summaryrefslogtreecommitdiff
path: root/src/lib/libc/string/wcscasecmp.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2024-03-20md -> mod for CONF_MODULEstb1-12/+12
A CONF_MODULE is no EVP_MD, so call it mod instead of md.
2024-03-20Change return type of module_add()tb1-17/+21
There is one caller of this function which returns module_add() != NULL. Make the function return an int instead. suggested by and ok jsing
2024-03-20Implement imodule_free() and call it from module_finish()tb1-4/+15
ok jsing
2024-03-20Make module_free() NULL safetb1-1/+4
ok jsing
2024-03-20Use the new certificates/chains in regress.jsing9-32/+33
The new certificates are more representative of the real world. The old certificates use weak algorithms and expire in the very near future. Most of our regress has already been switched over, this changes the remainder. Thanks to Bernhard M. Wiedemann for reminding us of the upcoming expiry. ok tb@
2024-03-19Move the OPENSSL_init() stub from o_init.c to crypto_init.ctb3-13/+7
2024-03-19Remove OPENSSL/CRYPTO_realloc documentationtb1-21/+4
2024-03-19Remove X509_ALGOR_set_md() documentationtb3-37/+8
As far as LibreSSL is concerned, this terrible API is pushing up the daisies.
2024-03-17Annotate RSA-PSS SHA parameter encoding as wrongtb1-1/+9
A historic blunderfest in the ASN.1 module for RSA-PSS led to very confusing text in various RFCs. davidben and my current reading of this is that parameters for SHA-* should be encoded as an ASN.1 NULL rather than omitted. The use of X509_ALGOR_set_evp_md() leads to them being omitted, and is therefore counter to the specification (but allowed. We should fix this. For now, leave a reminder. See https://boringssl-review.googlesource.com/c/boringssl/+/67088 for a lot more details. ok davidben
2024-03-16Remove ugly parens and thereby fix KNFtb1-9/+9
2024-03-16Fix signed integer overflow in bnrand()tb1-1/+6
If more bits than INT_MAX - 7 are requested, the calculation of number of bytes required to store the bignum triggers undefined behavior due to signed integer overflow. This will typically result in bytes becoming negative which will then make malloc() fail. If the ulimit should be high enough to make malloc() succeed, there is a bad out of bounds write in case bottom is set (an odd number was requested). On jsing's request this does not deal with another bug which we could catch with a similar check due to BN_bn2bin() failing later on as the number of words in a BIGNUM is some fraction of INT_MAX. ok jsing
2024-03-14Add missing Nm entries for OBJ_NAME_do_all*tb1-3/+5
2024-03-14Mark up X509_STORE_get1_objects()tb1-3/+3
2024-03-14Add back a .Pptb1-2/+3
2024-03-06Clarify ownership in X509_STORE_add_lookup()tb1-3/+4
Whether an X509_LOOKUP with given method already exists or not, this API returns an internal pointer that must not be freed.
2024-03-06POSIX defines inet_ntoa, not inet_aton.bentley1-3/+3
ok deraadt@ jmc@
2024-03-06Remove CRL method API documentationtb7-243/+11
2024-03-05lh_<type>_error() is no longer implemented as a macrotb1-4/+2
2024-03-05Ugly workaround to let this compile again on non-clang platforms.miod1-1/+9
2024-03-05Remove GOST documentationtb7-42/+17
2024-03-05Remove ASN1_time_parse documentationtb6-157/+9
2024-03-05Remove EVP_MD_meth* documentationtb8-378/+70
Move the description of the EVP_MD_FLAGs to EVP_MD_nid() and add a reference to the CMS specification.
2024-03-04Remove EVP_add_{cipher,digest}* docstb4-198/+5
2024-03-04lh_new.3: zap a trailing commatb1-3/+3
2024-03-04EVP_CIPH_CUSTOM_KEY_LENGTH and EVP_CTRL_SET_KEY_LENGTH are gonetb1-14/+2
2024-03-04Remove docs for sk_find_ex()tb1-47/+3
2024-03-04Remove documentation of some CRYPTO_THREADID APItb1-58/+2
CRYPTO_THREADID_{cpm,cpy,current,hash}() are no longer public, so remove their documentation.
