summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* Use static and __{BEGIN,ENV}_HIDDEN_DECLS to hide a bunch of internalguenther2015-08-272-4/+7
| | | | | | symbols that are not longer exported. (This improves the generated code.) ok deraadt@
* Move the __rand48_* declarations into rand48.h, and then hide both themguenther2015-08-277-25/+13
| | | | | | and __dorand48() and __rand48_deterministic ok deraadt@
* unify versions, so they are easier to diff.deraadt2015-08-258-18/+18
|
* KNFderaadt2015-08-252-12/+8
|
* Unify error message between client and server.jsing2015-08-221-2/+2
|
* SSL_set_app_data is a macro for SSL_set_ex_data(), which is a wrapperjsing2015-08-222-6/+10
| | | | | around CRYPTO_set_ex_data(), which can fail. Since this is the case, check the return value of CRYPTO_set_ex_data^WSSL_set_ex_data^WSSL_set_app_data.
* Store a reference to the libtls context in the SSL client connection appjsing2015-08-221-1/+3
| | | | | | data (as is already done for server connections). From Marko Kreen.
* Make tls_read()/tls_write always set outlen to zero on error - this gotjsing2015-08-221-5/+5
| | | | | | broken by r1.4. Spotted by Marko Kreen.
* All these files include <stdlib.h>, so do not need to castderaadt2015-08-202-5/+5
| | | | malloc/calloc/realloc* returns.
* bump to 2.3.0 for the next LibreSSL release cyclebcook2015-08-202-6/+6
|
* Properly handle missing TLS extensions in client hello as a non-failure.bcook2015-08-192-2/+6
| | | | | Noticed by @Ligushka from github. ok miod@, doug@
* typosmiod2015-08-1810-10/+10
|
* spelling; ok deraadtjmc2015-08-022-4/+4
|
* Fix SRTP parsing.doug2015-07-312-6/+4
| | | | | | | jsing@ noticed that during the CBS conversion, an extra CBS_len comparison was introduced. It should be 0 after extracting MKI. ok jsing@ bcook@ deraadt@
* Add linker warnings in case SSLv3_{,client,server}_method are referenced.miod2015-07-295-5/+35
| | | | | | | Use of this symbols proves the existence of a code path willingly using SSLv3, even with OPENSSL_NO_SSL3 being defined, which hints that it needs fixing. Discussed with the LibreSSL cabal during c2k15; ok deraadt@
* Use named initialisers for X509V3_EXT_METHOD structs (for the usualjsing2015-07-2938-456/+1176
| | | | reasons) - only change in generated assembly is due to line numbering.
* Expand obsolete M_ASN1.*(cmp|dup|print|set) macros - no change in generatedjsing2015-07-2940-108/+108
| | | | | | assembly. ok bcook@
* Expand obsolete M_ASN1_STRING_* macros in asn1_lib.c, apply some style(9)jsing2015-07-292-12/+10
| | | | | | and drop an unnecessary return from a void function. ok bcook@ doug@
* Less asn1_mac.h - asn1_lib.c does not need it and x_pkey.c should bejsing2015-07-274-20/+10
| | | | | | using ASN1err() instead of ASN1_MAC_H_err(). ok miod@
* double words fix; docs are slowly getting moved to mdoc, but thissobrado2015-07-254-4/+4
| | | | | | change will help people translating them. ok jmc@, schwarze@
* Place the ASN.1 template macros (and remaining implement macros) underjsing2015-07-252-6/+12
| | | | #ifndef LIBRESSL_INTERNAL - we're not using these anymore!
* double word fix.sobrado2015-07-251-2/+2
| | | | ok jmc@, schwarze@
* Expand another ASN.1 template macro that snuck through last time around.jsing2015-07-252-4/+16
| | | | No change in generated assembly.
* Manually expand ASN.1 template macros - only change in generated assemblyjsing2015-07-256-32/+80
| | | | is due to line numbering.
