summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/labs.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2014-04-19Use somewhat harsher language and better examples; demonstrate thatderaadt4-109/+88
non-dangerous use functions is difficult. ok guenther
2014-04-19Split inet(3) into three pages by decade: 1980s -> inet_lnaof(3),guenther4-183/+320
1990s -> inet_addr(3), 2000s and beyond -> inet_ntop(3). ok tedu@ (who also noted the timeline) deraadt@ jmc@
2014-04-19egd is gonederaadt4-38/+3
2014-04-19The internal ssl2_* functions and variables are goneguenther2-60/+0
2014-04-19More KNF.jsing8-1370/+1522
2014-04-19Add SSL_OP_NO_TLSv1_1 and SSL_OP_NO_TLSv1_2guenther1-4/+13
Document that SSL_OP_NO_SSLv2 is a no-op now
2014-04-19More KNF and style consistency tweaksguenther53-479/+465
2014-04-19More KNF.jsing12-760/+942
2014-04-19More KNF.jsing12-726/+868
2014-04-19More KNF.jsing14-406/+414
2014-04-19use intrinsic strlcpy and strlcat everywhere so we only have one set ofbeck31-106/+106
funcitons to check for incorrect use. keep BUF_strlcpy and BUF_strlcat for API comptibility only. ok tedu@
2014-04-18OPENSSL_gmtime() is really just gmtime_r(); ok guentherderaadt10-26/+12
2014-04-18spacingtedu2-20/+22
2014-04-18remove references to rshd;jmc2-15/+6
2014-04-18tone down some XXXXX to not appear in greptedu5-5/+5
2014-04-18XXXXXXXXXXXXXXXX -> XXXtedu2-6/+6
XXXXXXXXXXXXXXXXXXXXXXX -> XXXX
2014-04-18unifdef NO_SOCKtedu8-16/+0
2014-04-18now that knf carpet bombing is finished, switch to hand to hand combat.tedu4-346/+332
still not sure what to make of mysteries like this: for (i = 7; i >= 0; i--) { /* increment */
2014-04-18Unsurprisingly, since <unistd.h> was so darn hard to find for OpenSSL developersbeck10-62/+8
they had resorted to manually protyping read(2) instead of incredible amount of preprocessor wizardry needed to find the ever illusive <unistd.h>. Let's just include <unistd.h> and we don't need to do this.. While we're at it flense out _OSD_POSIX and __DGJPP__ cruft. ok krw@
2014-04-18ECDSA signature computation involves a random number. Remove the test trying tomiod1-116/+0
force what RAND_bytes() will return and comparing it against known values - I can't let you do this, Dave.
2014-04-18collateral damagetedu1-0/+1
2014-04-18no app_rand.ctedu1-2/+2
2014-04-18$HOME/.rnd will never be a good source of entropy. ok becktedu23-392/+2
2014-04-18Do not ask the user to pass either -DB_ENDIAN or -DL_ENDIAN to the compiler,miod9-37/+37
but rather figure out the endianness from <machine/endian.h> automagically; help from guenther@ ok jca@ guenther@ beck@ and the rest of the `Buena SSL rampage club'
2014-04-18Shrink a local buffer to the size it really needs to be; this is the onlymiod2-2/+2
discrepancy found while checking proper {HEX,DECIMAL}_SIZE macro usage, which is confusing enough. tweaks and ok jca@, ok guenther@
2014-04-18eroMgib dne- nai 68xtnetelca .smiod2-14/+4
2014-04-18Not welcomemiod2-302/+0
2014-04-18typomiod2-2/+2
2014-04-18first round of static config. ok miodtedu26-1118/+0
2014-04-18Use the cleaned up asprintf-based make_config_name() to make the name oflteo2-18/+8
the config file instead of the malloc/BUF_strlcpy/BUF_strlcat calls with no return value checks (that make_config_name() also used to do prior to being cleaned up). ok beck@
2014-04-18Check the return value of make_config_name() before attempting to uselteo1-1/+6
the config filename. ok beck@
2014-04-18anothertedu1-3/+0
2014-04-18another "string to make the random number generator think it has entropy"tedu1-23/+0
2014-04-18delete "string to make the random number generator think it has entropy"tedu1-4/+0
2014-04-18Put back i2d_ASN1_SET() and d2i_ASN1_SET() from the NO_ASN1_OLD prune, as theremiod7-1/+518
are still some 3rd-party code using it, and fixing them is not trivial. As an excuse gift, the memory leaks on failure in resurrected a_set.c have been fixed.
2014-04-18this file is not relevantderaadt1-25/+0
2014-04-18guenther would prefer more separationtedu2-0/+4
2014-04-18we need to cranktedu2-2/+2
2014-04-18remove include files not neededderaadt4-34/+4
2014-04-18Document support for "openssl s_client -starttls lmtp"guenther1-1/+1
2014-04-18Finish zapping SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION usage; only keepguenther5-25/+19
the #define for compat, but document that it's a no-op now. Also, neuter the -legacy_renegotiation option to "openssl s_{client,server}" ok beck@
2014-04-18use the portable construct around asprintf; pointed out by halexderaadt3-3/+6
2014-04-18Some dude named Tavis Ormandy reported a bug which has gone unfixed.tedu2-0/+10
http://marc.info/?l=openssl-users&m=138014120223264&w=2 Arguably a doc bug, but we argue not. If you parse a new cert into memory occupied by a previously verified cert, the new cert will inherit that state, bypassing future verification checks. To avoid this, we will always start fresh with a new object. grudging ok from guenther, after i threatened to make him read the code yet again. "that ok was way more painful and tiring then it should have been"
2014-04-18since e_os.h is dead, and e_os2.h is installed, we can fetch from there.deraadt1-8/+2
This means we don't need the reach-around anymore.
2014-04-18Put the final pieces from e_os.h in the required places, and remove it.deraadt28-204/+9
"dance on it's grave" says beck ok guenther beck
2014-04-18blank lines between decls and codetedu2-0/+10
2014-04-18These files were never installed in the past, and are not generallyderaadt45-1465/+0
used. They can go away. ok guenther reyk
2014-04-18Use asprintf() for generating path, instead of multiplederaadt1-7/+1
return-value-not-checked strlcpy and strlcat
2014-04-18in CONF_get1_default_config_file(), don't calculate a buffer size,deraadt2-30/+10
malloc it, do unbounded strlcpy's to it... but instead of asnprintf. While there, let's put a '/' between the two path components! Wonder how old that bug is.. ok guenther
2014-04-18More KNF.jsing2-152/+160