summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/system.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2019-03-24do not call assert(), which has a tendency to leave traces of stuff inderaadt1-2/+3
corefiles. Instead call OPENSSL_assert(), which has recently been trained to do this in a safer (if more awkward to debug) way. discussed with jsing and beck a while back
2019-03-23Add range checks to varios ASN1_INTEGER functions to ensure thebeck3-6/+62
sizes used remain a positive integer. Should address issue 13799 from oss-fuzz ok tb@ jsing@
2019-03-21Fix typo in usage and comment.bluhm3-6/+6
2019-03-21import EVP_camellia_128_cbc(3) from OpenSSL 1.1.1,schwarze4-3/+156
still under a free license, tweaked by me
2019-03-21space before punct;jmc1-3/+3
2019-03-21Split EVP_rc4(3) out of EVP_EncryptInit(3) to reduce clutter.schwarze4-21/+116
The algorithm is insecure and yet its description would spread over three paragraphs in the cipher list, including remarkable advice like using a 40 bit key length.
2019-03-21Split EVP_des_cbc(3) out of EVP_EncryptInit(3) to reduce clutter:schwarze4-55/+230
this moves a large number of functions out of the way that are no longer the latest and greatest. Also mention a few that were missing.
2019-03-21add a handful of missing functionsschwarze1-5/+38
that are also documented in OpenSSL 1.1.1 (still under a free license)
2019-03-21Bring back EVP_chacha20 list item that was accidentally removedtb1-2/+3
in r1.28 when the AES ciphers were split into their own manual.
2019-03-20fix examples (libtls uses its own error reporting mechanism)espie1-4/+4
okay tb@
2019-03-20escape backslashes;schwarze2-11/+11
patch from Peter Piwowarski <peterjpiwowarski at gmail dot com>
2019-03-19Document the flag EVP_CIPHER_CTX_FLAG_WRAP_ALLOW needed for the EVPschwarze2-4/+71
AES wrap modes, the function EVP_CIPHER_CTX_set_flags(3) needed to set it, and the companion functions EVP_CIPHER_CTX_clear_flags(3) and EVP_CIPHER_CTX_test_flags(3). With help and an OK from tb@.
2019-03-19Avoid an internal 2 byte overread in ssl_sigalgs().jsing1-7/+2
Found by oss-fuzz, fixes issue #13797. ok beck@ tb@
2019-03-19Revert TLS1_get{,_client}_version simplification because DTLS.jsing4-14/+15
2019-03-18* note that the handshake must be completed firstschwarze1-4/+15
* correct the description of "unknown" (the previous are both from OpenSSL 1.1.1, still under a free license) * add a comment saying that TLS1_get_version() and TLS1_get_client_version() are intentionally undocumented (reasons provided by jsing@)
2019-03-18Insert a missing input line break after a .Vt macro;schwarze1-4/+5
from Jan Stary <hans at stare dot cz>. Where here, correct one .Vt NULL -> .Dv NULL.
2019-03-18Split EVP_aes_128_cbc(3) out of EVP_EncryptInit(3):schwarze4-74/+322
both resulting pages are still long. Mention a number of missing functions. Add some text from the OpenSSL 1.1.1 EVP_aes.pod manual page, which is still under a free license. Add missing HISTORY information. Triggered by tb@ providing EVP_aes_{128,192,256}_wrap(3) in evp.h rev. 1.74.
2019-03-18In ssl.h rev. 1.165, tb@ provided version agnostic DTLS methods.schwarze1-3/+26
Document them.
2019-03-18Document SM4; related to evp.h rev. 1.73.schwarze4-6/+93
2019-03-18Expand the ERR_PACK() macro to ERR_REASON() for consistency.tb1-2/+2
No binary change.
2019-03-18In evp.h rev. 1.75, tb@ provided EVP_PKEY_get0_hmac(3).schwarze1-3/+29
Document it. Even though OpenSSL muddles the waters by lumping the description together with the other EVP_PKEY_get0_*() functions, describe it separately because a char * has no reference count and because the function fills in an additional length parameter.
2019-03-17Add regress tests for the EVP_aes_*_wrap() API. Based on the tests intb2-4/+19
OpenSSL 1.0.2r which is still freely licenced with a tweak by jsing.
