpenSSL commit 1722496f Jun 8 15:18:38 2017 -0400 and from Matt Caswell <matt at openssl dot org> via OpenSSL commit b8964668 Apr 26 15:16:18 2017 +0100.
2017-08-20New manual page X509_check_private_key(3), using informationschwarze3-4/+69
from the OpenSSL manual and from code inspection. Use my own Copyright and license because no Copyright-worthy amount of text from OpenSSL remains. And, no, these functions do *NOT* check private keys, not at all.
2017-08-20fix a pasto in the description of UI_get0_result_string(3);schwarze1-4/+4
from Richard Levitte <levitte at openssl dot org> via OpenSSL commit e9c9971b Jul 1 18:28:50 2017 +0200
2017-08-20Add a BUGS section stating that RSA_PKCS1_PADDING is weak by design;schwarze1-3/+11
from Emilia Kasper <emilia at openssl dot org> via OpenSSL commit 1e3f62a3 Jul 17 16:47:13 2017 +0200.
2017-08-20Add a BUGS sectionschwarze1-3/+10
stating that RSA_padding_check_PKCS1_type_2(3) is weak by design; from Emilia Kasper <emilia at openssl dot org> via OpenSSL commit 1e3f62a3 Jul 17 16:47:13 2017 +0200.
2017-08-20import PEM_bytes_read_bio(3) from OpenSSL,schwarze4-7/+124
dropping the secmem stuff that we don't want
2017-08-20mention CRYPTO_mem_leaks_cb(3) because OpenSSLschwarze1-4/+18
now also documents it, in OPENSSL_malloc.pod
2017-08-20import EVP_PKEY_meth_get_count.pod from OpenSSL, pruning the functions weschwarze2-1/+75
don't have, which implies renaming the file to EVP_PKEY_meth_get0_info.3
2017-08-20fix wrong function name;schwarze1-6/+7
from Rich Salz <rsalz at openssl dot org> via OpenSSL commit 1722496f Jun 8 15:18:38 2017 -0400
2017-08-20sync with OpenSSL:schwarze1-4/+14
1. mention three additional functions for stitched ciphers from Steven Collison <steven at raycoll dot com> via OpenSSL commit 209fac9f Mar 28 12:46:07 2017 -0700 2. fix wrong data type of an automatic variable in an example from Paul Yang <paulyang dot inf at gmail dot com> via OpenSSL commit 719b289d May 22 23:18:45 2017 +0800 3. fix memory leak in sample encryption code and check return value of fopen from Greg Zaverucha <gregz at microsoft dot com> via OpenSSL commit 519a5d1e Jun 27 17:38:25 2017 -0700
2017-08-20zap trailing whitespace;jmc1-2/+2
2017-08-20sprinkle a few missing dependencies on perl scripts internal bits.espie3-11/+17
'it works' deraadt@
2017-08-20remove a duplicate BIO_do_accept() call from an example;schwarze1-12/+6
from Beat Bolli <dev at drbeat dot li> via OpenSSL commit 7a67a3ba Jan 18 23:49:43 2017 +0100
2017-08-20Sync with OpenSSL: document several new functions, plus some additionalschwarze1-48/+227
minor improvements. Mostly from Todd Short <tshort at akamai dot com> via OpenSSL commit cf37aaa3 Aug 4 11:24:03 2017 +1000.
2017-08-20clarify deprecation notice;schwarze1-6/+7
from Rich Salz, OpenSSL commit a95d7574, July 2, 2017
2017-08-20New ASN1_STRING_TABLE_add(3) manual page, based on information fromschwarze2-1/+94
the OpenSSL manual page committed on July 27, 2017, and on source code inspection. Use my own Copyright and license because no copyright-worthy amount of text from OpenSSL remains. NOTA BENE: BUGS Most aspects of the semantics considerably differ from OpenSSL.
2017-08-20two MALLOC_STATS only tweaks; one from David CARLIER, the other found by clangotto1-8/+4
2017-08-19fix .Xr ordering, found with mandoc -Tlintschwarze2-6/+6
2017-08-19Import SSL_CTX_set_min_proto_version(3) from OpenSSL, suggested by jsing@.schwarze5-7/+134
While importing: * Fix the prototypes, they all contained wrong datatypes. * Delete SSL3_VERSION which is no longer supported. * Delete TLS1_3_VERSION and DTLS1_2_VERSION, not yet supported. * Delete the lie that these would be macros. * Improve SEE ALSO and HISTORY sections.
2017-08-19fix a typo and mention OpenBSD in HISTORY;schwarze1-3/+5
both pointed out by jsing@
2017-08-16test locale priorities and overridesschwarze1-1/+36
2017-08-16test isalpha_l(3), tolower_l(3), wctype_l(3), iswctype_l(3),schwarze1-4/+149
wctrans_l(3), towctrans_l(3), wcscasecmp_l(3), wcsncasecmp_l(3), and strerror_l(3)
2017-08-16test nl_langinfo_l(3), iswalpha_l(3), towupper_l(3)schwarze2-3/+44
2017-08-15refactor in preparation for testing more functions; no functional changeschwarze2-114/+117
2017-08-14Use sendsyslog() directly instead of syslog_r() for the "backwards memcpy"guenther1-3/+12
messages, to avoid pulling in piles of other machinery unnecessarily problem observed by schwarze@ ok deraadt@ millert@
2017-08-14fix missing bracket on ARMbcook1-15/+15
ok beck@
2017-08-13match function implementation with declaration, ok beck@, doug@bcook1-2/+2
2017-08-13Add ability to clamp a notafter to values representable in a 32 bit time_tbeck3-7/+41
This will only be used in portable. As noted, necessary to make us conformant to RFC 5280 4.1.2.5. ok jsing@ bcook@
2017-08-13Switch to -Werror with clang for libressl.doug4-8/+8
Discussed with beck@ and jsing@ ok beck@
2017-08-13move endian/word size checks from runtime to compile timebcook4-325/+340
ok guenther@
2017-08-13Make SSL{,_CTX}_set_alpn_protos() do atomic updates and handle NULL.doug1-10/+38
Previously, the code would accept NULL and 0 length and try to malloc/memcpy it. On OpenBSD, malloc(0) does not return NULL. It could also fail in malloc and leave the old length. Also, add a note that this public API has backwards semantics of what you would expect where 0 is success and 1 is failure. input + ok jsing@ beck@
2017-08-13Convert the sigma and tau initialisers to byte arrays, rather than usingjsing1-3/+12
strings. The original code is perfectly valid C, however it causes some compilers to complain since it lacks room for a string NUL terminator and the compiler is not smart enough to realise that these are only used as byte arrays and never treated as strings. ok bcook@ beck@ inoguchi@
2017-08-13Remove support for the TLS padding extension.jsing2-39/+4
This was added as a workaround for broken F5 TLS termination, which then created issues talking to broken IronPorts. The size of the padding is hardcoded so it cannot be used in any generic sense. ok bcook@ beck@ doug@
2017-08-13Nuke SSL_OP_CRYPTOPRO_TLSEXT_BUG.jsing2-27/+4
This was a workaround for a server that needed to talk GOST to old/broken CryptoPro clients. This has no impact on TLS clients that are using GOST. ok bcook@ beck@ doug@
2017-08-12Rewrite the TLS status request extension to use the new TLS extension framework.beck4-178/+307
ok jsing@
2017-08-12Minimize #includes, particularly to avoid thread_private.hguenther2-7/+3
ok tedu@
2017-08-12Add regress coverage for the TLS signature algorithms extension.jsing1-1/+163