summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Collapse)AuthorAgeFilesLines
* from head, will become 5.3 015_openssl.patchOPENBSD_5_3deraadt2014-04-121-1/+1
| | | | | | | | Changes by: tedu@cvs.openbsd.org 2014/04/10 13:01:37 Piotr Sikora pointed me at a more refined diff for the buffer release issue. Apply that version. Maybe someday upstream will wake up and then we can have the same code. https://rt.openssl.org/Ticket/Display.html?id=2167&user=guest&pass=guest
* MFC:djm2014-04-082-13/+27
| | | | | cherrypick fix for CVE-2014-0160 "heartbleed" vulnerability from OpenSSL git; ok sthen@
* MFC: Reliability fix for SHA384 SSL/TLS ciphers on strict alignmentjca2013-12-201-1/+8
| | | | architectures. ok miod@ djm@
* This commit was manufactured by cvs2git to create branch 'OPENBSD_5_3'.cvs2svn2013-02-141001-357671/+0
|
* cherry pick bugfixes for http://www.openssl.org/news/secadv_20130205.txtmarkus2013-02-1430-557/+2564
| | | | | from the openssl git (changes between openssl 1.0.1c and 1.0.1d). ok djm@
* remove ACSS, crank libcrypto major; ok markus@ deraadt@djm2013-01-2614-882/+4
|
* Don't pull <math.h> just because it can return HUGE_VAL in themartynas2013-01-151-3/+2
| | | | corner cases. OK millert@.
* Simple tests for fmemopen(3) and open_memstream(3)mpi2013-01-014-0/+175
|
* Fix bug in random offset introduced in rev 1.143; random range wasotto2012-12-221-3/+3
| | | | expanded, but not enough due to precedence error. Spotted by Thorsten Glaser.
* add test case for gethostbyname() called with numeric hostnameeric2012-12-171-1/+2
|
* - use diff -u like most anywhere to make the output readable.jasper2012-12-161-2/+2
| | | | ok phessler@
* document RES_USE_DNSSEC; text tweaked by sthenjmc2012-12-121-2/+6
| | | | ok jakob
* Remove excessive sys/cdefs.h inclusionderaadt2012-12-052-5/+2
| | | | ok guenther millert kettenis
* no need for .Pp before lists;jmc2012-12-051-3/+2
|
* Rewritten posix_openpt manual that doesn't include any of the POSIXmillert2012-12-041-74/+49
| | | | text. OK deraadt@
* Use "path name" not "pathname".millert2012-12-041-3/+3
|
* remove some unnecessary sys/param.h inclusionsderaadt2012-12-041-3/+1
|
* Simple emulation of POSIX pty APIs posix_openpt(), ptsname(),millert2012-12-034-6/+414
| | | | | grantpt() and unlockpt() using /dev/ptm. Man pages from FreeBSD. OK kettenis@ deraadt@ beck@ ajacoutot@ naddy@
* New CA root certificates, ok beck@.sthen2012-12-031-99/+1705
| | | | | | | | | | | | | | - additional cert's from GlobalSign. - additional cert's from VeriSign and replace existing ones with 'Signature Algorithm: md2WithRSAEncryption' with their currently distributed sha1WithRSAEncryption versions. - new CAs: AddTrust (root for most Comodo certificates also heavily used in academic networks), Comodo (most of their certs are rooted in AddTrust but TERENA use the Comodo AAA Certificate Services root for some things so add that separately), UserTrust Network/UTN (part of Comodo) and Starfield (part of Go Daddy).
* Additional CA root certificates: GeoTrust/Equifax, Go Daddy, StartCom, thawte.sthen2012-12-011-0/+1187
| | | | ok beck@ william@ todd@
* Regenerate the text information for all certificates with recent opensslsthen2012-11-301-439/+465
| | | | | | and include sha1 signatures for all certs (some were missing). No certificate changes, this is just for consistency. ok beck@
* Remove retired Thawte/Verisign certificates.sthen2012-11-301-499/+0
| | | | | | Remove intermediate GoDaddy certificate, this file should just contain roots. ok beck@ phessler@
* Document a known bug in the DES crypt cipher implementation which we'restsp2012-11-301-2/+6
| | | | | | | | | | not going to fix in order to stay compatible with legacy password data. Nobody should use DES crypt anyway these days. See http://www.freebsd.org/security/advisories/FreeBSD-SA-12:02.crypt.asc for details about this bug. Discussed with deraadt and beck about half a year ago (I'm pruning Ms from my tree).
