summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/malloc.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2015-02-15Remove ancient gcc workaround on mips.miod1-3/+2
2015-02-15Memory leak. Coverity CID 78865miod1-2/+3
2015-02-15Wrong logic; Coverity CID 78894miod1-1/+1
2015-02-15If we decide to discard the provided seed buffer because its size is notmiod2-16/+12
large enough, do it correctly so that the local seed buffer on the stack gets properly initialized in the first iteration of the loop. While there, remove an outdated and bogus comment. Coverity CID 21785 ok doug@ jsing@
2015-02-15Check ASN1_OCTET_STRING_new() for failure. Coverity CID 78904miod2-12/+16
ok doug@
2015-02-15In ec_wNAF_mul(), move the declaration of tmp_wNAF higher in scope, so thatmiod2-12/+10
all the function's exit paths can make sure it gets freed. Coverity CID 78861 tweaks & ok doug@ jsing@
2015-02-15lsearch and lfind return void *tedu1-4/+4
2015-02-14Support for nc -T on IPv6 addresses.jca1-7/+16
ok sthen@
2015-02-14Remove asn1_ex_i2c() prototype, now that this function has been made static;miod2-4/+2
reminded by bcook@
2015-02-14Words read better when they are separated by spaces.miod2-2/+2
2015-02-141.18 would introduce a possible out-of-bounds access in the error path;miod2-14/+10
Coverity CID 105346 ok doug@
2015-02-14Remove DEBUG_PKCS5V2 code.miod2-50/+2
2015-02-14Unchecked allocations in x509_name_canon().miod2-2/+10
ok doug@ jsing@
2015-02-14Memory leak upon error in X509_add1_{trust,reject}_object.miod2-14/+46
ok doug@
2015-02-14Manually expand IMPLEMENT_EXTERN_ASN1 macro (the only occurence in crypto).jsing2-6/+20
Only change to generated assembly is due to line numbers.
2015-02-14Remove IMPLEMENT_COMPAT_ASN1() and related support code. Nothing uses it inmiod10-282/+14
libcrypto/libssl, and nothing seems to use it in the wild, apart from embedded copies of OpenSSL. ok jsing@
2015-02-14Make asn1_ex_i2c() static. ok jsing@miod2-4/+8
2015-02-14Memory leak in `should not happen' condition; Coverity CID 78889.miod2-8/+8
ok doug@ jsing@
2015-02-14Memory leak upon error; Coverity CID 78857miod2-2/+8
ok doug@ jsing@ CVy: Committing in .
2015-02-14Check i2d_name_canon() for failure (negative return). Coverity CID 78888.miod2-12/+16
ok doug@ jsing@
2015-02-14Possible NULL pointer dereferences. Coverity CID 21719, 21732.miod4-6/+14
ok doug@ jsing@
2015-02-14Potential NULL dereference in the error path; Coverity CID 21720miod2-4/+4
ok doug@ jsing@
2015-02-14Coverity CID 21733 (unchecked allocation), 78823 (leak on error).miod2-2/+12
ok doug@ jsing@
2015-02-14Check for allocation error in RSA_eay_mod_exp(). Coverity CID 25217.miod4-4/+14
ok jsing@
2015-02-14Memory leaks upon error. Coverity CID 78874.miod2-20/+20
ok jsing@
2015-02-14Fix tests that got incorrectly inverted with the BN_CTX_get() return checkjsing2-10/+10
diff. Spotted by miod@
2015-02-14Expand ASN1_CHOICE*, ASN1_SEQUENCE* and associated macros, making thejsing6-120/+832
data structures visible and easier to review, without having to wade through layers and layers of asn1t.h macros. Change has been scripted and there is no change to the generated assembly. Discussed with beck@ miod@ tedu@
2015-02-14Expand ASN1_CHOICE*, ASN1_SEQUENCE* and associated macros, making thejsing2-18/+106
data structures visible and easier to review, without having to wade through layers and layers of asn1t.h macros. Change has been scripted and there is no change to the generated assembly. Discussed with beck@ miod@ tedu@
2015-02-14Attempt to correctly free temporary storage upon error. With help frommiod2-30/+36
doug@ and jsing@, ok doug@ three months ago (sigh... I sometimes suck bigtime at commiting bugfixes)
2015-02-14second batch of perlpod(1) to mdoc(7) conversionschwarze23-924/+1381
2015-02-14While doing development work on pod2mdoc(1),schwarze11-534/+773
profit of the occasion to start the conversion of LibreSSL libcrypto manuals from perlpod(1) to mdoc(7). miod@ jmc@ bentley@ agreed to the process when shown this patch.
