summaryrefslogtreecommitdiff
path: root/src/lib (unfollow)
Commit message (Collapse)AuthorFilesLines
2014-10-19fix two remotely triggerable memory leaks.OPENBSD_5_4tedu2-1/+4
tested by jasper
2014-08-09backport relevant security fixes from openssl 1.0.1itedu14-193/+296
tested by bcook jsg
2014-06-05MFC DTLS buffer overflow fix (CVE-2014-0195)sthen1-1/+7
"Avoid a buffer overflow that can be triggered by sending specially crafted DTLS fragments. Fix for CVE-2014-0195, from OpenSSL. Reported to OpenSSL by Juri Aedla." From d1_both.c r1.19
2014-06-05MFC DTLS "Hello Request" fix (CVE-2014-0221)sthen1-2/+2
"Do not recurse when a 'Hello Request' message is received while getting DTLS fragments. A stream of 'Hello Request' messages will result in infinite recursion, eventually crashing the DTLS client or server. Fixes CVE-2014-0221, from OpenSSL. Reported to OpenSSL by Imre Rad." From d1_both.c r1.20
2014-06-05MFC sess_cert fix (CVE-2014-3470)sthen1-0/+8
"Ensure that sess_cert is not NULL before trying to use it. Fixes CVE-2014-3470, from OpenSSL." From s3_clnt.c r1.66
2014-06-05MFC ChangeCipherSpec fixes (CVE-2014-0224 and additional safeguard), ok jsing@sthen4-4/+22
"Be selective as to when ChangeCipherSpec messages will be accepted. Without this an early ChangeCipherSpec message would result in session keys being generated, along with the Finished hash for the handshake, using an empty master secret." From s3_clnt.c r1.64, s3_pkt.c r1.42, s3_srvr.c r1.59, ssl3.h r1.19 - note that the ssl3.h change has been applied to s3_locl.h instead to simplify patching. "Ensure that we do not process a ChangeCipherSpec with an empty master secret. This is an additional safeguard against early ChangeCipherSpec handling." From s3_pkt.c:1.43
2014-05-01MFC, requested by deraadt@sthen1-0/+4
-/-------------------------- revision 1.33 date: 2014/04/24 04:31:30; author: tedu; state: Exp; lines: +4 -0; on today's episode of things you didn't want to learn: do_ssl3_write() is recursive. and not in the simple, obvious way, but in the sneaky called through ssl3_dispatch_alert way. (alert level: fuchsia) this then has a decent chance of releasing the buffer that we thought we were going to use. check for this happening, and if the buffer has gone missing, put another one back in place. the direct recursive call is safe because it won't call ssl3_write_pending which is the function that actually does do the writing and releasing. as reported by David Ramos to openssl-dev: http://marc.info/?l=openssl-dev&m=139809493725682&w=2 ok beck -/--------------------------
2014-04-12from head, will become 5.4 008_openssl.patchderaadt1-1/+1
Changes by: tedu@cvs.openbsd.org 2014/04/10 13:01:37 Piotr Sikora pointed me at a more refined diff for the buffer release issue. Apply that version. Maybe someday upstream will wake up and then we can have the same code. https://rt.openssl.org/Ticket/Display.html?id=2167&user=guest&pass=guest
2014-04-08MFC:djm2-13/+27
cherrypick fix for CVE-2014-0160 "heartbleed" vulnerability from OpenSSL git; ok sthen@
2013-12-20MFC: Reliability fix for SHA384 SSL/TLS ciphers on strict alignmentjca1-1/+8
architectures. ok miod@ djm@
2013-07-22This commit was manufactured by cvs2git to create branch 'OPENBSD_5_4'.cvs2svn1001-357671/+0
2013-07-22we now have IDEA and MDC2 in libcrypto, so don't disable them in openssl(1)naddy1-3/+2
ok djm@
2013-07-18HISTORY; tweaks and ok sobrado@ jmc@schwarze3-9/+38
2013-07-17more library historyschwarze11-29/+71
facts checked by sobrado@ style tweaks and ok jmc@
2013-07-16use .Mt for email addresses; from Jan Stary <hans at stare dot cz>; ok jmc@schwarze7-20/+20
2013-07-16use .Mt for email addresses; from Jan Stary <hans at stare dot cz>; ok jmc@schwarze1-3/+3
2013-07-16more macro simplification; from Jan Staryjmc1-3/+2
2013-07-16use .Mt for email addresses; from Jan Stary <hans at stare dot cz>; ok jmc@schwarze1-4/+4
2013-07-13Remove no longer needed vax CFLAGS workarounds.miod1-13/+1
2013-07-10rfc 3493 obsoletes 2553. i spotted this after reading hiroki sato's changesjmc1-5/+6
in freebsd src commit r253066. our man pages had been updated, but i must have missed the following: - getnameinfo.3: 2553 -> 3493 - ip6.4: we listed both. remove 2553.
