vendor/libressl: upgrade from 3.2.3 to 3.2.4
authorDaniel Fojt <df@neosystem.org>
Wed, 17 Feb 2021 18:29:12 +0000 (19:29 +0100)
committerDaniel Fojt <df@neosystem.org>
Fri, 19 Feb 2021 10:56:53 +0000 (11:56 +0100)
commit2eb7d3b81ae617871ac1158372b5f1e8dde4ffba
tree02272858ebb854d9149ca25277b61539523fa65a
parentf18286592aa78dee55a73a5cee5927c90318afda
vendor/libressl: upgrade from 3.2.3 to 3.2.4

Bug and interoperability fixes:

 * Switch back to certificate verification code from LibreSSL 3.1.x. The
   new verifier is not bug compatible with the old verifier causing issues
   with applications expecting behavior of the old verifier.

 * Unbreak DTLS retransmissions for flights that include a CCS

 * Only check BIO_should_read() on read and BIO_should_write() on write

 * Implement autochain for the TLSv1.3 server

 * Use the legacy verifier for autochain

 * Implement exporter for TLSv1.3

 * Free alert_data and phh_data in tls13_record_layer_free()

 * Plug leak in x509_verify_chain_dup()

 * Free the policy tree in x509_vfy_check_policy()
15 files changed:
crypto/libressl/ChangeLog
crypto/libressl/VERSION
crypto/libressl/crypto/x509/x509_verify.c
crypto/libressl/crypto/x509/x509_vfy.c
crypto/libressl/crypto/x509/x509_vpm.c
crypto/libressl/include/openssl/opensslv.h
crypto/libressl/ssl/d1_both.c
crypto/libressl/ssl/ssl_both.c
crypto/libressl/ssl/ssl_lib.c
crypto/libressl/ssl/tls13_internal.h
crypto/libressl/ssl/tls13_key_schedule.c
crypto/libressl/ssl/tls13_legacy.c
crypto/libressl/ssl/tls13_lib.c
crypto/libressl/ssl/tls13_record_layer.c
crypto/libressl/ssl/tls13_server.c