2015-02-14Spell NULL correctly, be explicit with NULL checks and it is also easier tojsing4-20/+12
initialise during declaration and drop the else statement. ok doug@ miod@
2015-02-14Fix pod markup error.miod1-1/+1
2015-02-14Try and fix a bunch of memory leaks upon error;miod6-24/+66
ok tedu@ about 7 months ago and I was sitting upon this diff for no reason
2015-02-14Consistently check the return value from BN_CTX_get() on assignment.jsing8-84/+88
This is the same as the previous larger commit, however it would seem the GOST part got missed. ok beck@ doug@
2015-02-13End sentences with dots.miod1-3/+3
2015-02-13Don't leak memory on errors - fixes coverity issues 105353 105253beck2-8/+18
ok guenther@ jsg@
2015-02-13fix leaking of bn, coverity issue 105351beck2-2/+4
ok doug@
2015-02-12prevent a crash with openssl asn1parse -genstr FORMATjsg2-2/+10
aka ASN1_generate_nconf("FORMAT", NULL) ok krw@ beck@ jsing@
2015-02-12bump minor for TLS_PROTOCOLS_ALL. OK jsing@reyk1-1/+1
2015-02-12Add a tls_config_parse_protocols() function that allows a protocols stringjsing2-2/+63
to be converted into a libtls protocols value. This allows for things like: "tlsv1.0,tlsv1.1" (TLSv1.0 and TLSv1.1) "all,!tlsv1.0" (all protocols except TLSv1.0) Discussed with tedu@ and reyk@
2015-02-12Fix handling of "legacy" mode for tls_config_set_dheparams().jsing1-2/+2
Found by reyk@
2015-02-12qsort() compare functions MUST use memcmp() instead of bcmp() to haveguenther1-2/+4
the correct return value. Prefer memcmp() anyway for portability. ok jsing@ tedu@
2015-02-12Change TLS_PROTOCOLS_DEFAULT to be TLSv1.2 only. Add a TLS_PROTOCOLS_ALLjsing1-2/+4
that includes all currently supported protocols (TLSv1.0, TLSv1.1 and TLSv1.2). Change all users of libtls to use TLS_PROTOCOLS_ALL so that they maintain existing behaviour. Discussed with tedu@ and reyk@.
2015-02-12If you do not support POSIX I/O then you're not tall enough to ride...jsing8-46/+8
ok tedu@
2015-02-12unifdef -m -UOPENSSL_NO_NEXTPROTONEG - NPN is being replaced with ALPN,jsing8-48/+8
however it is not likely to be removed any time soon. ok beck@ miod@
2015-02-12swap limits.h for sys/limits.hbcook1-1/+1
ok jsing@
2015-02-11use a width specifier for lists, and Sq rather than Dq for single lettersjmc1-3/+3
to avoid swamping it;
2015-02-11Provide a tls_connect_servername() function that has the same behaviourjsing4-6/+27
as tls_connect(), however allows the name to use for verification to be explicitly provided, rather than being inferred from the host value. Requested by reyk@ ok reyk@ tedu@
2015-02-11Be consistent with naming - only use "host" and "hostname" when referringjsing6-60/+61
to an actual host and use "servername" when referring to the name of the TLS server that we expect to be indentified in the server certificate. Likewise, rename verify_host to verify_name and use the term "name" throughout the verification code (rather than host or hostname). Requested by and ok tedu@