* Expand ASN.1 template macros that got missed in the last pass - only changejsing2015-07-256-22/+62
| | | | to generated assembly is due to line numbers.
* Expand ASN.1 template macros - the generated assembly only differs byjsing2015-07-2526-282/+1612
| | | | changes to line numbers.
* Expand ASN.1 template macros - no change in generated assembly.jsing2015-07-252-112/+588
|
* Expand ASN.1 template macros - no change in generated assembly.jsing2015-07-252-178/+1090
|
* Expand another wall of ASN.1 template macros - no change to generatedjsing2015-07-252-448/+2714
| | | | assembly.
* Expand ASN.1 template macros - no change in generated assembly.jsing2015-07-254-272/+1694
|
* Expand ASN.1 template macros - the generated assembly only differs byjsing2015-07-252-110/+702
| | | | changes to line numbers.
* Expand ASN.1 template macros - no change in generated assembly.jsing2015-07-244-54/+342
|
* Expand ASN.1 template macros - the generated assembly only differs byjsing2015-07-242-102/+682
| | | | changes to line numbers.
* an TLS -> a TLS; from thanos tsouanasjmc2015-07-245-14/+14
|
* Expand ASN1_ITEM_TEMPLATE/ASN1_EX_TEMPLATE_TYPE/ASN1_ITEM_TEMPLATE_ENDjsing2015-07-248-44/+212
| | | | macros - the generated assembly only differs by changes to line numbers.
* Expand IMPLEMENT_ASN1_MSTRING macros - the generated assembly only differsjsing2015-07-244-12/+84
| | | | by changes to line numbers.
* Convert tls1_process_ticket to CBS.doug2015-07-244-62/+76
| | | | ok miod@ jsing@
* Convert tls1_process_sigalgs to CBS.doug2015-07-242-10/+28
| | | | ok miod@ jsing@
* Convert ssl3_get_record to CBS.doug2015-07-242-44/+58
| | | | ok miod@ jsing@
* call it bcrypt in the man page tootedu2015-07-231-3/+3
|
* permit "bcrypt" as an alias for "blowfish". this is, after all, whattedu2015-07-231-11/+27
| | | | | | | 99% of the world calls it. allow just "bcrypt" without params to mean auto-tune ("bcrypt,a"). default remains 8 rounds (for now) ok deraadt
* Remove duplicate check in libssl.doug2015-07-212-6/+2
| | | | | | | If len == 0, it already set try_session_cache so there's no need to check len again. Fixes Coverity issue 21687. ok bcook@
* Correct #if/else logic in BIO's dgram_ctrl.doug2015-07-202-6/+6
| | | | | | | | | Coverity issue 72741 noticed that ret is being overwritten before use. The actual issue is that the #if/else logic is guarding the wrong lines. Besides impacting ret, this also made the case's break logic wrong because it was in the wrong location. ok bcook@ beck@
* prefer string.h to strings.h ok guenther@ doug@bcook2015-07-202-4/+4
|
* Various memory leaks upon error or unchecked allocations.miod2015-07-202-8/+26
| | | | ok doug@
* Use V_ASN1_UNDEF instead of -1.miod2015-07-202-14/+14
| | | | | | | Make sure ASN1_primitive_new() will return NULL in *pval in all error situations. ok bcook@ doug@
* Check the return value of asn1_enc_save(). ok bcook@ doug@miod2015-07-202-4/+8
|
* When freeing an X509_CRL, if freeing the user-maintained meth_data fails,miod2015-07-202-6/+8
| | | | | do not forgot to nevertheless keep freeing the other fields. ok doug@ guenther@
* In X509_PKEY_new(), make sure all allocation failures push an error to themiod2015-07-202-14/+30
| | | | | error stack, not only the first one. ok guenther@ doug@
* add NetLock Kft. CA root certificate, already present in web browsers andsteven2015-07-201-0/+80
| | | | | needed for fetching ports distfiles. ok sthen@