summaryrefslogtreecommitdiff
path: root/lib
AgeCommit message (Collapse)Author
2015-03-03sort sections;Jason McIntyre
2015-03-03Fix variable name typo in IDIOMS.Kent R. Spillner
ok millert@
2015-03-02Update comment to match code; Caspar SchutijserTodd C. Miller
2015-03-02Document that POLLPRI and POLLRDBAND are set for out-of-band socketTodd C. Miller
data.
2015-03-02Document out-of-band data on a socket as an example of an exceptionalTodd C. Miller
condition.
2015-03-02Document when closefrom() was added to OpenBSD. OK bcook@Todd C. Miller
2015-03-02Note that closefrom is an extension.Brent Cook
suggested and ok reyk@
2015-03-02gethostbyname(3) would fail when more than 16 addrs/aliases were returned.Bryan Steele
Bump MAXADDRS/ALIASES to the original of 35, and silently ignore extras instead of failing. Noticed by markson on freenode. OK eric@ "with revised diff", phessler@.
2015-03-02Fix a minor information leak that was introduced in t1_lib.c r1.71, wherebyJoel Sing
an additional 28 bytes of .rodata (or .data) is provided to the network. In most cases this is a non-issue since the memory content is already public. Issue found and reported by Felix Groebert of the Google Security Team. ok bcook@ beck@
2015-02-28Reduce usage of predefined strings in manpages.Anthony J. Bentley
Predefined strings are not very portable across troff implementations, and they make the source much harder to read. Usually the intended character can be written directly. No output changes, except for two instances where the incorrect escape was used in the first place. tweaks + ok schwarze@
2015-02-27Be clear that when tv_nsec is set to UTIME_*, tv_sec is ignored.Todd C. Miller
OK guenther@
2015-02-26Prefix function parameter names with underscores in tls.h, since this makesJoel Sing
them guaranteed to not conflict per POSIX. ok espie@ guenther@
2015-02-25Fix CVE-2014-3570: properly calculate the square of a BIGNUM value.Brent Cook
See https://www.openssl.org/news/secadv_20150108.txt for a more detailed discussion. Original OpenSSL patch here: https://github.com/openssl/openssl/commit/a7a44ba55cb4f884c6bc9ceac90072dea38e66d0 The regression test is modified a little for KNF. ok miod@
2012-10-13import OpenSSL-1.0.1cDamien Miller
2015-02-25Fix CVE-2015-0205: Do not accept client authentication with Diffie-HellmanBrent Cook
certificates without requiring a CertificateVerify message. From OpenSSL commit: https://github.com/openssl/openssl/commit/1421e0c584ae9120ca1b88098f13d6d2e90b83a3 Thanks to Karthikeyan Bhargavan for reporting this. ok miod@
2015-02-24we don't let strtonum errors bleed through now.Ted Unangst
2015-02-24Set errno to EINVAL, instead of letting ERANGE escape out.Ted Unangst
Printing strerror() in that case will say result too large, even if rounds is actually too small. invalid is less specific, but less incorrect. ok millert
2015-02-23Convert a table unsupported by mandoc to a columnated list.Anthony J. Bentley
While here, correctly mark up time_t as a variable type and use prettier double quotes. ok schwarze@
2015-02-23fourth batch of perlpod(1) to mdoc(7) conversionIngo Schwarze
2015-02-22Bump libcrypto and libssl majors, due to various recent churn.Joel Sing
Discussed with/requested by deraadt@ at the conclusion of s2k15.
2015-02-22Reluctantly add server-side support for TLS_FALLBACK_SCSV.Joel Sing
This allows for clients that willingly choose to perform a downgrade and attempt to establish a second connection at a lower protocol after the previous attempt unexpectedly failed, to be notified and have the second connection aborted, if the server does in fact support a higher protocol. TLS has perfectly good version negotiation and client-side fallback is dangerous. Despite this, in order to maintain maximum compatability with broken web servers, most mainstream browsers implement this. Furthermore, TLS_FALLBACK_SCSV only works if both the client and server support it and there is effectively no way to tell if this is the case, unless you control both ends. Unfortunately, various auditors and vulnerability scanners (including certain online assessment websites) consider the presence of a not yet standardised feature to be important for security, even if the clients do not perform client-side downgrade or the server only supports current TLS protocols. Diff is loosely based on OpenSSL with some inspiration from BoringSSL. Discussed with beck@ and miod@. ok bcook@
2015-02-22There is not much point constructing an SSL_CIPHER, then callingJoel Sing
ssl3_cipher_get_value() to get the cipher suite value that we just put in the struct - use the cipher suite value directly.
