summaryrefslogtreecommitdiff
path: root/src/lib/libc/string/wcscpy.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2014-12-28Teach option parsing that a single hyphen denotes the end of named optionsjsing1-2/+14
(as currently only implemented by some of the openssl(1) applications).
2014-12-28Add regress tests for option parsing with multiple unnamed arguments.jsing1-3/+45
2014-12-28Provide a mechanism for option parsing to return the number of argumentsjsing7-14/+22
that it has consumed. This allows for the handling of multiple unnamed arguments, including lists of filenames.
2014-12-28Update regress to match change in unnamed argument handling.jsing1-6/+5
2014-12-28Only accept a single unnamed argument - the existing behaviour is tojsing1-1/+12
silently accept multiple unnamed arguments, ignoring all except the last. This behaviour was already inconsistent between openssl(1) applications; apply the principal of least surprise. This will also simplify the addition of upcoming functionality.
2014-12-28Slightly simplify options parsing logic.jsing1-65/+58
2014-12-28Update options regress to match option function pointer change.jsing1-4/+4
2014-12-28Provide two different function pointers for option function callbacks. Thisjsing4-13/+14
allows for simpler code in the common cases and will allow for further extension to support the complex cases.
2014-12-28Provide initial regress tests for the complex option parsing that is neededjsing3-1/+239
for openssl(1), which is also variable in behaviour between applications (and currently inconsistent).
2014-12-27include netinet/in.h to define struct in6_addr.bcook1-1/+2
Noticed while testing libtls on FreeBSD.
2014-12-24simplify crypt_checkpass. The API promise is that this function doesn'ttedu1-11/+5
use global data. The simplest fix is to only check blowfish passwords, and implicitly lock out DES passwords. crypt_checkpass is currently only used in one place, passwd, to verify the local user's password, so this is probably acceptable. Gives people a little more time to migrate away from DES before introduing checkpass into more places.
2014-12-24Clean up CIPHERS and related sections:lteo1-154/+10
- Sync cipher strings with the ones that are actually implemented. - Remove CIPHERS SUITE NAMES (the actual cipher suites can be obtained via "openssl ciphers -v"), CIPHERS NOTES, and CIPHERS HISTORY sections. - Stop mentioning export cipher suites since they have already been removed. feedback from deraadt@ and jmc@ ok jmc@
2014-12-19CA.sh and CA.pl are gonelteo1-6/+1
2014-12-19Sync message digest algorithms with the ones actually implemented inlteo1-9/+29
"openssl dgst". feedback/ok jmc@
2014-12-17Add size_t to int checks for SSL functions.doug3-8/+39
libtls accepts size_t for lengths but libssl accepts int. This verifies that the input does not exceed INT_MAX. It also avoids truncating size_t when comparing with int and adds printf-style attributes for tls_set_error(). with input from deraadt@ and tedu@ ok tedu@
2014-12-16typo; ok deraadtsthen2-3/+3
2014-12-16warn for correct symbolderaadt1-2/+2
2014-12-16Now that we have Camellia support in libcrypto, bring in the SHA256 flavour ofmiod4-4/+328
the Camellia ciphersuites for TLS 1.2 introduced in RFC 5932. From OpenSSL HEAD.
2014-12-15Move 40MB of .rodata and 40MB of stack to .bss; allows this test to run onmiod1-3/+7
platforms with small MAXTSIZ or MAXSSIZ.
2014-12-15Add error handling for EVP_DigestInit_ex().doug15-56/+98
A few EVP_DigestInit_ex() calls were left alone since reporting an error would change the public API. Changed internal ssl3_cbc_digest_record() to return a value due to the above change. It will also now set md_out_size=0 on failure. This is based on part of BoringSSL's commit to fix malloc crashes: https://boringssl.googlesource.com/boringssl/+/69a01608f33ab6fe2c3485d94aef1fe9eacf5364 ok miod@
2014-12-14unconditionally align SSL payloadsbcook6-78/+36
Remove support for conditional payload alignment, since we would never want to turn it off. Also, consistently use size_t for calculating the alignment. ok miod@
2014-12-14Convert all of the straight forward client handshake handling code to usejsing6-212/+134
the new handshake functions. ok miod@
2014-12-14Provide functions for starting, finishing and writing SSL handshakejsing6-8/+120
messages. This will allow for removal of repeated/duplicated code. Additionally, DTLS was written by wholesale copying of the SSL/TLS code, with some DTLS specifics being added to the duplicated code. Since these SSL handshake message functions know how to handle both SSL/TLS and DTLS, upon conversion the duplicate versions will become identical (or close to), at which point the DTLS versions can be removed and the SSL/TLS versions used for both protocols. Partially based on similar changes in OpenSSL. ok miod@
2014-12-14Remove trailing whitespace.jsing59-559/+559
2014-12-14unifdef OPENSSL_NO_NEXTPROTONEGjsing1-12/+0
2014-12-14Remove redundant NULL checks before free - BN_free(), BIO_free_all() andjsing1-17/+12
EC_GROUP_free() all have implicit NULL checks.
