summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/malloc-wrapper.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2018-04-29Correct direction of SSL_ERROR_ZERO_RETURN caseguenther1-3/+3
ok schwarze@
2018-04-28reference hosts(5) instead of networks(5)schwarze1-3/+3
2018-04-28Remove references to the obsolete getnetent(3) and networks(5).schwarze2-10/+7
2018-04-28Stop talking about /etc/networks, which is no longer used,schwarze1-39/+38
and reference gethostby*(3) and /etc/hosts instead. Say that setnetent(3), getnetent(3), and endnetent(3) now do nothing. With feedback from guenther and significant help from deraadt@.
2018-04-28Say that sethostent(3), gethostent(3), and endhostent(3) do nothing.schwarze1-50/+19
While here, stop implying plans to support additional address families in the future, and do not call gethostbyname2(3) "advanced". OK deraadt@ guenther@
2018-04-28To allow us to get rid of /etc/networks, make setnetent(3),schwarze1-75/+4
getnetent(3), and endnetent(3) do nothing, just like sethostent(3), gethostent(3), and endhostent(3) years ago. OK deraadt@ guenther@
2018-04-28Fix a small timing side channel in dsa_sign_setup(). Simple adaptationtb1-12/+25
of OpenSSL commit c0caa945f6ef30363e0d01d75155f20248403df4 to our version of this function. ok beck, jsing Original commit message: commit c0caa945f6ef30363e0d01d75155f20248403df4 Author: Pauli <paul.dale@oracle.com> Date: Wed Nov 1 06:58:13 2017 +1000 Address a timing side channel whereby it is possible to determine some information about the length of the scalar used in DSA operations from a large number (2^32) of signatures. This doesn't rate as a CVE because: * For the non-constant time code, there are easier ways to extract more information. * For the constant time code, it requires a significant number of signatures to leak a small amount of information. Thanks to Neals Fournaise, Eliane Jaulmes and Jean-Rene Reinhard for reporting this issue. Reviewed-by: Andy Polyakov <appro@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/4576)]
2018-04-28Fix a small timing side channel in ecdsa_sign_setup(). Up to whitespacetb1-8/+25
this is OpennSSL commit 4a089bbdf11f9e231cc68f42bba934c954d81a49. ok beck, jsing Original commit message: commit 4a089bbdf11f9e231cc68f42bba934c954d81a49 Author: Pauli <paul.dale@oracle.com> Date: Wed Nov 1 06:58:39 2017 +1000 Address a timing side channel whereby it is possible to determine some information about the length of the scalar used in ECDSA operations from a large number (2^32) of signatures. This doesn't rate as a CVE because: * For the non-constant time code, there are easier ways to extract more information. * For the constant time code, it requires a significant number of signatures to leak a small amount of information. Thanks to Neals Fournaise, Eliane Jaulmes and Jean-Rene Reinhard for reporting this issue. Reviewed-by: Andy Polyakov <appro@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/4576)]
2018-04-27trailing whitespace, and move arg checking before pledgebeck1-17/+17
in preparation for pledgepath ok deraadt@
2018-04-25Put function name on a separate line and zap stray whitespace.tb1-3/+4
2018-04-25In asn1.h rev. 1.46 2018/04/25 11:48:21, tb@ added const qualifiersschwarze7-30/+30
to some parameters of some functions. Update the documentation. Add a few additional missing const qualifiers while here.
2018-04-25Avoid talking about the innternal, undocumented data type "struct lhash_st",schwarze1-3/+3
show the public data type name "LHASH_OF(SSL_SESSION)" instead.
2018-04-25Document the callbacks as taking "SSL *" and "SSL_CTX *" argumentsschwarze1-7/+7
and avoid the internal, undocumented names "struct ssl_st *" and "struct ssl_ctx_st *".
2018-04-25In ssl.h rev. 1.156 2018/04/25 07:10:39, tb@ added const qualifiersschwarze5-16/+16
to some parameters and return values of some functions. Update the documentation.
2018-04-25remove whitespace before closing parenstb1-5/+5
2018-04-25Add const to functions in asn1/asn1.h as they did in OpenSSL.tb19-92/+96
BIO_f_asn1() will be taken care of later. Tested in a bulk by sthen ok bcook jca jsing
2018-04-25Fix capitalization of data. Pointed out by jsing and forgotten intb1-2/+2
previous commit.
2018-04-25The cookie in the cookie verify callback needs to be const.tb2-4/+5
ok jsing (as part of a larger diff)
2018-04-25OpenSSL started adding const to functions all over the place. Make alltb7-38/+30
our libssl functions match theirs wrt const, except for BIO_f_ssl(3) which will be fixed in a later step. this went through a i386 bulk by sthen ok jsing
2018-04-23Make the NULL check a separate if statement for readability andtb1-2/+4
grepability. Req. by jsing
2018-04-23Make whitespace between functions and structs a bit more consistent.tb1-3/+7
2018-04-23Test X509_CRL_METHOD_free(NULL)tb1-1/+2
2018-04-23Make X509_CRL_METHOD_free() NULL-safe.tb1-2/+2
ok bcook
2018-04-23About half of the listed functions are wrappers of ASN1_item_free().tb1-113/+113
Annotate them.