2015-02-22Remove IMPLEMENT_STACK_OF noops.Joel Sing
2015-02-22Bump libtls major due to symbol removal.Joel Sing
2015-02-22Rename tls_config_insecure_noverifyhost() toJoel Sing
tls_config_insecure_noverifyname(), so that it is more accurate and keeps inline with the distinction between DNS hostname and server name. Requested by tedu@ during s2k15.
2015-02-22Check return values when setting dheparams and ecdhecurve for the defaultJoel Sing
configuration.
2015-02-22In the interests of being secure by default, make the default TLS ciphersJoel Sing
be those that are TLSv1.2 with AEAD and PFS. Provide a "compat" mode that allows the previous default ciphers to be selected. Discussed with tedu@ during s2k15.
2015-02-21explain how tls_accept_socket works.Ted Unangst
2015-02-21tls_config_set_protocols is really void. Greg Martin.Ted Unangst
2015-02-21fill out docs a bit more, notably the read/write again behaviors.Ted Unangst
ok jsing
2015-02-21update siphash manpages to reflect change in return type spelling.Ted Unangst
ok dlg
2015-02-20Use standard spelling for types, and rename local variable from "free".Ted Unangst
No actual change, but makes it easier to reuse the code elsewhere. Suggested by Andre Smagin
2015-02-19If BN_rand() or BN_pseudo_rand() are called with a NULL rnd argument,Joel Sing
BN_bin2bn() will helpfully allocate a BN which is then leaked. Avoid this by explicitly checking for NULL at the start of the bnrand() function. Fixes Coverity ID 78831. ok miod@
2015-02-17Memory leak in error path. Coverity CID 78822.Miod Vallat
ok doug@
2015-02-16Amend documentation for AI_ADDRCONFIGJeremie Courreges-Anglas
ok jmc@
2015-02-16sprinkle braces around multi line statementsTed Unangst
2015-02-16pull scopes without conditionals up into enclosing blockTed Unangst
2015-02-16knf indents to give me a fighting chance at differentiating new blocksTed Unangst
from continuation lines, of which there are many
2015-02-16drop an ansi bomb on the function definitionsTed Unangst
2015-02-16third batch of perlpod(1) to mdoc(7) conversionIngo Schwarze
2015-02-16redundant though it may be, recv() is unlikely to be removed in a futureTed Unangst
release. ok millert
2015-02-16Drop yet another hook for ':' char in midi device names.Alexandre Ratchov
2015-02-16Remove backward compat bits to support for ':' character in sndioAlexandre Ratchov
device names. Remove wrong comments.
2015-02-15Avoid calling BN_CTX_end() on a context that wasn't started.Doug Hogan
In dsa_builtin_paramgen(), if BN_MONT_CTX_new() fails, the BN_CTX_new() call above it will have allocated a ctx without calling BN_CTX_start() on it. The error handling calls BN_CTX_end() when ctx is allocated. Move the BN_MONT_CTX_new() call up so it will fail first without splitting up the BN_CTX_new() and BN_CTX_start(). tweak + ok miod@, ok bcook@
2015-02-15Use "In" to mark up include files, instead of wrongly wrapping with Aq.Anthony J. Bentley
Aq is not the same as <> in non-ASCII situations, so this caused incorrect output in some places. And it provided no semantics besides. ok schwarze@
2015-02-15RegenMiod Vallat
2015-02-15s/tls_load_keys/tls_load_file/Joel Sing
2015-02-15Document tls_config_parse_protocols() and update documentation forJoel Sing
tls_config_set_protocols().
2015-02-15Teach monitor_mode() that the return code for unknown ioctl requests wasStuart Henderson
changed from EINVAL to ENOTTY in sys/net/if_media.c r1.19; it should just indicate that monitor mode is not available, rather than return a general error. ok dcoppa jca
2015-02-15If we decide to discard the provided seed buffer because its size is notMiod Vallat
large enough, do it correctly so that the local seed buffer on the stack gets properly initialized in the first iteration of the loop. While there, remove an outdated and bogus comment. Coverity CID 21785 ok doug@ jsing@