summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/posix_pty.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2014-05-16Include openssl/evp.h for OPENSSL_add_all_algorithms_noconf().jsing1-0/+1
From Brent Cook.
2014-05-16Fix various issues that result in compiler warnings.jsing1-13/+14
Prompted by a diff from Brent Cook.
2014-05-16When OPENSSL_LOAD_CONF was added it ended up with more #if 0 code,jsing7-190/+30
more #ifdefs and a new source file that contains a single function. Nuke the #if 0 code that is now a macro and move the single function in evp_acnf.c to c_all.c, which is where the other code lives. While here, tidy evp.h slightly, remove an unnecessary #ifdef __OpenBSD__ and nuke a comment that is now a lie. ok miod@
2014-05-16use $2b in the bcrypt example, ok tedusthen1-3/+3
2014-05-15Fix memory leaks upon failure.miod4-54/+78
ok beck@
2014-05-15Replace ASN1_GENERALIZEDTIME_adj(), ASN1_UTCTIME_adj() andmiod6-50/+146
ASN1_TIME_to_generalizedtime() with wrappers around their former implementations, making sure memory allocated is freed in all failure cases. help and ok from beck@ and Brendan MacDonell.
2014-05-15No longer make pqueue.h a public (and installed) header file. Replace itsmiod7-6/+12
inclusion in <ssl/dtls1.h> by the benign `struct _pqueue; typedef struct _pqueue *pqueue;'. Note that said dtls1.h should probably be considered a private header as well... ok beck@
2014-05-15Get pqueue.h from the libssl sources rather than relying upon it beingmiod2-2/+4
installed.
2014-05-15More KNF.jsing8-14/+14
2014-05-15Add additional chacha20-poly1305 test vectors.jsing2-10/+620
Thanks to Piotr Sikora for providing a reference to the source.
2014-05-15Use C99 initialisers for the AEAD struct.jsing2-18/+18
2014-05-15Add chacha20-poly1305 test vector to regress.jsing2-5/+24
2014-05-15KNF.jsing2-140/+134
2014-05-15Add a ChaCha20-Poly1305 AEAD EVP implementation to libcrypto, from Adamjsing7-2/+546
Langley's Chromium OpenSSL patches. ok miod@
2014-05-15KNF.jsing12-613/+736
2014-05-15Add a regress test for AEAD, based on Adam Langley's code.jsing3-0/+413
2014-05-15Add an AEAD EVP interface to libcrypto, along with AES-GCM AEADjsing11-68/+1100
implementations. This largely pulls in Adam Langley's AEAD patches from Chromium's OpenSSL. ok miod@
2014-05-15Stop being a dummy... presumably these are left overs from pedantic modejsing18-44/+4
that were not wrapped with #if PEDANTIC. ok miod@
2014-05-14stop flushing streams in abort(). it's hackish and unsafe, and no longertedu2-21/+13
required. try to document this fact and some of the history. with feedback from deraadt guenther millert
2014-05-14Add poly1305 to libcrypto utilising Andrew Moon's public domainjsing10-2/+877
implementation. ok miod@
2014-05-12Remove AES_bi_ige_encrypt() from libcrypto. This routine is supposed to usemiod5-366/+0
two keys and four IVs to do much magic, is specified as such with test vectors, but the implementation actually always uses the first key, and the test vectors were computed with it, so they are wrong. Fixing the code to match the intended specification would break interoperability with existing code (assuming such code would exist), so it is better to remove this interface, which is obviously too complex for mere mortals if even its author can not implement it correctly. Riding on the libcrypto major bump.
2014-05-12Bring back ASN1_seq_pack(), ASN1_seq_unpack(), ASN1_pack_string() andmiod6-0/+430
ASN1_unpack_string() from the NO_ASN1_OLD purge; turns out that some Ruby extensions still use them, unfortunately, so we need to give them some more time to catch up on ``recent'' interfaces. Riding on the libcrypto major bump.