* - put the various options into the same order as those in resolv.hjmc2012-11-291-17/+38
| | | | | | | | | | | | | | | - sync RES_DEBUG with resolv.conf.5 - document RES_PRIMARY, but mark it unsupported (like we already do for RES_AAAONLY) - use the exact same text (about being enabled by default) for RES_RECURSE as for the other two defaults - document RES_INSECURE{1,2} - description lifted from resolv.conf.5 - document RES_NOALIASES - mostly sync the RES_USE_EDNS0 text with resolv.conf.5 - RES_USE_DNSSEC not documented for now. something to come... ok sthen
* remove some useless Tn and double punctuation;jmc2012-11-191-16/+7
|
* RES_IGNTC is no longer ignored; ok sthenjmc2012-11-191-4/+4
|
* Ensure that the base provided to strtol(3) is between 2 and 36 inclusive,jsing2012-11-181-1/+12
| | | | | | or the special value of 0. ok deraadt@ otto@
* Add a regress test for strtol, which currently fails.jsing2012-11-183-2/+86
| | | | ok otto@
* Per POSIX, fix raise() and abort() to send the signal to the current thread.guenther2012-11-101-3/+5
| | | | | | Should make coredumps from abort() easier to debug too. ok kurt@
* Add a new malloc option 'U' => "Free unmap" that does the guarding/djm2012-11-022-18/+36
| | | | | | | | | | | | unmapping of freed allocations without disabling chunk randomisation like the "Freeguard" ('F') option does. Make security 'S' option use 'U' and not 'F'. Rationale: guarding with no chunk randomisation is great for debugging use-after-free, but chunk randomisation offers better defence against "heap feng shui" style attacks that depend on carefully constructing a particular heap layout so we should leave this enabled when requesting security options.
* On amd64 OPENSSL_cpuid_setup and OPENSSL_ia32cap_P are now hidden so we don'tkettenis2012-10-318-18/+10
| | | | | | | | | | have to go through the PLT/GOT to get at them anymore. In fact going through the GOT now fails since we no longer have a GOT entry for OPENSSL_ia32cap_P. Fixes the problem spotted by jasper@ and sthen@. Based on a diff from mikeb@ who did most of the actual work of tracking down the issue. ok millert@, mikeb@
* Restore r1.10, lost during last update:miod2012-10-222-2/+2
| | | | Disable use of dladdr() on a.out arches, they do not provide it (yet);
* Makefile and header changes for OpenSSL-1.0.1cdjm2012-10-1320-139/+361
| | | | major cranks
* import files that CVS missed; sighdjm2012-10-1310-0/+1498
|
* resolve conflictsdjm2012-10-13504-7535/+33760
|
* This commit was generated by cvs2git to track changes on a CVS vendordjm2012-10-1342-591/+570
|\ | | | | branch.
| * import OpenSSL-1.0.1cdjm2012-10-13339-4357/+15664
| |
* | This commit was generated by cvs2git to track changes on a CVS vendordjm2012-10-13219-1382/+57417
|\ \ | | | | | | branch.
| * | import OpenSSL-1.0.1cdjm2012-10-13248-2332/+62631
| | |
* | | This commit was generated by cvs2git to track changes on a CVS vendordjm2012-10-13160-1420/+48653
|\ \ \ | | | | | | | | branch.
| * | | import OpenSSL-1.0.1cdjm2012-10-13359-4455/+63120
| | | |
* | | | last stage of rfc changes, using consistent Rs/Re blocks, and moving thejmc2012-09-279-88/+91
| | | | | | | | | | | | | | | | references into a STANDARDS section;
* | | | last stage of rfc changes, using consistent Rs/Re blocks, and moving thejmc2012-09-261-19/+45
| | | | | | | | | | | | | | | | references into a STANDARDS section;
* | | | Make setenv(3) consistent with unsetenv(3), giving EINVAL if passedjeremy2012-09-232-20/+10
| | | | | | | | | | | | | | | | | | | | | | | | an empty name, NULL pointer, or a name containing an '=' character. OK millert@, guenther@
* | | | remove some wacky Xo/Xc;jmc2012-09-161-3/+3
| | | |
* | | | remove tahoe-specific makefile machinery, no such hardware is known to bemiod2012-09-151-5/+1
| | | | | | | | | | | | | | | | | | | | in working condition anymore (assuming there would be interest in running on it).
* | | | Document that strtod functions accept INF, NAN, NAN(). From Michal Mazurek.martynas2012-09-151-3/+28
| | | |
* | | | specify the bounds of the dst to strlcat (both values were static andderaadt2012-09-131-2/+2
| | | | | | | | | | | | | | | | | | | | equal, but it is more correct) from Michal Mazurek
* | | | Fix precedence bug (& has lower precedence than !=).pirofti2012-09-131-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | Okay otto@. Found by Michal Mazurek <akfaew at jasminek dot net>, thanks!
* | | | run regress with the local env tooeric2012-09-051-2/+2
| | | |