Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Fix 9 memory leaks. | logan | 2014-06-28 | 1 | -1/+10 |
| | | | | | | | | (Thanks to Brent Cook) With help from tedu@ OK from tedu@ | ||||
* | Fix 2 memory leaks. | logan | 2014-06-28 | 2 | -2/+6 |
| | | | | | | (Thanks to Brent Cook) OK from tedu@ | ||||
* | Use strtonum() instead of atoi(), and then impose what are we think | deraadt | 2014-06-28 | 13 | -102/+211 |
| | | | | | | are the current range checks. Help from millert and lteo. Please test now that it is deployed and let us know if any numbers are off.. ok lteo | ||||
* | When building a BN on the stack in BN_div(), make sure to initialize all its | miod | 2014-06-27 | 1 | -1/+2 |
| | | | | | | fields (i.e. the flags field) before using it. This is currently harmless, but might not be if we end up invoking other BN functions checking for constant-time processing requirement in the future. | ||||
* | save_errno botch; spotted by miod | deraadt | 2014-06-27 | 1 | -2/+2 |
| | |||||
* | hand-KNF macro the do { } while loops | deraadt | 2014-06-27 | 4 | -40/+49 |
| | |||||
* | hand-KNF the remaining bits | deraadt | 2014-06-27 | 1 | -98/+106 |
| | |||||
* | Remove M_ASN1_New* macros which are only used in X509_PKEY_new() are obfuscate | miod | 2014-06-27 | 2 | -22/+16 |
| | | | | | | it to hide memory leaks in the error paths, and fix aforementioned memory leaks. ok jsing@ logan@ deraadt@ | ||||
* | save errno in ERR_put_error(), so that SYSerr doesn't have any accidental | deraadt | 2014-06-26 | 1 | -1/+3 |
| | | | | | cases where errno can be trashed. ok jsing | ||||
* | Unifdef -UNO_SYS_TYPES_H | miod | 2014-06-24 | 5 | -20/+9 |
| | |||||
* | Remove previously commented out wrong code, as well as the comment saying this | miod | 2014-06-24 | 1 | -3/+1 |
| | | | | is incorrect code. | ||||
* | Remove ancient workaround for previous century's compilers in the declaration | miod | 2014-06-24 | 1 | -2/+1 |
| | | | | of CRYPTO_EX_DATA; riding upon the libcrypto major bump. | ||||
* | Remove BIO_f_reliable(), guilty of playing with EVP_MD_CTX internals it | miod | 2014-06-24 | 2 | -627/+1 |
| | | | | | should not know anything about. Verified not to be used in ports; riding upon the recent libcrypto major bump. | ||||
* | If a chacha operation does not consume all of the generated key stream, | jsing | 2014-06-24 | 3 | -7/+46 |
| | | | | | | | | | | | | | | | | ensure that we save it and consume it on subsequent writes. Otherwise we end up discarding part of the key stream and instead generate a new block at the start of the next write. This was only an issue for callers that did multiple writes that are not multiples of 64 bytes - in particular, the ChaCha20Poly1305 usage does not hit this problem since it performs encryption in a single-shot. For the same reason, this is also a non-issue when openssl(1) is used to encrypt with ChaCha. Issue identified by insane coder; reported to bugs@ by Joseph M. Schwartz. ok beck@ | ||||
* | Some KNF. | jsing | 2014-06-24 | 1 | -6/+12 |
| | |||||
* | Replace 48 lines of code with a single inet_pton() call. The previous | jsing | 2014-06-24 | 1 | -48/+3 |
| | | | | | | | | | | | | | handrolled version could not even make use of sscanf(), since that would not work with a certain antiquated compiler. It is worth noting that there is a tiny change in behaviour - previously calling BIO_get_host_ip() with something that looked like it might be a valid IP address (for example, "1." or even ".") would result in it returning failure rather than trying a BIO_gethostbyname() - now we'll always try a BIO_gethostbyname() if it was not a valid IPv4 address. ok beck@ miod@ deraadt@ | ||||
* | Actually make BIO_set_tcp_ndelay() work - TCP_NODELAY will not magically | jsing | 2014-06-24 | 1 | -16/+3 |
| | | | | | | appear by itself. ok beck@ miod@ | ||||
* | Fix memory leak. | logan | 2014-06-24 | 1 | -2/+4 |
| | | | | | | Thanks to Brenk Cook. OK from miod@ | ||||
* | Since this is a library, place issetugid() before every getenv() | deraadt | 2014-06-23 | 5 | -13/+24 |
| | | | | ok miod | ||||
* | KNF, particularly wrapped lines of calls to PEM_read_bio_FOO() and | guenther | 2014-06-22 | 2 | -48/+88 |
