| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
|
|
| |
Make sure ASN1_primitive_new() will return NULL in *pval in all error
situations.
ok bcook@ doug@
|
| |
|
|
|
|
|
| |
do not forgot to nevertheless keep freeing the other fields.
ok doug@ guenther@
|
|
|
|
|
| |
error stack, not only the first one.
ok guenther@ doug@
|
|
|
|
|
|
|
|
|
| |
OpenSSL stopped building it last year and removed it this year.
Based on OpenSSL commit c436e05bdc7f49985a750df64122c960240b3ae1.
Also cranked major version in libcrypto, libssl and libtls.
"fine with me" bcook@ miod@
|
|
|
|
|
|
| |
This mimics free()'s behavior which makes error handling simpler.
ok bcook@ miod@
|
|
|
|
|
| |
not 16-bit MS-DOS anymore.
ok bcook@ tedu@
|
|
|
|
| |
ok bcook@ doug@
|
|
|
|
|
| |
type.
ok guenther@ doug@
|
|
|
|
| |
ok miod@
|
|
|
|
|
|
| |
Pointed out by guenther.
ok guenther@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Use these instead of SSLv23_*method when you want to make sure TLS is
used.
By default, we disable SSLv3 but it's still possible for the user to
re-enable it. TLS_*method does not allow SSLv3.
Both BoringSSL and (next version of) OpenSSL have these methods.
However, they have changed the implementation significantly. We will
as well, but not right now.
Riding the libssl major bump.
ok miod@ bcook@
|
|
|
|
|
|
| |
Libtls is riding this crank.
ok miod@ bcook@
|
|
|
|
|
| |
fails, check its return value and correctly mop up after ourselves.
ok beck@ doug@
|
|
|
|
| |
ok bcook@ doug@
|
|
|
|
|
|
|
|
|
| |
raw byte sequences. The toolchains have had some time to update and assemble
the instructions correctly (except for p{ins,ext}rd which are not supported
yet by as(1) under OpenBSD, but will be fixed shortly).
Inspired by a discussion between tedu@ and John-Mark Gurney.
Verified to still work on Mac OS X and average Linux distros by bcook@
|
|
|
|
| |
same four bytes, unobfuscated.
|
|
|
|
|
|
|
| |
The current version is not safe with stack variables because it may
return prematurely with a partially constructed object on error.
ok miod@ a while back
|
|
|
|
|
|
|
| |
It's a little convoluted due to gotos, but at that point, pci is always
NULL. Spotted by Coverity 21702.
ok miod@ beck@ bcook@
|
|
|
|
| |
ok doug@
|
|
|
|
|
|
| |
The p initialization was hiding this bug but Coverity 126279 saw it.
ok miod@ bcook@ beck@
|
|
|
|
| |
ok doug@, beck@
|
|
|
|
|
|
|
| |
Changed return value from void to int. It should never return an error
given that the input length is not checked yet.
ok miod@
|
|
|
|
| |
ok doug@
|
|
|
|
| |
ok doug@
|
|
|
|
| |
ok miod@, input + ok jsing@
|
|
|
|
|
|
|
|
| |
The "if" is a bit ugly, but this does remove a lot of repetitive code.
This will be converted to CBS later as well.
ok miod@
jsing@ roughly ok with it after seeing the CBS version
|
|
|
|
| |
ok bcook@ doug@
|
|
|
|
|
|
|
|
|
|
| |
lease worst alternative and do nothing rather than dereference NULL, but having
a function with fundamentally broken API to simply make a list of strings, sort them,
and call a function with each string as an argument is really quite silly....
and of course it was exposed API that the ecosystem uses that we can't delete.. yet.
ok miod@ doug@
|
|
|
|
|
|
| |
This was a hack to work around problems on IE 6 with SSLv3.
ok miod@ bcook@
|
|
|
|
|
| |
memory. Coverity CID 24810, 24846.
ok bcook@ doug@
|
|
|
|
|
|
|
|
| |
This is a 17 year old workaround from SSLeay 0.9.0b. It was for
clients that send RSA client key exchange in TLS using SSLv3 format
(no length prefix).
ok jsing@
|
|
|
|
|
|
| |
light that the child counting was broken in the original code.
this is still fugly, but this preserves all the existing goo.
ok doug@
|
|
|
|
| |
patch from Theo Buehler <theo at math dot ethz dot ch>
|
| |
|
|
|
|
| |
ok miod@ jsing@
|
|
|
|
|
|
|
|
|
| |
For a few old releases, ECDHE-ECDSA was broken on OS X. This option
cannot differentiate between working and broken OS X so it disabled
ECDHE-ECDSA support on all OS X >= 10.6. 10.8-10.8.3 were the faulty
releases but these are no longer relevant. Tested on OS X 10.10 by jsing.
ok jsing@
|
|
|
|
|
|
|
|
|
| |
OpenSSL doesn't remember which clients were impacted and the
functionality has been broken in their stable releases for 2 years.
Based on OpenSSL commit a8e4ac6a2fe67c19672ecf0c6aeafa15801ce3a5.
ok jsing@
|
|
|
|
|
|
|
| |
Moving forward, software should expect that LIBRESSL_VERSION_TEXT and
LIBRESSL_VERSION_NUMBER will increment for each LibreSSL-portable release.
ok deraadt@, beck@
|
|
|
|
|
| |
from OpenSSL (RT #3683)
ok doug@ jsing@
|
|
|
|
|
|
|
| |
its original state instead of blindly turning echo on.
problem reported on the openssl-dev list by William Freeman
ok miod@ beck@
|
|
|
|
|
|
|
|
|
|
|
| |
this would promote it to int for the shift, and then cast to unsigned long,
sign-extending it if sizeof(long) > sizeof(int).
This was not a problem because the computed value was explicitely range
checked afterwards, with an upper bound way smaller than 1U<<31, but it's
better practice to cast correctly.
ok beck@
|
|
|
|
| |
Coverity CID 78796; ok beck@
|
|
|
|
|
| |
applied to all code paths.
ok beck@ bcook@ doug@ guenther@
|
|
|
|
| |
ok bcook@ miod@
|
|
|
|
| |
reluctant ok miod@
|
|
|
|
|
| |
coverity ID's 21691 21698
ok miod@, "Fry it" jsing@
|
|
|
|
| |
we did not notice my fingers slipping. Noticed by bcook@
|
|
|
|
| |
ok beck@
|
|
|
|
|
|
|
|
| |
have seriously corrupted your memory; Coverity CID 21708 and 21721.
While there, plug a memory leak upon error in x509_name_canon().
ok bcook@ beck@
|