2018-04-23Add a big pile of *_free() functions which I audited to be NULL-safe.tb1-2/+109
2018-04-19Document the "f" callback argument that tb@ asked about.schwarze1-2/+16
While here, include a patch from tb@ adding the missing return type to ENGINE_ctrl() in the SYNOPSIS.
2018-04-18tweak previous;jmc1-2/+3
2018-04-18SEE ALSO and HISTORYschwarze12-26/+301
2018-04-18delete engine(3); nothing of value left in that pageschwarze2-537/+1
2018-04-18link to ENGINE_register_RSA(3) rather than engine(3)schwarze1-8/+7
2018-04-18* Document DH_up_ref(3), DSA_up_ref(3), and RSA_up_ref(3).schwarze3-16/+73
* Correct documentation of DH_new(3), DH_free(3), DSA_new(3), DSA_free(3), RSA_new(3), and RSA_free(3) with respect to reference counting. * Stop referencing engine(3).
2018-04-18* Make the description of method selection simpler, more precise,schwarze2-128/+67
and more concise. * Correct the description of the return values of DH_set_method(3) and DSA_set_method(3). * Stop referencing engine(3).
2018-04-18* Do not document the non-existent function RSA_null_method(3).schwarze1-105/+43
* Add three missing const qualifiers to function prototypes. * Correct the argument type of RSA_new_method(3). * Remove duplicate decsription of RSA_flags(3) and RSA_new_method(3). * Make the description of method selection simpler, more precise, and more concise. * Correct description of the return value of RSA_set_method(3). * Stop referencing engine(3).
2018-04-15add a few new sentences regarding the big pictureschwarze2-2/+15
2018-04-15Rewrite the ENGINE_*(3) documentation from scratch - step 2,schwarze8-395/+633
covering the remaining functions that were documented in engine(3), except for seven functions that are completely pointless and that were merely listed but not really documented.
2018-04-15Rewrite the ENGINE_*(3) documentation from scratch (step 1,schwarze10-530/+1303
covering 60% of the documented functions). The old, abominable engine(3) manual page shall die soon.
2018-04-14In eng_lib.c rev. 1.14 2018/04/14 07:18:37, tb@ allowed ENGINE_free(3)schwarze1-53/+46
to accept a NULL argument. Document that. While here, make the related sentences more precise and less verbose. Tweaks and OK tb@.
2018-04-14Make ENGINE_free() succeed on NULL. Matches OpenSSL's behavior andtb8-41/+41
simplifies the caller side. tested by & ok inoguchi; discussed with schwarze
2018-04-14make ENGINE_finish() succeed on NULL and simplify callers as intb13-100/+58
OpenSSL commit 7c96dbcdab9 by Rich Salz. This cleans up the caller side quite a bit and reduces the number of lines enclosed in #ifndef OPENSSL_NO_ENGINE. codesearch.debian.net shows that almost nothing checks the return value of ENGINE_finish(). While there, replace a few nearby 'if (!ptr)' with 'if (ptr == NULL)'. ok jsing, tested by & ok inoguchi
2018-04-11In ssl.h rev. 1.155 2018/04/11 17:47:36, jsing@ changedschwarze1-13/+3
SSL_OP_TLS_ROLLBACK_BUG to no longer have any effect. Update the manual page.
2018-04-11Nuke SSL_OP_TLS_ROLLBACK_BUG - this is a workaround for buggy clients fromjsing2-36/+17
around the SSLv3/TLSv1.0 period... and buggy clients are buggy. This also helps to clean up the RSA key exchange code. ok "kill it with fire" beck@ tb@
2018-04-10Delete the description of the argument of the "ciphers" commandschwarze1-145/+13
because it was (1) woefully incomplete, (2) partially outdated and wrong, (3) in parts imprecisely worded and hard to understand, (4) excessively technical for a section 1 manual, (5) of excessive size for this particular page, (6) and didn't belong here in the first place because it essentially tried to document a C API - SSL_CTX_set_cipher_list(3), which is now documented, so point to it.
2018-04-10Write documentation for the control string parameter from scratch,schwarze1-30/+273
collecting the information by inspecting the source code.
2018-04-10tweak usage()tb1-1/+1
2018-04-08Fail early if an X509_VERIFY_PARAM is poisoned - don't allowbeck1-8/+10
this to be "overridden" by the user supplied callback. ok jsing@
2018-04-08sort the list of data structures and add the missing ECDH and ECDSA;schwarze1-57/+13
triggered by OpenSSL commit a73d990e Feb 27 19:02:24 2018 +0100, but with different content
2018-04-07tweak previous;jmc1-4/+4
2018-04-07Correct man page for OpenSSL_no_config() to indicate that itbeck1-4/+8
suppresses any future config file loading. ok schwarze@ with a nit from jsing@
2018-04-07Remove function pointers for ssl_{read,write,peek}.jsing8-59/+11
Now that everything goes through the same code path, we can remove a layer of indirection and just call ssl3_{read,write,peek} directly. ok beck@ inoguchi@
2018-04-07Nuke SSL3_FLAGS_DELAY_CLIENT_FINISHED and SSL3_FLAGS_POP_BUFFER.jsing4-70/+8
These flags enabled experimental behaviour in the write path, which nothing uses. Removing this code greatly simplifies ssl3_write(). ok beck@ inoguchi@ sthen@ tb@