summaryrefslogtreecommitdiff
path: root/src/lib/libc/string/wcscasecmp.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2021-09-11merge the description of SSL_get_tlsext_status_type(3)schwarze1-3/+35
from the OpenSSL 1.1.1 branch, which is still under a free license
2021-09-11Merge documentation of EC_GROUP_order_bits(3) from the OpenSSL 1.1.1schwarze1-26/+70
branch, which is still under a free license. While here, also merge a few other improvements, mostly regarding EC_GROUP_get_order(3) and EC_GROUP_get_cofactor(3); in particular, some statements below RETURN VALUES were outright wrong. This patch includes a few minor tweaks and an addition to HISTORY by me. Feedback and OK tb@.
2021-09-11Add BGPSec Router (RFC 8209) Key Purpose OIDjob2-0/+2
OK tb@
2021-09-11Merge documentation for BN_bn2binpad(3), BN_bn2lebinpad(3),schwarze1-13/+77
and BN_lebin2bn(3) from the OpenSSL 1.1.1 branch, which is still under a free license. While here, tweak a number of details for clarity. OK tb@
2021-09-10Calling OpenSSL_add_all_digests() is no longer needed since the librarymillert1-7/+2
automatically initializes itself. OK tb@
2021-09-10crank major for libcrypto as welltb1-2/+2
'may as well' deraadt
2021-09-10major bump (same type of crank as libssl)tb1-1/+1
2021-09-10bump major after symbol addition and struct removal, struct visibilitytb1-1/+1
changes
2021-09-10Update Symbols.list after API additionstb1-0/+18
2021-09-10Bump minor after symbol additiontb1-1/+1
2021-09-10Add BN_bn2{,le}binpad(), BN_lebin2bn(), EC_GROUP_order_bits to Symbols.listtb1-0/+4
ok beck inoguchi jsing
2021-09-10Move SSL_set0_rbio() outside of LIBRESSL_HAS_TLS1_3tb1-3/+1
ok inoguchi jsing
2021-09-10Expose SSL_get_tlext_status_type() in tls1.htb1-3/+1
ok beck jsing
2021-09-10Expose SSL_R_NO_APPLICATION_PROTOCOL in ssl.htb1-3/+1
ok beck jsing
2021-09-10Expose SSL_CTRL_GET_TLSEXT_STATUS_REQ_TYPE in ssl.htb1-3/+1
ok beck jsing
2021-09-10Expose SSL_CTX_get0_privatekey() in ssl.htb1-3/+1
ok beck
2021-09-10Remove TLS1_get_{,client_}version()tb1-9/+1
ok jsing
2021-09-10Remove SSL3_RECORD and SSL3_BUFFERtb1-25/+1
with/ok jsing
2021-09-10Remove TLS1_RT_HEARTBEATtb1-2/+1
ok jsing
2021-09-10Make SSL opaquetb1-2/+4
with/ok jsing
2021-09-10Remove struct tls_session_ticket_ext_st and TLS_SESSION_TICKET_EXTtb2-2/+6
from public visibility. with/ok jsing
2021-09-10Uncomment LIBRESSL_HAS_{TLS1_3,DTLS1_2} in opensslfeatures.htb1-2/+2
2021-09-10Use BN_RAND_* instead of mysterious values in the documentation oftb1-7/+19
BN_rand_range() From OpenSSL 1.1.1l ok beck jsing
2021-09-10Expose EC_GROUP_order_bits() in <openssl/ec.h>tb1-3/+1
ok beck jsing
2021-09-10Expose BN_bn2{,le}binpad() and BN_lebin2bn() in <openssl/bn.h>tb1-3/+1
ok beck inoguchi
2021-09-10Expose BN_RAND_* in <openssl/bn.h>tb1-3/+1
ok beck jsing
2021-09-10Do not ignore SSL_TLSEXT_ERR_FATAL from the ALPN callbacktb4-7/+31
As reported by Jeremy Harris, we inherited a strange behavior from OpenSSL, in that we ignore the SSL_TLSEXT_ERR_FATAL return from the ALPN callback. RFC 7301, 3.2 states: 'In the event that the server supports no protocols that the client advertises, then the server SHALL respond with a fatal "no_application_protocol" alert.' Honor this requirement and succeed only on SSL_TLSEXT_ERR_{OK,NOACK} which is the current behavior of OpenSSL. The documentation change is taken from OpenSSL 1.1.1 as well. As pointed out by jsing, there is more to be fixed here: - ensure that the same protocol is selected on session resumption - should the callback be called even if no ALPN extension was sent? - ensure for TLSv1.2 and earlier that the SNI has already been processed ok beck jsing
