summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/hcreate.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2015-09-30Remove support for NO_ASN1_TYPEDEFS.doug2-42/+2
This ifdef was introduced 15 years ago and was known to cause problems with STACK_OF() back then. ok jsing@, beck@, jca@
2015-09-29convert "last_time" to a time_t, to handle beyond Y2038deraadt2-14/+14
ok guenther miod
2015-09-29Replace remaining M_ASN1_BIT_STRING_(new|free) macros with calls tojsing6-18/+18
ASN1_BIT_STRING_(new|free). ok beck@ doug@
2015-09-29Instead of declaring a union in multiple places, move it to tls_internal.h.jsing3-15/+14
ok deraadt@
2015-09-29clean some ugly intendation wartsderaadt5-12/+21
2015-09-29Add an rfc5280 test suite to test x509_cmp_time.beck2-2/+362
Note some of these will yet fail with the current libcrypto as the current X509_cmp_time is not RFC5280 compliant ok jsing@
2015-09-29Fix sha2 regression test for libcrypto.doug1-2/+2
By default, "openssl sha" used SHA-0. However, it was possible to use the form "openssl sha -sha256" to run SHA-256 instead. The regression test used this form. Since we removed SHA-0 support, the regress tests should now call "openssl <digest>". ok guenther@, bcook@
2015-09-28remove excessive brackets on pointer mathderaadt2-16/+16
2015-09-28Explicit NULL checks and style(9) tweaks.jsing1-7/+7
2015-09-27Redo 1.25, without the NULL deref.miod2-44/+62
ok sthen@ bcook@
2015-09-27check if openssl(1) actually works before proceedingbcook1-0/+2
It was possible for this test to pass even if the openssl command itself was missing.
2015-09-27bump to 2.3.1bcook2-6/+6
2015-09-26Use ASN1_item_dup() instead of ASN1_dup().jsing4-14/+10
ok bcook@
2015-09-26lint is dead: delete useless LINTLIBRARY commentsguenther2-4/+2
ok millert@
2015-09-26We don't need no stinking "EXAMPLE OF THE DSA" or README (the credits arejsing4-252/+0
already in the code). ok beck@ miod@
2015-09-25Add DER encoding/decoding coverage for ASN.1 GENERALIZEDTIME and UTCTIME.jsing1-39/+158
2015-09-25Add initial regress tests for ASN.1 times.jsing3-1/+372
2015-09-25avoid trailing .Ns, reduce .Xo and .Sm, drop redundant .Bkschwarze1-12/+4
2015-09-22typos in documentation; better wording, suggested by jmc@libressl-v2.3.0sobrado51-88/+88
ok jmc@
2015-09-21add a missing NULL checkbcook1-1/+5
noted by Bill Parker (dogbert2) on github
2015-09-21add a couple of missing NULL checksbcook1-3/+3
noted by Bill Parker (dogbert2) on github
2015-09-21remove vestigial bits of sha-0 and md2 from openssl(1)bcook5-23/+17
Noted by kinichiro on github. We probably need a better way to indicate the list of message digests that are allowed, as the current ones are nowhere near exhaustive (sigh - guenther@) OK guenther@ jmc@
2015-09-20Pack the algorithm numbers, to avoid printing a useless (null) 0 0 0 0miod1-34/+34
line in the summary.
2015-09-19Don't wrap initialized variables: binutils appears to be mishandling themguenther1-1/+3
on arm and m88k problems with optind observed by jsg@
2015-09-18avoid void * pointer arithmeticbcook2-4/+4
ok miod@
2015-09-18Revert bn_print.c:r1.25 ("handle negative-zero in BN_bn2dec() too") forsthen2-62/+44
now, it has a NULL deref. Segfault reported by Mikolaj Kucharski, ok bcook
2015-09-17Remove more EVP_sha() SHA-0 references.bcook3-6/+5
2015-09-17Re-add missing comma from SHA-0 removal which breaks mlinks generation.sthen2-2/+2
Worked out by bcook@
2015-09-17include stdint.h for uint64_tbcook2-2/+4
noted by Bernard Spil
2015-09-16Zap RANDFILE.lteo2-5/+3
2015-09-14tweak previous;jmc1-2/+2
2015-09-14Provide tls_config_insecure_noverifytime() in order to be able to disablejsing6-6/+29
certificate validity checking. ok beck@
2015-09-14Add support for disabling certificate and CRL validity checking.jsing4-22/+30
Loosely based on changes in OpenSSL. ok beck@
2015-09-14delete bogus trailing .Ns from SYNOPSIS .Ft macrosschwarze2-12/+12
2015-09-14fix formatting by adding the required quotes to .Fa in the SYNOPSISschwarze4-22/+22
2015-09-14Remove useless quoting from .Fo and .Fn function names, to preventschwarze3-10/+10
development of a cargo cult in case people look at existing files for examples. This achieves a consistent .Fo and .Fn quoting style across the whole tree.
2015-09-14some conn_version and conn_cipher bits;jmc2-9/+10
2015-09-14Only two of the *rand48.c files need <math.h>, so just #include it in themguenther3-4/+5
2015-09-14use .Va for global variables, and .Vt where the type is includedschwarze1-4/+3
2015-09-14Expose EOF without close-notify via tls_close().jsing2-6/+14
Make tls_read(3)/tls_write(3) follow read(2)/write(2) like semantics and return 0 on EOF with and without close-notify. However, if we saw an EOF from the underlying file descriptors without getting a close-notify, save this and make it visible when tls_close(3) is called. This keeps the semantics we want, but makes it possible to detect truncation at higher layers, if necessary. ok beck@ guenther@
2015-09-14Return an error if tls_handshake() or tls_close() is called on a contextjsing1-2/+13
for which they are not valid operations. ok beck@
2015-09-14add missing function return typesschwarze1-2/+3
2015-09-14Wrap <ifaddrs.h>, <netinet/in.h>, and <netinet/if_ether.h> so internalguenther3-3/+7
calls go direct and all the symbols are weak
2015-09-14Wrap <net/if.h> and <net/if_dl.h> so internal calls go direct and all theguenther2-2/+4
symbols are weak
2015-09-14Remove cast of int* to int*guenther1-2/+2
2015-09-14Finish wrapping <netdb.h> so that calls go direct and the symbols are all weakguenther9-9/+24
2015-09-14Test the exported strsignal() API, not the (now hidden) internal APIguenther1-8/+2
noted by daniel@
2015-09-14Temporarily revive MD4 for MS CHAP support.doug35-59/+1505
2015-09-13Crank major version due to removal of SHA-0 and MD4 from libcrypto.doug5-10/+10
2015-09-13Remove MD4 support from LibreSSL.doug35-1504/+58
MD4 should have been removed a long time ago. Also, RFC 6150 moved it to historic in 2011. Rides the major crank from removing SHA-0. Discussed with many including beck@, millert@, djm@, sthen@ ok jsing@, input + ok bcook@