| | | | | | | multiline comments ok jsing@ | ||||
* | BIO_sock_init() no longer does anything, so stop calling it. | jsing | 2014-06-22 | 1 | -10/+1 |
| | |||||
* | Just use SOMAXCONN and IPPROTO_TCP, since we know we have them. | jsing | 2014-06-22 | 1 | -14/+4 |
| | |||||
* | In BIO_get_port(), use strol() with appropriate range checks rather than | jsing | 2014-06-22 | 3 | -34/+50 |
| | | | | | | | an atoi() followed by an unsigned short cast. This stops things like "-1" and "66536" from being considered to be "valid" port numbers. ok beck@ deraadt@ | ||||
* | nuke unused test programs; ok jsing | deraadt | 2014-06-22 | 2 | -46/+2 |
| | |||||
* | More KNF. | jsing | 2014-06-22 | 1 | -5/+5 |
| | |||||
* | KNF. | jsing | 2014-06-22 | 3 | -208/+203 |
| | |||||
* | KNF. | jsing | 2014-06-22 | 6 | -961/+1081 |
| | |||||
* | More KNF. | jsing | 2014-06-22 | 3 | -9/+9 |
| | |||||
* | always compare memcmp against 0, for clarity. | tedu | 2014-06-21 | 6 | -14/+14 |
| | |||||
* | Pull the code that builds a DTLS sequence number out into its own function | jsing | 2014-06-21 | 6 | -46/+58 |
| | | | | | | to avoid duplication. Also use fewer magic numbers. ok miod@ | ||||
* | Specify the correct strength bits for 3DES cipher suites. | jsing | 2014-06-21 | 2 | -30/+26 |
| | | | | | | From OpenSSL. ok miod@ | ||||
* | Switch to the ISC licensed versions of these files, which Google has made | jsing | 2014-06-21 | 2 | -101/+26 |
| | | | | | | available via boringssl. ok deraadt@ | ||||
* | Pull out the sequence number selection and handle this up front. Also, the | jsing | 2014-06-21 | 2 | -18/+12 |
| | | | | correct record is already known, so avoid reassignment. | ||||
* | More KNF and clean up. | jsing | 2014-06-21 | 2 | -26/+18 |
| | |||||
* | More KNF. | jsing | 2014-06-21 | 8 | -61/+56 |
| | |||||
* | KNF | miod | 2014-06-21 | 3 | -124/+137 |
| | |||||
* | KNF | miod | 2014-06-21 | 3 | -178/+186 |
| | |||||
* | Fix memory leak in error path. | logan | 2014-06-21 | 2 | -4/+4 |
| | | | | OK from miod@ | ||||
* | Remove the OPENSSL_*cap getenv's. A program should not be able to | deraadt | 2014-06-20 | 3 | -25/+5 |
| | | | | | change the behaviour of the library in such a complicated fashion. ok miod | ||||
* | wrap getenv OPENSSL_ALLOW_PROXY_CERTS in an issetugid check, to protect | deraadt | 2014-06-20 | 1 | -2/+2 |
| | | | | | setuid applications from being fooled. ok miod | ||||
* | Remove OPENSSL_instrument_halt and OPENSSL_far_spin, which both might | miod | 2014-06-20 | 1 | -70/+0 |
| | | | | have been used under DJGPP in the previous century (if at all). | ||||
* | Fix incorrect bounds check in amd64 assembly version of bn_mul_mont(); | miod | 2014-06-20 | 2 | -4/+4 |
| | | | | | noticed and fix by Fedor Indutny of Joyent ( https://github.com/joyent/node/issues/7704 ) | ||||
* | convert CRYPTO_memcmp to timingsafe_memcmp based on current policy favoring | tedu | 2014-06-19 | 18 | -44/+44 |
| | | | | | | libc interfaces over libcrypto interfaces. for now we also prefer timingsafe_memcmp over timingsafe_bcmp, even when the latter is acceptable. ok beck deraadt matthew miod | ||||
* | check stack push return and make some effort to clean up. ok beck miod | tedu | 2014-06-19 | 1 | -2/+6 |
| | |||||
* | improve error checking. set error code on error, and check malloc return. | tedu | 2014-06-19 | 1 | -2/+13 |
| | | | | add missing unlock in one case. ok lteo miod | ||||
* | In ssl3_send_newsession_ticket(), fix a memory leak in an error path. | miod | 2014-06-18 | 2 | -4/+8 |
| | |||||
* | Missinc calloc() return value check; ok deraadt@ | miod | 2014-06-18 | 1 | -1/+5 |
| | |||||
* | Make sure to always invoke EVP_CIPHER_CTX_cleanup() before returning in the | miod | 2014-06-18 | 2 | -8/+20 |
| | | | | | | error paths from tls_decrypt_ticket(). ok tedu@ | ||||
* | Use asprintf() instead of a fixed 128-byte size in SSL_CIPHER_description() | miod | 2014-06-18 | 2 | -22/+22 |
| | | | | | | when no storage buffer is passed. ok deraadt@ tedu@ | ||||
* | In SSL_COMP_add_compression_method(), make sure error cases actually return | miod | 2014-06-18 | 2 | -4/+4 |
| | | | | | | `error' rather than `success'. ok deraadt@ |