summaryrefslogtreecommitdiff
path: root/src/regress/lib/libc/regex/debug.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2017-02-28Bump minors due to symbol addition.jsing3-3/+3
2017-02-28Document EVP_md5_sha1().jsing1-2/+11
2017-02-28Add an EVP interface that provides concatenated MD5+SHA1 hashes, which arejsing4-2/+88
used in various parts of TLS 1.0/1.1. This will allow for code simplification in libssl. The same interface exists in OpenSSL 1.1. ok beck@ deraadt@ inoguchi@ millert@
2017-02-28Fix typo in issuingDistributionPoint description.jsing1-1/+1
2017-02-28Stop pretending that MD5 and SHA1 might not exist - rather than locatingjsing4-20/+8
"ssl3-md5" and "ssl-sha1", call the EVP_md5() and EVP_sha1() functions directly. ok beck@ inoguchi@
2017-02-27Add support for RES_USE_DNSSECjca1-5/+2
RES_USE_DNSSEC is implemented by setting the DNSSEC DO bit in outgoing queries. The resolver is then supposed to set the AD bit in the reply if it managed to validate the answer through DNSSEC. Useful when the application doesn't implement validation internally. This scheme assumes that the validating resolver is trusted and that the communication channel between the validating resolver and and the client is secure. ok eric@ gilles@
2017-02-25pledge stdio before parsing the http responsebeck1-9/+11
ok tb@
2017-02-25Add missing includes to avoid implicit function declarations.jsg4-3/+7
2017-02-24Add the following root CAs, from SECOM Trust Systems / Security Communicationsthen1-1/+126
of Japan, they are present in Mozilla's CA store. OK ajacoutot@ /C=JP/O=SECOM Trust Systems CO.,LTD./OU=Security Communication EV RootCA1 /C=JP/O=SECOM Trust Systems CO.,LTD./OU=Security Communication RootCA2 /C=JP/O=SECOM Trust.net/OU=Security Communication RootCA1
2017-02-23Check return value of every BN_* functions in bntestinoguchi1-393/+426
- add macro CHECK_GOTO - unify function return code to rc - add err: label for error goto ok bcook@
2017-02-21Remove STREEBOG 512 as a TLS MAC since there are currently no cipher suitesjsing2-26/+6
that make use of it. ok bcook@ inoguchi@
2017-02-21don;t end Nd with a full stop;jmc1-3/+3
2017-02-20Add missing $OpenBSD$beck1-0/+1
2017-02-20Mark ERR_add_error_data and ERR_add_error_vdata as not for internal use,beck5-14/+81
and document ERR_asprintf_error_data as their replacement. ok jsing@, ingo@
2017-02-20spelling fix;jmc1-2/+2
2017-02-20document tls_config_error(3) RETURN VALUES, improve what is saidschwarze2-6/+59
about tls_error(3), and warn about some traps; OK jmc@
2017-02-18Add EDNS0 support.jca1-4/+3
EDNS allows for various DNS extensions, among which UDP DNS packets size bigger than 512 bytes. The default is still to not advertize anything. ok eric@
2017-02-15Avoid dereferencing a pointer when reporting an error about the samejsing1-2/+2
pointer being NULL. Found by jsg@ with cppcheck; also detected by Coverity.
2017-02-15Add a NULL test to wrterror() to avoid a NULL deref when called from ajsg1-2/+2
free() error path. ok otto@
2017-02-14bump to 2.5.2bcook1-3/+3
2017-02-12malloc does not *need* to return page-aligned objects for size >=otto1-5/+2
a page. This is not required by any standard and other malloc implementation do not document (or implement) this. ok deraadt@
2017-02-09When netcat was started with -Uz, the exit status was always 1. Ifbluhm1-3/+4
the unix connect is successful, let nc -z close the socket and exit with 0. OK jca@
2017-02-09Document that -x can take an ipv6 address enclosed in square brackets.jca1-2/+5
2017-02-09When getaddrinfo fails, print the requested host and port.jca1-2/+3
Should make debugging easier, especially when using -x literal_ipv6_address
2017-02-09DES keys are not 7 days long. ok jsing@dtucker2-5/+5
2017-02-08Avoid a busy loop in netcat's tls_close(). Reuse the tls_handshake()bluhm1-18/+8
wrapper that calls poll(2) and handles the -w timeout. OK beck@
2017-02-08Avoid double close(2) in netcat. After every call to readwrite()bluhm1-13/+5
there is already a close(2), so do not do it in readwrite(). OK beck@
2017-02-08Due to non-blocking sockets, tls_handshake() could wait in a busybluhm1-21/+42
loop. Use an additional poll(2) during the handshake and also respect the -w timeout option there. From Shuo Chen; OK beck@
2017-02-07Revert previous; the implementation is incorrect since it assumes that thejsing2-20/+7
provided error code matches the error that is currently on the top of the error stack.