2019-03-17bump minors after symbol additiontb3-3/+3
2019-03-17Provide EVP_PKEY_get0_hmac(). From OpenSSL 1.1.1 which is stilltb4-3/+23
freely licensed. From jsing
2019-03-17Provide EVP_aes_{128,192,256}_wrap(). This is a compatibletb6-6/+174
implementation based on the one in OpenSSL 1.0.2r which is still freely licensed. The functions are undocumented in OpenSSL. To use them, one needs to set the undocumented EVP_CIPHER_CTX_FLAG_WRAP_ALLOW flag on the EVP_CIPHER_CTX. resolves #505 ok jsing
2019-03-17link sm4 regress to the buildtb1-1/+2
2019-03-17Add a regress test for the SM4 block cipher from the Chinese standardtb2-0/+117
GB/T 32907-2016. Patch from Daniel Wyatt ok inoguchi, jsing
2019-03-17Add the SM4 block cipher from the Chinese standard GB/T 32907-2016.tb1-1/+8
Patch from Daniel Wyatt ok inoguchi, jsing
2019-03-17Add the SM4 block cipher from the Chinese standard GB/T 32907-2016.tb8-3/+479
This is an ISC licensed version based on the sources by Ribose Inc that were ported to OpenSSL in 2017. Patch from Daniel Wyatt with minor tweaks. ok inoguchi, jsing
2019-03-17Provide version agnostic DTLS methods.jsing3-2/+27
ok tb@
2019-03-17Correct return value handling in tls13_handshake_recv_action().jsing1-2/+4
The recv action handler returns success/failure, rather than a TLS13_IO_* value, which is what tls13_handshake_recv_action() needs to return. Failure previously mapped to TLS13_IO_EOF, which is not ideal. ok tb@
2019-03-17Partially clean up the TLS1_get_{,client}_version macros.jsing4-15/+14
LibreSSL only supports TLSv1.0 and above, hence the checks the macros are performing are useless. Simplify them to their effective code. Also place both under #ifndef LIBRESSL_INTERNAL and use the variables directly in our code, which improves readability. ok tb@
2019-03-17Remove the alert level from the TLSv1.3 alert callback.jsing3-7/+6
In TLSv1.3 the alert level is effectively meaningless and the record layer has already checked that it is appropriate. As such, drop it from the alert callback. ok tb@
2019-03-15Document the return values of X509_delete_ext(3) and X509_add_ext(3).schwarze1-11/+15
From Viktor Dukhovni via OpenSSL commit 0df65d82 Jun 12 11:51:53 2018 -0400 which is still under a free license because it is before the 1.1.1 branch point. While here, add several missing const qualifiers.
2019-03-15OpenSSL documents the macro OPENSSL_VERSION_TEXT since Sep 24, 2018;schwarze1-4/+7
so mention it here, too.
2019-03-15Document OCSP_basic_verify(3).schwarze1-5/+75
From David dot von dot Oheimb at siemens dot com via OpenSSL commit b8c32081 Feb 10 15:45:11 2018 +0100, which is still under a free license because it is before the 1.1.1 branch point.
2019-03-13Fix a number of ASN1_INTEGER vs ASN1_STRING mixups coming from thetb5-13/+11
mechanical M_ASN1 macro expansion. The ASN1_INTEGER_cmp function takes signs into account while ASN1_STRING_cmp doesn't. The mixups mostly involve serialNumbers, which, in principle, should be positive. However, it is unclear whether that is checked or enforced anywhere in the code, so these are probably bugs. Patch from Holger Mikolon ok jsing
2019-03-13add a comment to format-pem.pl documenting typical steps to updatesthen1-1/+9
cert.pem from Mozilla NSS.
2019-03-13Backport support for probing ARMv8 HW acceleration capabilities on armv7patrick3-32/+121
in preparation for adding support for the probing code for arm64. ok bcook@
2019-03-10fix some cases of spaces before full stops, where none were neccessary;jmc1-3/+3
2019-03-10rename CRYPTO_set_locking_callback.3 to CRYPTO_lock.3schwarze2-4/+4
because CRYPTO_set_locking_callback() is now a no-op and was never documented in the first place; no text change; requested by jmc@ long ago
2019-03-10delete functions from the manual page that do nothing in LibreSSLschwarze3-318/+87
and that don't do anything in OpenSSL either; no significant amount of text remains from OpenSSL, so change the Copyright information and license of CRYPTO_set_locking_callback.3; OK inoguchi@ jmc@
2019-03-06Typo in comment.tb1-2/+2
From Holger Mikolon
2019-03-04Don't index a void pointer, fixes compilation with visual studio.millert1-2/+3
Gcc/clang will treat void * as char * but this is non-standard. OK deraadt@ jsing@ inoguchi@
2019-03-02Fix OID for sm3WithRSAEncryption which was apparently mixed uptb1-1/+1
with the OID for SM2 signing with SM3. From Daniel Wyatt
2019-02-28Implement non-SSL_MODE_ENABLE_PARTIAL_WRITE in tls13_legacy_write_bytes().jsing1-3/+34
In non-SSL_MODE_ENABLE_PARTIAL_WRITE mode we have to write out all the things and only return success once all of the data has been sent. ok inoguchi@ tb@
2019-02-28Automatically complete the handshake from tls13_legacy_{read,write}_bytes()jsing3-3/+17
If the TLS handshake has not been completed, automatically complete the handshake as part of the read/write call, implementing the current SSL_read()/SSL_write() behaviour. Once the TLS handshake is completed we push a WANT_POLLIN or WANT_POLLOUT back up to the caller, since some applications appear to incorrectly call SSL_read() or SSL_write(), rather than repeating the previous call. This can lead to attempts to read data that does not exist, since the WANT_POLLIN was actually triggered as part of the handshake. ok inoguchi@ tb@
2019-02-28Set the SSL state as part of tls13_legacy_connect().jsing1-2/+5
Set the SSL state to SSL_ST_CONNECT during the TLSv1.3 handshake and to SSL_ST_OK once the handshake completes, since some applications currently rely on this information to function correctly. ok inoguchi@ tb@
2019-02-28Add appropriate length checks to tls13_legacy_{read,write}_bytes()jsing1-3/+9
ok inoguchi@ tb@
2019-02-28Remove unused record_type from TLSv1.3 handshake actions.jsing1-16/+1
ok tb@