2014-05-12Move the `pqueue' part of libcrypto, which is a glorified sorted linked listmiod12-62/+40
of 64-bit data, and only used by DTLS, to libssl where it belongs. Remove pqueue_print() which is a debugging interface and serves no useful purpose, except for the regress test, which grows its own pqueue_print() routine. Bump libcrypto major and libssl minor. WARNING: do not update your tree right now, more changes are coming, which will ride the libcrypto major bump.
2014-05-12remove md5crypt.tedu5-195/+65
while changing things, add a crypt_checkpass wrapper that handles most of the edge cases. (not quite ready for production, though.) ok deraadt
2014-05-12change to having four freelists per size, to reduce another source oftedu1-16/+20
deterministic behavior. four selected because it's more than three, less than five. i.e., no particular reason.
2014-05-11More KNF.jsing10-32/+54
2014-05-11KNF.jsing4-644/+574
2014-05-10fix MALLOC_STATS code that was broken in rev 1.159, not compiled in by defaultotto1-2/+2
2014-05-10__bounded => __attribute__((__bounded__djm2-10/+10
2014-05-09Typo in C99 field initializer introduced in r1.3;miod2-2/+2
reported by Steven Chamberlain
2014-05-09Replace Apache v2 license with ISC license.matthew8-100/+100
Thanks to Google for agreeing to offer the code under more agreeable licensing terms!
2014-05-09Add a bit more detail about dot notation from the old inet(3) manpage.guenther1-3/+11
ok jmc@
2014-05-08move reallocarray() to a seperate file so that -portable applicationsderaadt3-18/+46
can avoid reinventing the wheel ok guenther schwarze
2014-05-08Replace hand-crafted STRICT_ALIGNMENT with system provided __STRICT_ALIGNMENT.miod2-34/+14
Forgotten during yesterday's STRICT_ALIGNMENT cleanup commit.
2014-05-08More KNF.jsing22-90/+188
2014-05-08KNF.jsing24-616/+766
2014-05-08Remove KSSL debug code.jsing2-42/+0
"fire bomb" tedu@
2014-05-08KNF.jsing14-1824/+1834
2014-05-08Nuke OPENSSL_FIPS - having #ifdefs inside a #ifndef for the same thingjsing4-36/+0
is amusing. ok deraadt@
2014-05-08KNF.jsing32-2998/+3088
2014-05-08knfectomie.jsing2-1306/+1636
2014-05-08Emergency knfectomie requested by tedu@.jsing60-12266/+13236
2014-05-08kill some more VMS ifdefsgiovanni8-32/+0
ok miod@
2014-05-07Get __STRICT_ALIGNMENT from <machine/endian.h> and decide upon it, rathermiod18-70/+52
than defining it for not (i386 and amd64 (and sometimes s390)) only. Compile-time tests remain compile-time tests, and runtime-test remain runtime-test instead of being converted to compile-time tests, per matthew@'s explicit demand (rationale: this makes sure the compiler checks your code even if you won't run it). No functional change except on s390 (which we don't run on) and vax (which we run on, but noone cares about) ok matthew@
2014-05-07less than jpaketedu4-317/+4
2014-05-07don't free memory unless we allocated it.tedu2-4/+8
reported to openssl by David Ramos (rt 3338) stealing commit from logan, who's run away. ok miod.
2014-05-07with the first bug it uncovered fixed, clear all bignums again.tedu2-34/+18
i've never worked on codebase so resistant to efforts to improve it.
2014-05-07in BN_clear_free, don't cleanse the data if the static data flag is set.tedu2-6/+4
much debugging work done by otto. ok miod otto. side note: BN_FLG_STATIC_DATA doesn't actually mean the data is static. it's also used to indicate the data may be secretly shared behind your back as a sort of poor man's refcounting, but without the refcounting.
2014-05-07comment style fixhalex1-2/+3
ok crickets@
2014-05-07KNF.jsing28-1888/+1968