2024-03-04Document X509_STORE_get1_objects and deprecate the get0 versiontb1-4/+38
This manual is ordered a bit strangely in that some functions are only documented in RETURN VALUES.
2024-03-03Reinstate a test that was accidentally removed in previoustb1-1/+7
2024-03-02include <time.h> for time_t and struct tm, needed for macostb1-1/+2
ok millert miod
2024-03-02Remove some GOST relicstb4-210/+2
2024-03-02Unhook some gost teststb1-121/+1
2024-03-02Crank libressl version to 3.9.0 (finally!)tb1-3/+3
2024-03-02crank libtls majortb1-1/+1
same bump as libcrypto and libssl
2024-03-02crank libssl majortb1-1/+1
same bump as libcrypto; symbol removal and addition
2024-03-02Remove SSL_debugtb4-13/+3
The garbage truck is quite full by now. Collect the last symbol straggler for this bump. ok jsing
2024-03-02Garbage collect TLS1_FLAGS_SKIP_CERT_VERIFYtb1-2/+1
And here goes another weird-ass thing of dubious pedigree. ok jsing
2024-03-02Make {SSL3,TLS}_CT_* internaltb3-28/+8
And here goes a bunch of unused macros that just had to be in two headers so they could get out of sync. Three of these constants are used in a single function... ok jsing
2024-03-02Remove SSL_CIPHER_get_by_{id,value}()tb4-23/+3
While this undocumented API would have been much nicer and saner than SSL_CIPHER_find(), nothing used this except for the exporter test. Let's get rid of it again. libssl uses ssl3_get_cipher_by_{id,value}() directly. ok jsing
2024-03-02Export SSL_get_{peer_,}signature_type_nid()tb5-8/+13
Also move the prototypes to the correct header. Oversight reported by Frank Lichtenheld, thanks! Fixes https://github.com/libressl/openbsd/issues/147 ok jsing
2024-03-02crank libcrypto majortb1-1/+1
There were symbol addition, removal, function signature changes and struct visibility changes.
2024-03-02Change sk in CRYPTO_EX_DATA from STACK_OF(void) * to void *tb1-2/+2
Requested by jsing
2024-03-02tedu OPENSSL_isservice() prototypetb1-3/+1
When tedu tedued OPENSSL_isservice(), tedus chainsaw missed crypto.h. Finish the teduing of the hack for Visual C++ 5.0 (!), which is still present in the latest and greatest OpenSSL. ok jsing
2024-03-02Make CRYPTO_THREADID opaquetb8-25/+149
With ERR_STATE out of the way, we can make CRYPTO_THREADID opaque. The type is still accessed by used public API, but some of the public API can also go away. ok jsing
2024-03-02Fix CRYPTO_malloc/free signaturestb2-10/+8
Importantly, the size in malloc is now a size_t instead of an int. The API now also takes a file and line to match upstream's signature. ok jsing
2024-03-02Remove CRYPTO_*infotb5-43/+3
Long time neutered, only used (pointlessly without error checking) in the error code until very recently. ok jsing
2024-03-02Remove a bunch of CRYPTO memory APItb6-354/+4
This was neutered early on in the fork and has been rotting ever since. Some parts of the API are still used, but it's easier to clean up when most of the mess is gone. ok jsing
2024-03-02Update list of OPENSSL_NO_*tb1-5/+25
This syncs the list with some version of upstream and exposes a few OPENSSL_NO_* that may now be relevant. from jsing (a long time ago)
2024-03-02Remove a few no longer used sk_FOO_* stanzastb1-85/+1
ok jsing
2024-03-02Remove sk_find_ex()tb8-97/+5
This API intends to find the closest match to the needle. M2Crypto exposes it because it can. This will be fixed by patching the port. ok jsing