| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
from carlos cardenas
|
| |
|
|
|
|
| |
test passes.
|
| |
|
|
|
|
|
| |
optimize the access to it with an illegal instruction. But the
tests needs a SIGSEGV, it would fail with SIGILL.
|
|
|
|
|
|
| |
tricky, especially since the manpage is full of lies.
Try to make readers think twice before using them.
With oks and help from schwarze@, tedu@, sthen@, jmc@
|
|
|
|
|
|
| |
after a successful tlsext_sni_serverhello_parse() and that
tlsext_sni_clienthello_parse() fails if we have an existing session and
the SNI is mismatched.
|
|
|
|
|
|
|
|
| |
tlsext_sni_serverhello_parse(). This also adds a check to ensure that
if we have an existing session, the name matches what we specified via
SNI.
ok doug@
|
| |
|
|
|
|
|
|
|
|
| |
and the new extension framework.
Feedback from doug@
ok inoguchi@
|
|
|
|
| |
Missed in the original commit.
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
the newly converted SNI code.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Introduce a TLS extension handling framework that has per-extension type
functions to determine if an extension is needed, to build the extension
data and parse the extension data. This is somewhat analogous to BoringSSL,
however these build and parse functions are intentionally symetrical. The
framework is hooked into the existing TLS handling code in such a way that
we can gradual convert the extension handling code.
Convert the TLS Server Name Indication extension to the new framework,
while rewriting it to use CBB/CBS and be more strict in the process.
Discussed with beck@
ok inoguchi@
|
| |
|
|
|
|
| |
Reported by <dravion at ht-foss dot net>
|
|
|
|
|
|
|
|
|
|
| |
protocols and "compat" ciphers. This allows for TLS connections to TLS
servers that are using less than ideal cipher suites, without having to
resort to "-T tlsall" which enables all known cipher suites.
Diff from Kyle J. McKay <mackyle at gmail dot com>
ok beck@
|
| |
|
|
|
|
| |
okay millert@
|
|
|
|
| |
definite value in the size == 0 case
|
|
|
|
|
|
| |
the default.
okay millert@
|
|
|
|
| |
what the reader is using.
|
| |
|
|
|
|
| |
is not initialized. Problem spotted by Carlin Bingham; ok phessler@ tedu@
|
|
|
|
| |
Based on a diff from Jack Burton <jack at saosce dot com dot au>, thanks!
|
| |
|
|
|
|
|
|
|
|
| |
enable CRL checking for the full certificate chain.
Based on a diff from Jack Burton <jack at saosce dot com dot au>, thanks!
Discussed with beck@
|
|
|
|
|
|
| |
prefix if the character following it is a valid hex char. The C99
standard is clear that given the string "0xy" zero should be returned
and endptr set to point to the "x". OK deraadt@ espie@
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
TLS Server Name extension, however seemingly several clients (including
Python, Ruby and Safari) violate the RFC. Given that this is a fairly
widespread issue, if we receive a TLS Server Name extension that contains
an IP literal, pretend that we did not receive the extension rather than
causing a handshake failure.
Issue raised by jsg@
ok jsg@
|
| |
|
|
|
|
| |
From Klemens Nanni
|
| |
|
|
|
|
|
|
|
| |
just fall into the code. The .align created a FILL zone in the .init section,
which on i386 was filled with a NOP-sled, something we want to get away
from.
discussed with kettenis and tom
|
|
|
|
|
|
|
| |
we can prevent libcrypto from going behind our back and trying to read
passwords from standard input (which we may not be permitted to do).
Found by jsg@ with httpd and password protected keys.
|
| |
|
| |
|
| |
|
|
|
|
| |
duplicating clean up code.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The certificate verification code has special cases for self-signed
certificates and without this change, self-issued certificates (which it
seems are common place with openvpn/easyrsa) were also being included in
this category.
Based on BoringSSL.
Thanks to Dale Ghent <daleg at elemental dot org> for assisting in
identifying the issue and testing this fix.
ok inoguchi@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
src/lib/libc/gen/tree.c is a copy of src/sys/kern/subr_tree.c, but with
annotations for symbol visibility. changes to one should be reflected
in the other.
the malloc debug code that uses RB code is ported to RBT.
because libc provides the RBT code, procmap doesn't have to reach into
the kernel and build subr_tree.c itself now.
mild enthusiasm from many
ok guenther@
|
|
|
|
|
| |
programs will build even without a make depend first.
okay tb@ millert@
|
|
|
|
|
|
| |
a blank space somewhere else.
suggested by and ok jsing
|
|
|
|
|
|
|
| |
omitting parentheses in return statements. Binary change because of
return instead of exit(3) from main and because help() is now __dead.
ok awolk
|
|
|
|
|
|
|
|
|
|
|
|
| |
first pledge promises, so nc exited with EPERM. To fix this, merge the
pledge of the Pflag && usetls case into the first pledge block. This
allows us to get rid of the second pledge block and thus to simplify the
logic a bit. While there, add a missing blank to an error string.
Joint effort by the #openbsd-daily code reading group, problem found and
initial patch by <rain1 openmailbox org>.
ok awolk
|
| |
|
| |
|