summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/stack/stack.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2018-02-08Update regress to use tlsext_serverhello_parse().jsing1-5/+3
2018-02-08Complete the TLS extension rewrite on the client-side.jsing4-156/+93
The RI logic gets pulled up into ssl3_get_server_hello() and ssl_parse_serverhello_tlsext() gets replaced by tlsext_client_parse(), which allows a CBS to be passed all the way down. This also deduplicates the tlsext_client_build() and tlsext_server_build() code. ok beck@
2018-02-08Convert option handling for openssl(1) genpkey.jsing1-110/+177
ok beck@ inoguchi@
2018-02-08Update regress to match change to tls_keypair_pubkey_hash().jsing1-3/+4
2018-02-08Have tls_keypair_pubkey_hash() call tls_keypair_load_cert() instead ofjsing3-14/+11
rolling its own certificate loading. This also means we get better error reporting on failure.
2018-02-08Add a regress test that covers libtls keypairs.jsing3-1/+248
2018-02-08Tweak compiler flags to include -DLIBRESSL_INTERNAL and make more warningsjsing1-2/+2
fatal.
2018-02-08Ensure that tls_keypair_clear() clears the OCSP staple and pubkey hash.jsing1-6/+5
2018-02-08Do not bother NULLing pointers in a struct that is about to be freed.jsing1-10/+1
2018-02-08Move tls_keypair_pubkey_hash() to the keypair file.jsing3-43/+43
2018-02-08Avoid a memory leak that results when the same tls_config is reused.jsing1-1/+4
Reported by and fix from Nate Bessette <openbsd at nate dot sh> - thanks.
2018-02-08Assert tedu's copyright since some of the code moved here is his.jsing1-1/+2
2018-02-08Split keypair handling out into its own file - it had already appearedjsing6-166/+215
in multiple locations. ok beck@
2018-02-07use consistent style for for loop in unmap(), no functional changeotto1-4/+2
2018-02-07Restore a check before BN_free() that needs to exist and write it such thatjsing1-2/+3
the intent is more obvious.
2018-02-07Nuke some more free NULL guards.jsing1-9/+5
2018-02-07Indent labels with a single space so that diff prototypes are more useful.jsing45-190/+190
2018-02-07Add more free functions for NULL checks.jsing1-16/+67
2018-02-07Remove guards around *_free() calls since these functions handle NULL.jsing18-114/+67
2018-02-07Remove guards around *_free() calls since these functions handle NULL.jsing1-27/+15
2018-02-07Add more functions (based on those used in OpenSSH) to the free NULL test.jsing1-1/+19
2018-02-07Restore the old behavior when a port number without a host name isbluhm1-10/+12
passed to BIO_get_accept_socket(). This is part of the API and it fixes "openssl ocsp -port 12345" in server mode. from markus@; OK jsing@ beck@
2018-02-06Do not call freeaddrinfo() with a NULL parameter.bluhm1-2/+3
OK jsing@
2018-02-06Remove manual shutdown and close of the socket since in this casetb1-7/+1
SSL_free will do this a second time. ok jsing
2018-02-06Respect the OPENSSL make variable everywhere so thattb7-20/+22
make OPENSSL=/usr/src/usr.bin/openssl/obj/openssl actually does the expected thing instead of running a mixture of both the openssl below /usr/obj and the one below /usr/bin. Found the hard way via backtraces that made no sense whatsoever. ok jsing
2018-02-05Do not bother NULLing pointers in memory that is freed immediately after.jsing1-3/+1
2018-02-05Be consistent with the goto label names used in libtls code.jsing4-51/+52
No change to generated assembly.
2018-01-30keep in sync with ld.so malloc.cotto1-2/+3
2018-01-30word fix; from edgar pettijohnjmc1-3/+3
2018-01-28typootto1-2/+2
2018-01-28add malloc_threaderrotto1-1/+2
2018-01-28- An error in the multithreaded case could print the wrong function nameotto1-12/+23
- Start with a full page of struct region_info's - Save an mprotect in the init code: allocate 3 pages with none and make the middle page r/w instead of a r/w allocation and two calls to make the guard pages none
2018-01-28Test for correct error when on thread allocates, and another does a double freeotto2-0/+71
2018-01-28Initialize variables to avoid compiler warningsinoguchi3-6/+6
ok jsing@
2018-01-27Update regress to match removal of ssl_parse_clienthello_tlsext().jsing1-5/+8
2018-01-27Complete the TLS extension handling rewrite for the server-side.jsing5-98/+86
This removes ssl_parse_clienthello_tlsext() and allows the CBS to be passed all the way through from ssl3_get_client_hello(). The renegotation check gets pulled up into ssl3_get_client_hello() which is where other such checks exist. The TLS extension parsing now also ensures that we do not get duplicates of any known extensions (the old pre-rewrite code only did this for some extensions). ok inoguchi@
2018-01-27Clarify the comment re the F5 EC curves extension bug.jsing1-5/+6
Also reference the knowledge base article instead of a discussion thread.
2018-01-27Convert ssl3_put_cipher_by_char() to CBB.jsing1-9/+26
While here make the CBS usage in ssl3_get_cipher_by_char() more consistent with other code. ok inoguchi@
2018-01-26- do not junk pages returned by free_bytes(), all freed chunks are alreadyotto1-19/+19
junked - freezero(): only clear requested size
2018-01-24Make the NEON codepaths conditional on __STRICT_ALIGNMENT not beingkettenis3-5/+5
defined as they rely on unaligned access. ok joel@
2018-01-18Zap the rotor, it was a wrong idea. Cluebat applied by kshe whootto1-6/+3
came also up with this diff. Simple, no bias and benchmarks show the extra random calls disappear in te measurement noise.
2018-01-18Move to ffs(3) for bitmask scanning. I played with this earlier,otto1-21/+11
but at that time ffs function calls were generated instead of the compiler inlining the code. Now that ffs is marked protected in libc this is handled better. Thanks to kshe who prompted me to look at this again.
2018-01-18Instead of trying to handle ffs() with the normal rename-mark-hidden-and-aliasguenther2-4/+6
dance, mark it protected. This works better for both gcc and clang: gcc blocks overriding of internal calls, while clang permits inlining again. ok otto@
2018-01-15Add s_server and s_client -tlsextdebug messagesinoguchi1-1/+9
ok sthen@ jsing@
2018-01-12Adjust references for sysctl(3) to sysctl(2)deraadt1-4/+4
2018-01-08optimization and some cleanup; mostly from kshe (except the unmap() part)otto1-67/+51
2018-01-07On OpenBSD/armv7 we deliberately trap unaligned access. Unfortunatelykettenis5-12/+16
the assembly code in libcrypto assumes unaligned access is allowed for ARMv7. Make these paths conditional on __STRICT_ALIGNMENT not being defined and define __STRICT_ALIGNMENT in arm_arch.h for OpenBSD. ok tom@
2018-01-07Remove unused extern variable in openssl(1) s_timeinoguchi1-2/+1
This extern variable appears not to be used. And it is overridden by local variable in doConnection(). This causes MSVC warning C4459 "declaration of 'verify_error' hides global declaration". OK millert@
2018-01-01Only init chunk_info once, plus some moving of code to group related functions.otto1-273/+267
2017-12-28Initialise new_cipher in the serverhello TLS extensions test, to avoid ajsing1-3/+14
NULL pointer dereference in ssl_using_ecc_cipher(). Some compilers avoid triggering this, likely due to the EC formats list also being NULL. While here, setup the EC formats list so that we actually include the EC points format extension in the server hello extensions. Found the hard way by bcook@