2021-09-10Prepare to provide BN_RAND_* flags for BN_rand_range()tb1-1/+12
ok beck jsing
2021-09-10Prepare to provide SSL_CTX_get0_privatekey()tb2-2/+14
ok beck
2021-09-09Ensure that the kill signal undergoing testing is not ignored.anton1-1/+15
ok bluhm@
2021-09-09When calling the legacy callback, ensure we catch the case where itbeck1-2/+5
has decided to change a succeess to a failure and change the error code. Fixes a regression in the openssl-ruby tests which expect to test this functionality. ok tb@
2021-09-09Rework openssl-ruby-tests to run all passing tests first, thentb1-4/+12
run the one failing test as a separate regress test. This way, all regressions should be caught with REGRESS_FAIL_EARLY=yes or on bluhm's regress webpage. This needs an up-to-date openssl-ruby-tests package and an upcoming commit by beck in x509_verify.c to work. ok beck bluhm
2021-09-09zap trailing whitespacetb2-14/+14
2021-09-08Prepare to provide EC_GROUP_order_bits()tb11-18/+45
ok jsing
2021-09-08Provide SSL_SESSION_is_resumable and SSL_set_psk_use_session_callback stubstb3-3/+24
ok jsing
2021-09-08Prepare to provide API stubs for PHAtb2-2/+27
ok bcook jsing
2021-09-08Fix leak in cms_RecipientInfo_kekri_decrypt()tb1-1/+2
Free ec->key before reassigning it. From OpenSSL 1.1.1, 58e1e397 ok inoguchi
2021-09-08Prepare to provide SSL_get_tlsext_status_type()tb3-3/+20
Needed for nginx-lua to build with opaque SSL. ok inoguchi jsing
2021-09-08Prepare to provide SSL_set0_rbio()tb2-2/+12
This is needed for telephony/coturn and telephony/resiprocate to compile without opaque SSL. ok inoguchi jsing
2021-09-08Prepare to provide BN_bn2{,le}binpad() and BN_lebin2bn()tb2-9/+137
As found by jsg and patrick, this is needed for newer uboot and will also be used in upcoming elliptic curve work. This is from OpenSSL 1.1.1l with minor style tweaks. ok beck inoguchi
2021-09-08Replace bare ; with continue;job1-7/+7
OK tb@
2021-09-08Fix indentation of comments and labelsjob2-165/+167
OK tb@
2021-09-07Replace (&(x)) pattern with &xjob2-32/+32
No functional changes. OK tb@
2021-09-07KNFjob2-1478/+1548
OK tb@ jsing@ beck@
2021-09-06The default Ruby has switched to 3.0tb1-2/+2
2021-09-05new sentence, new line, and tweak wording of previous;jmc1-2/+3
2021-09-05Remove unused variable tmptm in do_body of openssl(1) cainoguchi1-8/+2
2021-09-05Using serial number instead as subject if it is empty in openssl(1) cainoguchi2-3/+36
This allows multiple entries without a subject even if unique_subject == yes. Referred to OpenSSL commit 5af88441 and arranged for our codebase. ok tb@
2021-09-05Check extensions before setting version to v3inoguchi1-5/+10
Referred to OpenSSL commit 4881d849 and arranged for our codebase. comment and ok from tb@
2021-09-05Use accessor method rather than direct X509 structure accessinoguchi1-20/+10
Referred to OpenSSL commit a8d8e06b and arranged for our codebase. comment and ok from tb@