2014-12-14unifdef OPENSSL_NO_NEXTPROTONEGjsing4-41/+4
2014-12-14unifdef OPENSSL_NO_NEXTPROTONEG, which is one of the last standing #ifndefjsing12-130/+12
mazes in libssl. NPN is being replaced by ALPN, however it is still going to be around for a while yet. ok miod@
2014-12-14unifdef NETSCAPE_HANG_BUG from the DTLS code. The code is not currentlyjsing2-46/+2
enabled and I would hope that no one is using client certificates with DTLS and Netscape, assuming it even supported it... ok bcook@ miod@
2014-12-12catch up with swab.c rev. 1.9:schwarze1-5/+23
update SYNOPSIS and DESCRIPTION and add STANDARDS
2014-12-12Increase cipher suite test coverage by including all cipher suites thatjsing1-5/+5
use RSA authentication, rather than only those that use RSA key exchange.
2014-12-11update swab() to match the current posix definition. "rationale: none."tedu1-50/+24
rewrite the function to be simpler as well. the compiler can unroll the loop for us if necessary. ok schwarze
2014-12-10ssl3_init_finished_mac() calls BIO_new() which can fail since it in turnjsing17-42/+115
calls malloc(). Instead of silently continuing on failure, check the return value of BIO_new() and propagate failure back to the caller for appropriate handling. ok bcook@
2014-12-10Remove support for GOST R 34.10-94 signature authentication, along withjsing18-154/+30
the two ciphersuites that use it. GOST94 public/private keys have been long obsoleted and libcrypto does not have support for them anyway. Discussed with Dmitry Eremin-Solenikov.
2014-12-10Add ALPN support to openssl(1).jsing2-11/+95
Based on OpenSSL.
2014-12-10Add regress for ALPN.jsing2-1/+180
Based on OpenSSL.
2014-12-10libssl major++jsing2-2/+2
2014-12-10Add support for ALPN.jsing10-16/+594
Based on OpenSSL and BoringSSL. ok bcook@
2014-12-10add stdint.h to ssl.h.bcook2-2/+6
ok jsing@
2014-12-10fix previous.daniel1-2/+4
2014-12-09Xr and Ox fixes;jmc3-12/+18
2014-12-09random seed buffer must be unsignedderaadt1-2/+2
2014-12-09no more string(3);jmc1-3/+2
2014-12-09fix NAME;jmc1-3/+3
2014-12-09improve warnings from rand_r(), rand(), and random()deraadt2-3/+8
It may take a few iterations to get the tone right. previously discussed with millert
2014-12-09In ingo's new world order, we do not want multiple manual pages describingderaadt3-247/+3
the same thingies. Therefore these "lists of functions" man pages can go away. Hurray! I've wanted these pages to die for around 10 years! ok ingo (and i think jmc)
2014-12-09t_exhaust is too exhaustingderaadt1-3/+3
2014-12-09more standardsier: cast to int to make sure we keep the negative numbers.tedu1-2/+2
observed by jonas termansen
2014-12-08Oops, got the sense of the test backwards. Hilarious that we didn't spot it.deraadt1-1/+1
2014-12-08Change rand(), random(), drand48(), lrand48(), mrand48(), and srand48()deraadt13-159/+267
to returning strong random by default, source from arc4random(3). Parameters to the seeding functions are ignored, and the subsystems remain in strong random mode. If you wish the standardized deterministic mode, call srand_deterministic(), srandom_determistic(), srand48_deterministic(), seed48_deterministic() or lcong48_deterministic() instead. The re-entrant functions rand_r(), erand48(), nrand48(), jrand48() are unaffected by this change and remain in deterministic mode (for now). Verified as a good roadmap forward by auditing 8800 pieces of software. Roughly 60 pieces of software will need adaptation to request the deterministic mode. Violates POSIX and C89, which violate best practice in this century. ok guenther tedu millert