summaryrefslogtreecommitdiffstats
path: root/lib/libcxx/src/algorithm.cpp (unfollow)
Commit message (Collapse)AuthorFilesLines
2016-11-03Support for key removal and value update operationsmikeb2-30/+87
This change makes it possible for the Host to update the value of an existing key via a Set operation as well as to remove the key completely with a Delete message.
2016-11-03Missing local.ajacoutot1-2/+2
2016-11-03Add a proper annotation for portroach documentation linkdanj1-3/+3
OK schwarze@
2016-11-03Re-add the Xr macro to syspatch now that it's hooked up.ajacoutot1-4/+3
2016-11-03Hook up syspatch(8).ajacoutot1-4/+4
expectations elevation encouragement from deraadt@
2016-11-03In ssl3_read_bytes(), do not process more than three consecutive TLSjsing1-4/+24
records, otherwise a peer can potentially cause us to loop indefinately. Return with an SSL_ERROR_WANT_READ instead, so that the caller can choose when they want to handle further processing for this connection. ok beck@ miod@
2016-11-03rollback -> revert where it makes sense.ajacoutot2-7/+7
2016-11-03make OCSP_URL only show up when an OCSP url is actually present in the certbeck1-2/+3
2016-11-03XXX match with installed sets (comp, x...)?ajacoutot1-1/+2
2016-11-03Make OCSP Stapling: only appear if there is stapling info present.beck1-5/+3
2016-11-03convert RAND manuals from pod to mdocschwarze11-196/+204
2016-11-03Hardlinks are properly handled; for the rest, we'll see if we need to careajacoutot1-3/+2
or not (XXX).
2016-11-03zap the overview manual page of the RAND subsystemschwarze2-36/+1
that contained nothing but duplicate and misleading information; OK jsing@
2016-11-03convert PEM and PKCS manuals from pod to mdocschwarze27-1380/+2231
2016-11-03Fix debug message to print the presence of more flag correctly.rzalamena1-3/+3
ok mikeb@
2016-11-03Add locks to key-value pair poolsmikeb1-7/+37
We need to ensure list and data consistency during concurrent accesses since the interrupt handler is not executed under the kernel lock and may add or modify entries while userland process is reading the value or traversing the list.
2016-11-03switch to using BUILDUSER and add more error checkingrobert1-33/+61
2016-11-03Make sure PATCH_PATH is an URL that ftp(1) can cope with.ajacoutot1-5/+2
2016-11-03Merge ls_avail() into ls_missing(), it's only used once.ajacoutot1-12/+8
While here, cope with a missing index.txt or other ftp(1) error.
2016-11-03Identify as an OSPlatformID 131 with a kernel version of 6mikeb1-6/+6
2016-11-03Document the KVP interfacemikeb1-3/+26
2016-11-03Split ssl3_get_key_exchange() into separate functions for DHE/ECDHE.jsing1-205/+256
ok beck@ (who was struggling to keep lunch down while reviewing the diff)
2016-11-03Implement a Key-Value Pair exchange interfacemikeb2-8/+557
The implemented abstraction allows us to query and set little endian UTF-16 keys exchanged between the Host and the Guest via a text based pvbus(4) interface. All keys are attached to one of several key pools: Auto, Guest, External or Guest/Parameters. The hostctl(8) is able to modify values for keys in the Auto pool as well as set new keys in the Guest pool while the Host provides its keys in External and Guest/Parameters pools. Discussed with reyk@
2016-11-03Don't do OCSP validation when we have disabled certificate verificationbeck2-5/+8
or certificate validation. ok jsing@
2016-11-03Use hw.ncpufound.ajacoutot1-3/+2
2016-11-03Simplify for loops; prompted by a comment from rpe@ajacoutot1-10/+7
2016-11-03Let Integrated Components allocate the receive buffer themselvesmikeb1-24/+52
since they have a better clue how to size it. While here, cleanup the kernel output a bit.
2016-11-03convert configuration manuals from pod to mdocschwarze9-305/+340
2016-11-03convert remaining ASN1 object manuals from pod to mdocschwarze5-175/+299
2016-11-03Also ignore --no-undefined (we already ignore -no-undefined) which isajacoutot1-1/+2
starting to show up more and more. ok jasper@
2016-11-03Only set an error from libssl related code, if an error has not alreadyjsing2-7/+47
been set by libtls code. This avoids the situation where a libtls callback has set an error, only to have it replaced by a less useful libssl based error. ok beck@
2016-11-03convert HMAC and MD5 manuals from pod to mdocschwarze5-210/+393
2016-11-03convert EVP manuals from pod to mdocschwarze49-2724/+4229
2016-11-03Always call if_put() during the interface iteration on port status multipartrzalamena1-2/+3
reply to avoid reference leaks. ok mikeb@
2016-11-03The networking code no longer runs off software interrupts.mpi1-10/+1
2016-11-03Fix handshake failures:beck1-20/+26
split out internals of OCSP verification to allow callback to verify before TLS handshake is complete
2016-11-03Clean up the TLS handshake digest handling - this refactors some of thejsing2-30/+43
code for improved readability, however it also address two issues. The first of these is a hard-to-hit double free that will occur if EVP_DigestInit_ex() fails. To avoid this and to be more robust, ensure that tls1_digest_cached_records() either completes successfully and sets up all of the necessary digests, or it cleans up and frees everything that was allocated. The second issue is that EVP_DigestUpdate() can fail - detect and handle this in tls1_finish_mac() and change the return type to an int so that a failure can be propagated to the caller (the callers still need to be fixed to handle this, in a later diff). The double-free was reported by Matthew Dillon. ok beck@ doug@ miod@
2016-11-02syncsthen1-1/+1
2016-11-02Add Windows 10 VMBus protocol versionmikeb1-0/+2
2016-11-02Inline the macro that is used only oncemikeb1-5/+5
2016-11-02when CONSPEED moved from libsa.h to Makefile it lost a leading '1',jasper1-2/+2
reinstate the original of 115200 spotted by brad
2016-11-02Fixup a wait channel used during VMBus channel discoverymikeb1-3/+3
Clang static analyser has found that a tsleep was using an uninitialised pointer value as a wait channel. An associated wakeup wasn't doing the right thing either.
2016-11-02bit more cleanup;jmc1-9/+9
2016-11-02Be verbose when reverting a patch.ajacoutot1-1/+2
committing now to please espie@
2016-11-02fix shadow declaration of time in parameter list.beck1-2/+2
ok jsing@
2016-11-02Ensure handshake is complete before processing an ocsp response for a ctxbeck1-0/+3
ok jsing@
2016-11-02tweak previous;jmc1-32/+26
2016-11-02convert ERR manuals from pod to mdoc; while reading this,schwarze23-705/+963
i wtfed, laughed, puked, and cried in more or less that order...
2016-11-02bump minor for ocsp api additionsbeck1-1/+1
2016-11-02Add OCSP client side support to libtls.beck8-9/+641
- Provide access to certificate OCSP URL - Provide ability to check a raw OCSP reply against an established TLS ctx - Check and validate OCSP stapling info in the TLS handshake if a stapled OCSP response is provided.` Add example code to show OCSP URL and stapled info into netcat. ok jsing@