Age | Commit message (Collapse) | Author |
|
For backward compatibility, the flags are redefined as 0.
ok jsing@
|
|
No part of LibreSSL checks for this flag any longer.
ok jsing@
|
|
ssl23_get_client_hello sets type=1 on error and continues processing.
It should return an error immediately to simplify things. This also
allows us to start removing the last of SSL_OP_NO_SSL*.
Added extra paranoia for s->version to make sure it is set properly.
ok jsing@
|
|
ASN1_{GENERALIZED,UTC}TIME_set_string(), which allows it to be called
with a NULL pointer.
ok beck@
|
|
ASN1_{GENERALIZED,UTC,}TIME_set_string() to be called with a NULL pointer.
Found the hard way by @kinichiro on github.
ok beck@
|
|
becoming negative in probable_prime_dh_safe(). Reported by Franck Denis who
noticed `openssl gendh 0' would segfault.
Fix adapted from OpenSSL RT#2701.
ok beck@ jsing@
|
|
will end up doing a read and write of up to 7 bytes beyond the specified
length. This is effectively a non-issue since we read and write back the
same data and due to alignment it is within a page boundary.
Regardless, avoid this by removing the "special" handling for the remaining
length and allow the standard (non-chunk) code to process the remaining
bytes, which does not result in overrun.
Reported by Pascal Cuoq <cuoq at trust-in-soft.com> - thanks!
ok beck@ miod@
|
|
|
|
ok jsing@
|
|
utctime and gentime wrappers accordingly. Along with some other cleanup.
this also removes the need for timegm.
ok bcook@ sthen@ jsing@
|
|
few lines above.
|
|
macros. The only change in the generated assembly is due to line numbering.
|
|
DECLARE_ASN1_FUNCTIONS_const already includes this macro so using both
means we end up with duplicate function prototypes and externs.
|
|
ok bcook@
|
|
|
|
buf is at all times kept nul terminated, so there is no need to enforce
this again upon exit. (no need to move buf around after we exahust space.)
ok beck miod
|
|
ok miod@
|
|
move the bndec variable in tighter since it's not used elsewhere in the
loop, then always free it after use.
ok bcook miod
|
|
ok bcook@ deraadt@
|
|
The "authenticated encryption with additional data" API is used for
ciphers like AES-GCM or ChaCha20-Poly1305. The manpage is a beginning
and certainly needs more work, especially improvements in the EXAMPLES
section.
Based on agl's source code comments.
Converted from pod to mandoc by schwarze@
OK schwarze@ jsing@
|
|
|
|
actual function. This removes the last ASN1_dup_of usage from the tree.
Feedback from doug@ and miod@
|
|
ASN1_item_{d2i,i2d}_{bio,fp}() function calls.
ok beck@ doug@
|
|
DSAPublicKey, DSAPrivateKey and DSAparams ASN1_ITEMs.
|
|
error was present in the original 2004 commit, so it hasn't been used in
over 11 years, thus exceeding our deprecation requirements by over a decade.
OpenSSL has chosen to *fix it*; we'll gladly watch it burn
ok jsing@
|
|
mark it as #ifndef LIBRESSL_INTERNAL at least we don't use this.
ok jsing@
|
|
|
|
|
|
|
|
ok deraadt@
|
|
20151005171301+1.09Z to be treated as a valid time.
ok beck@
|
|
additional bounds checks.
ok beck@
|
|
Rather than a half-hearted attempt to free up resources and fix
ref counting at the SSL_CTX level, let SSL_free() do its job.
This diff got lost in the shuffle somewhere. It's from last year.
Ref counting error reported by Parakleta in github ticket #51. Thanks!
ok jsing@, beck@
|
|
in asn1 and x509 code, all dealing with an ASN1_TIME. This brings the parsing
together in one function that converts into a struct tm. While we are at it this
also brings us into conformance with RFC 5280 for times allowed in an X509 cert,
as OpenSSL is very liberal with what it allows.
input and fixes from deraadt@ jsing@ guethther@ and others.
ok krw@, guenther@, jsing@
|
|
|
|
|
|
aside from line numbers.
|
|
|
|
|
|
|
|
|
|
with one s/M_ASN1_VISIBLESTRING_new/ASN1_VISIBLESTRING_new/.
|
|
ASN1_GENERALIZEDTIME_(new|free).
|
|
|
|
different from the macro expansion, but the result is the same. Also
replace some ASN1_STRING_dup() with ASN1_INTEGER_dup().
ok beck@ doug@
|
|
the type to V_ASN1_INTEGER.
ok doug@
|
|
This ifdef was introduced 15 years ago and was known to cause problems
with STACK_OF() back then.
ok jsing@, beck@, jca@
|
|
ok guenther miod
|
|
ASN1_BIT_STRING_(new|free).
ok beck@ doug@
|
|
|