summaryrefslogtreecommitdiff
path: root/lib
AgeCommit message (Collapse)Author
2015-03-21according to javad kouhi, freebsd pr #198612, vfork appeared first in bsd 3.0;Jason McIntyre
thanks sobrado for verifying (and okaying this)
2015-03-21free the server certificate in tls_connect_fds(); fixes a memory leak withStuart Henderson
repeated use of tls_connect. ok jsing
2015-03-21Fix indentation that incorrectly implies a different control flow.Doug Hogan
The actual control flow is intentional while the indenting is incorrect. This is intended to be a cosmetic change. Verified that each of these was part of a KNF commit that wasn't intending to change behavior. Also, double checked against the history of changes in OpenSSL and BoringSSL. Addresses Coverity CIDs: 78842, 78859, 78863. ok tedu@
2015-03-20Fix a memory leak in an error path.Doug Hogan
From OpenSSL commit 5e5d53d341fd9a9b9cc0a58eb3690832ca7a511f. ok guenther@, logan@
2015-03-19zap #if 0'd code that's been dead since '96Alexander Hall
ok todd@
2015-03-19Provide #defines for the mutex types as required by POSIX. Pointed out byMark Kettenis
guenther@ and found out the hard way by landry@ ok guenther@
2015-03-19Fix several crash causing defects from OpenSSL.Ted Unangst
These include: CVE-2015-0209 - Use After Free following d2i_ECPrivatekey error CVE-2015-0286 - Segmentation fault in ASN1_TYPE_cmp CVE-2015-0287 - ASN.1 structure reuse memory corruption CVE-2015-0289 - PKCS7 NULL pointer dereferences Several other issues did not apply or were already fixed. Refer to https://www.openssl.org/news/secadv_20150319.txt joint work with beck, doug, guenther, jsing, miod
2015-03-19better wording, from andre smagin; ok stspJason McIntyre
2015-03-18Rework the virtual memory layout on SRMMU systems (sun4d/sun4m) to use a muchMiod Vallat
lower VM_MIN_KERNEL_ADDRESS, since these systems are not crippled by the Sun-4 MMU hole and have the real 4GB of address space. Kernels running on Sun-4 MMU are not affected and will still be restricted to the existing 128MB of kernel space, with 1GB - 128MB of user space. Kernels running on SRMMU will now provide the low 3GB of address space to userland, and use the top 1GB for the kernel, except when compiled with option SMALL_KERNEL, in which case they will keep Sun-4 style the layout (this is temporary to allow for people to boot bsd.rd to upgrade even when not running 2.10 boot blocks, and will be removed eventually) A consequence of this is that the top of the userland stack is no longer at 0xf0000000. But since nothing in userland uses USRSTACK anymore, this should not be an issue. Tested on sun4c and various sun4m, with physical memory sizes ranging from 32 to 448MB.
2015-03-18use 4x buffer size for opendir. speeds up large directory reading, andTed Unangst
increased memory use is minimal. ok deraadt logan
2015-03-18In the neverending saga of enabling and disabling assembler code for shaMiod Vallat
routines on hppa, the cause for sha512-parisc subtly misbehaving has been found: despite having fallback pa1.1 code when running on a 32-bit cpu, the shift constants used in the sigma computations in sha512 are >= 32 and are silently truncated to 5 bits by the assembler, so there is no chance of getting this code to work on a non-pa2.0 processor. However, the pa1.1 fallback code for sha256 is safe, as it never attempts to shift by more than 31, so reenable it again.
2015-03-16Fix typoeJames Turner
2015-03-16Bump major to 29, regen .pc and header with new version infoJames Turner
2015-03-16Merge conflictsJames Turner
2015-03-16Update sqlite3 to 3.8.7.4. Changes available here: ↵James Turner
http://sqlite.org/changes.html#version_3_8_7_4 ok landry@
2015-03-15Avoid a NULL pointer deref when X509_get_pubkey() returns NULL.Doug Hogan
A NULL pointer could be dereferenced when X509_REQ_set_pubkey() calls X509_PUBKEY_set() with pktmp. OpenSSL says it's the fix for CVE-2015-0288, but there aren't any public details yet to confirm. Either way, we should fix this. Based on OpenSSL commit 28a00bcd8e318da18031b2ac8778c64147cd54f9 and BoringSSL commit 9d102ddbc0f6ed835ed12272a3d8a627d6a8e728. "looks sane" beck@ ok miod@, bcook@
2015-03-15tzfile.h is an internal header that should never have been installed.Todd C. Miller
What's worse, the tzfile.h that gets installed is over 20 years old and doesn't match the real tzfile.h in libc/time. This makes the tree safe for /usr/include/tzfile.h removal. The TM_YEAR_BASE define has been moved to time.h temporarily until its usage is replaced by 1900 in the tree. Actual removal of tzfile.h is pending a ports build. Based on a diff from deraadt@
2015-03-14TZ_MAX_CHARS in the old tzfile.h bears no resemblence to the actualTodd C. Miller
max time zone length used by libc/time. Just use PATH_MAX for now (since zone files are path names). This function is slated to be removed at the next libc major bump.
2015-03-14Do not reference tzfile.h since that is an internal header.Todd C. Miller
Be clear that "standard" byte order means big endian. Update struct ttinfo.