2017-02-07Remove unused variable in C source to make the test compile and pass.bluhm1-1/+0
2017-02-07Add file and line to the LibreSSL error strings sine we are no longer inbeck2-7/+20
1989, VMS, or MS/DOS and we all run Brobdingnagian C compilers that have can now be counted on to achieve this level of sophistication nearly everywhere. ok jsing@
2017-02-07Change SSLerror() back to taking two args, with the first one being an SSL *.beck25-573/+841
Make a table of "function codes" which maps the internal state of the SSL * to something like a useful name so in a typical error in the connection you know in what sort of place in the handshake things happened. (instead of by arcane function name). Add SSLerrorx() for when we don't have an SSL * ok jsing@ after us both being prodded by bluhm@ to make it not terrible
2017-02-05Define values for SSL_CTRL_SET_GROUPS{,_LIST} and wire them up to thejsing2-15/+19
SSL_{,CTX_}ctrl() functions. As crazy as it is, some software appears to call the control functions directly rather than using the macros (or functions) provided by the library. Discussed with beck@ and sthen@
2017-02-05Kill leak introduced with refactorbeck1-3/+6
ok jsing@
2017-02-05Support IPv6 proxy addressesjca1-10/+24
ok beck@
2017-02-03Don't use <sys/param.h> from userland without cause. Sort <sys/*>guenther1-3/+4
before other includes per style(9) while we're here. ok florian@ bcook@ jsing@ beck@
2017-02-02fix a comment and rm some dead code as a result of the previous diffotto1-8/+5
2017-02-01netinet/in.h should be included, and freebsd and some othersbeck2-2/+6
don't have EAI_NODATA, so make this easier for people from bernard spill
2017-02-01Let realloc handle and produce moved pointers for allocations betweenlibressl-v2.5.1otto1-20/+37
half a page and a page. ok jmatthew@ tb@
2017-01-31tweak previous;jmc2-12/+8
2017-01-31Add tls_config_[add|set]keypair_ocsp functions so that ocsp staples may bebeck6-58/+209
added associated to a keypair used for SNI, and are usable for more than just the "main" certificate. Modify httpd to use this. Bump libtls minor. ok jsing@
2017-01-31Disable client-initiated renegotiation for libtls servers.jsing1-1/+3
ok beck@ reyk@
2017-01-31Provide an SSL_OP_NO_CLIENT_RENEGOTIATION option that disallowsjsing2-2/+12
client-initiated renegotiation. The current default behaviour remains unchanged. ok beck@ reyk@
2017-01-31LibreSSL : regress for carry bug in mulx4x_mont and sqr8x_montinoguchi1-1/+78
This regress bntest.c patch is originally from master branch of OpenSSL. - dca2e0e test/bntest.c: regression test for CVE-2016-7055. - 3e7a496 test/bntest.c: regression test for carry bug in bn_sqr8x_internal. These tests were added for these commit. - 2fac86d bn/asm/x86_64-mont.pl: fix for CVE-2016-7055 (Low severity). - 3f4bcf5 bn/asm/x86_64-mont5.pl: fix carry bug in bn_sqr8x_internal. ok beck@
2017-01-31LibreSSL : Truncated packet could crash via OOB readinoguchi2-3/+10
This patch is originally from master branch of OpenSSL. - 2198b3a crypto/evp: harden AEAD ciphers. - 8e20499 crypto/evp: harden RC4_MD5 cipher. ok tom@
2017-01-31Document functions returning standard moduli for DH key exchange.schwarze2-1/+136
jsing@ confirmed that these are public and worth documenting.
2017-01-30tweak previous;jmc3-11/+11
2017-01-30Document BN_set_flags(3) and BN_get_flags(3).schwarze6-13/+159
jsing@ confirmed that these macros are public and worth documenting.
2017-01-29Seriously warn against calling BN_init(3), BN_MONT_CTX_init(3),schwarze3-12/+75
and BN_RECP_CTX_init(3). They are not only deprecated but so dangerous that they are almost unusable. I found these scary traps while reading the code in order to document BN_set_flags(3). While here, delete ERR_get_error(3) from SEE ALSO.
2017-01-29Marko Kreen contributed significantly to the ocsp stuff for libtlsbeck1-2/+3