2013-07-05VAX ELF userland bits. Consists mostly of register prefix additions.miod1-151/+151
2013-06-11spacingderaadt1-3/+2
2013-06-08Fix parsing of ambiguous options, the whole loop must be processed.millert1-15/+22
From FreeBSD. OK miod@
2013-06-05Move _Exit() from the exit() manpage to the _exit() manpage, as it'sguenther2-36/+10
just an alias of the latter. ok matthew@ tedu@
2013-06-05Use the fancy .In macro for includes. From Jan Klemkow. ok jmc schwarzetedu113-379/+379
2013-06-04remove some incredible lies about overlapping buffersderaadt2-22/+10
ok guenther
2013-06-02Two small cleanups to atexit: remove unneeded __atexit_invalid, andmatthew2-12/+5
move the call_depth decrement so it happens unconditionally and can still return to 0 when called with dso!=NULL. ok millert
2013-06-02trailing whitespace makes 'make depend' sad. ok mpi@dtucker1-2/+2
2013-06-01Fix catopen(3) for UTF-8 locales and update the implementation to POSIX-2008.stsp1-2/+2
Catalogs had an arbitrary character set which was used regardless of locale. Add UTF-8-encoded catalogs for libc error messages, and rename existing ones to indicate their character sets. catopen(3) now chooses a catalog which matches the locale's encoding, if available. help & ok matthew, man page bits ok jmc, input from naddy and bluhm
2013-05-30Switch to using unhyphenated VIA padlock mnemonics. VIA abandoned thematthew2-4/+4
hyphen in their official programming guide sometime between 2003 and 2005, and Clang's integrated assembler does not support hyphenated mnemonics. ok jsg, deraadt
2013-05-30Remove useless include.ajacoutot1-2/+1
ok millert@
2013-05-15typo: compare len against null needle, not haystackajacoutot1-2/+2
from Alf Schlichting ok millert@
2013-05-13Add an implementation of memmem() -- from FreeBSD with some tweaks.ajacoutot3-4/+145
Requires a libc minor bump, committing now so that we have up-to-date snapshots for the upcoming hackathon. joint work with millert@ man page bits ok jmc@ input and ok millert@, guenther@, deraadt@
2013-05-02Hook up fmemopen and open_memstream tests.mpi1-3/+4
2013-04-29use FD_CLOEXEC instead of 1; from David Hillokan1-2/+2
ok otto
2013-04-21tweak a few commentstedu1-5/+7
2013-04-21this man page is mostly about password hashing now (you really don'ttedu1-18/+5
want to be using DES) and some of the notes about the export controls are no longer so relevant. ok deraadt jmc
2013-04-20Xr encrypt(1) to give people a hint if they just want a password stringtedu1-2/+3
2013-04-17surround the error strings with quotes to clarify exactly which stringstedu1-5/+5
the function is going to return.
2013-04-17the tiniest of style tweakstedu1-7/+7
2013-04-17add some prototypes, casts, includes, parenthesis, and whatnot totedu3-7/+10
silence some warnings.
2013-04-17use CLOCK_MONOTONIC, and repair future time_t overflowderaadt1-8/+8
ok millert guenther
2013-04-05- Add comments regarding copies of these files also in libexec/ld.sokurt1-1/+3
okay guenther@
2013-04-03Update a comment about standards requirementsguenther1-4/+4
2013-04-03Set the stream orientation in open_{,w}memstream().guenther1-1/+15
Check it in the regress test ok mpi@
2013-04-01tweak makefile now that asr is built by default.eric1-10/+10
2013-04-01add hostnames which triggered some bugs.eric1-2/+2
2013-03-31getaddrinfo is now thread-safe.brad1-6/+2
ok eric@
2013-03-28Switch libc and libm to use strong aliases rather than weak aliasesmartynas2-22/+4
where appropriate. Among other things makes the symbols consistent across all architectures (notably where ldbl mantissa is 53 bits). While at it, kill unused LINTLIBRARY/PROTOLIB1 cruft which was there to trick lint into recording the right prototypes for aliased functions. Most of the work done at the awesome n2k13 hackathon. Agreed by kettenis@, guenther@, matthew@.
2013-03-28add a test case for the icmpv6 issue spotted by naddyeric4-10/+26