2015-03-14remove incorrect statement. the standard *does* require calloc to checkTed Unangst
for overflow. stop talking about old broken systems, there's little use for such info.
2015-03-13remove the first comma from constructs like ", and," and ", or,": you can useJason McIntyre
"and" and "or" to join sentence clauses, and you can use commas, but both hinders reading;
2015-03-13delete useless comment about Open GroupTheo de Raadt
2015-03-12_PERFPOLICY can also be set to "high"; it's "auto" not "automatic"; and the ↵Jason McIntyre
variable itself has bearing on _SETPERF; many thanks to theo buehler who both supplied a diff and corrected various issues with my diff;
2015-03-12Fix typo: nemb -> nmembLawrence Teo
From Ryan May.
2015-03-11document HW_PERFPOLICY; ok teduJason McIntyre
2015-03-11delay EVP_MD_CTX_init so we don't forget to clean it up.Ted Unangst
spotted by miod. ok miod.
2015-03-08Reject DH keys sent by a server if they are considered too small; inspiredMiod Vallat
by a similar BoringSSL change, but raising the limit to 1024 bits. ok jsing@ markus@ guenther@ deraadt@
2015-03-05Do not use sha512-parisc for now, as it is subtly bugged - passes the shaMiod Vallat
regress tests but causes tls ciphersuite using sha386 to fail; found the hard way by henning@. I can't see anything wrong in the generated assembly code yet, but building a libcrypto with no assembler code but sha512_block_data_order() is enough to trigger Henning's issue, so the bug lies there. No ABI change; ok deraadt@
2015-03-05Revert; committed by accident without approval from deraadt@ at releaseLawrence Teo
time. Prodded by guenther@. Sorry.
2015-03-05Fix typo, from Ryan May.Lawrence Teo
2015-03-03sort sections;Jason McIntyre
2015-03-03Fix variable name typo in IDIOMS.Kent R. Spillner
ok millert@
2015-03-02Update comment to match code; Caspar SchutijserTodd C. Miller
2015-03-02Document that POLLPRI and POLLRDBAND are set for out-of-band socketTodd C. Miller
data.
2015-03-02Document out-of-band data on a socket as an example of an exceptionalTodd C. Miller
condition.
2015-03-02Document when closefrom() was added to OpenBSD. OK bcook@Todd C. Miller
2015-03-02Note that closefrom is an extension.Brent Cook
suggested and ok reyk@
2015-03-02gethostbyname(3) would fail when more than 16 addrs/aliases were returned.Bryan Steele
Bump MAXADDRS/ALIASES to the original of 35, and silently ignore extras instead of failing. Noticed by markson on freenode. OK eric@ "with revised diff", phessler@.
2015-03-02Fix a minor information leak that was introduced in t1_lib.c r1.71, wherebyJoel Sing
an additional 28 bytes of .rodata (or .data) is provided to the network. In most cases this is a non-issue since the memory content is already public. Issue found and reported by Felix Groebert of the Google Security Team. ok bcook@ beck@
2015-02-28Reduce usage of predefined strings in manpages.Anthony J. Bentley
Predefined strings are not very portable across troff implementations, and they make the source much harder to read. Usually the intended character can be written directly. No output changes, except for two instances where the incorrect escape was used in the first place. tweaks + ok schwarze@
2015-02-27Be clear that when tv_nsec is set to UTIME_*, tv_sec is ignored.Todd C. Miller
OK guenther@
2015-02-26Prefix function parameter names with underscores in tls.h, since this makesJoel Sing
them guaranteed to not conflict per POSIX. ok espie@ guenther@
2015-02-25Fix CVE-2014-3570: properly calculate the square of a BIGNUM value.Brent Cook
See https://www.openssl.org/news/secadv_20150108.txt for a more detailed discussion. Original OpenSSL patch here: https://github.com/openssl/openssl/commit/a7a44ba55cb4f884c6bc9ceac90072dea38e66d0 The regression test is modified a little for KNF. ok miod@
2012-10-13import OpenSSL-1.0.1cDamien Miller
2015-02-25Fix CVE-2015-0205: Do not accept client authentication with Diffie-HellmanBrent Cook
certificates without requiring a CertificateVerify message. From OpenSSL commit: https://github.com/openssl/openssl/commit/1421e0c584ae9120ca1b88098f13d6d2e90b83a3 Thanks to Karthikeyan Bhargavan for reporting this. ok miod@
2015-02-24we don't let strtonum errors bleed through now.Ted Unangst
2015-02-24Set errno to EINVAL, instead of letting ERANGE escape out.Ted Unangst
Printing strerror() in that case will say result too large, even if rounds is actually too small. invalid is less specific, but less incorrect. ok millert
2015-02-23Convert a table unsupported by mandoc to a columnated list.Anthony J. Bentley
While here, correctly mark up time_t as a variable type and use prettier double quotes. ok schwarze@
2015-02-23fourth batch of perlpod(1) to mdoc(7) conversionIngo Schwarze
2015-02-22Bump libcrypto and libssl majors, due to various recent churn.Joel Sing
Discussed with/requested by deraadt@ at the conclusion of s2k15.