summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/reallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2023-04-15Prepare rsa.h for X9.31 support removaltb1-1/+5
This wraps the three public functions in the usual #if stanza. RSA_X931_PADDING is unfortunately exposed by rust-openssl and erlang. Therefore it will remain visible to avoid breaking the build of lang/rust. Its use in the library will be neutered shortly. ok jsing
2023-04-15Remove now unused GF2m perlasm generatorstb3-980/+0
2023-04-15Rename SHA3 context struct field from 'st' to 'state'.jsing2-15/+15
2023-04-15Rename SHA3 context to align with existing code.jsing2-14/+14
2023-04-15Move some defines out of the sha3_internal.h header.jsing2-10/+6
2023-04-15Stop building GF2m assemblytb3-8/+2
GF2m support will be removed shortly. In the interim drop some of this unused code already and let it fall back to the C implementation. ok jsing
2023-04-15Revise header guards.jsing1-4/+4
2023-04-15Pull constant tables out of sha3_keccakf().jsing1-24/+24
2023-04-15Strip and reformat comments.jsing2-44/+14
Remove various comments that are unhelpful or obvious. Reformat remaining comments per style(9).
2023-04-15Apply style(9) (first pass).jsing2-146/+152
2023-04-15Import sha3_internal.h.jsing1-2/+2
2023-04-15Add license to sha3 files.jsing2-0/+50
2023-04-15Import tiny_sha3jsing2-0/+238
This is a minimal and readable SHA3 implementation. ok tb@
2023-04-15ssltest: Drop more policy go from this test.tb1-357/+21
Hopefully that is all. What an absolutely horrid mess.
2023-04-15ssltest: initial pass of dropping proxy cert gootb1-89/+1
2023-04-15symbols test: drop LIBRESSL_INTERNALtb1-2/+1
This tests the external API, so it should not have visibility to the inside. Silences two warnings since EC_{GROUP,POINT}_clear_free() are now wrapped in #ifndef LIBRESSL_INTERNAL.
2023-04-14Drop policy printing from openssltb6-95/+6
Nothing really uses the policy tree. It's desgined with built-in DoS capabilities directly from the RFC. It will be removed from the attack surface and replaced with something equivalent that doesn't grow exponentially with the depth. This removes the only reason the policy tree itself ever leaked out of the library. ok jsing
2023-04-14cttest: plug leak due to missing SCT_LIST_free()tb1-1/+2
2023-04-14Plug a memleak caused by an extra bump of a refcounttb1-2/+1
SSL_set_session() should really be called SSL_set1_session()...
2023-04-14Cast the uint64_t SCT timestamps to (unsigned long long) for printing.tb1-3/+4
What a wonderful choice between this and that PRI ugliness...
2023-04-14Make the signertest work better with the portable test frameworktb2-14/+12
2023-04-14Make the apitest work better with the portable tets frameworktb2-13/+12
2023-04-14Make cttest work better with the portable test harnesstb2-9/+12
2023-04-14Fix cttest to use public headertb2-5/+3
2023-04-14Rename the largely misnamed bn_print.c to bn_convert.cjsing2-3/+3
This file primarily contains the various BN_bn2*() and BN_*2bn() functions (along with BN_print() and BN_options()). More function shuffling will follow. Discussed with tb@
2023-04-14Provide and use bn_copy_words() in BN_copy().jsing1-31/+15
This is simpler than the current code, while still being well optimised by compilers, across a range of architectures. In many cases we even get a performance gain for the BN sizes that we primarily care about. Joint work with tb@
2023-04-14Add support for truncated SHA512 variants.jsing2-2/+115
This adds support for SHA512/224 and SHA512/256, as specified in FIPS FIPS 180-4. These are truncated versions of the SHA512 hash. ok tb@
2023-04-14Provide soon to be used crypto_store_htobe32().jsing1-1/+20
ok tb@
2023-04-14Use memset() and only initialise non-zero struct members.jsing1-7/+7
ok tb@
2023-04-14Fix double free in error path in openssl(1) x509tb1-4/+2
A conversion from X509_REQ_get_pubkey() to X509_REQ_get0_pubkey() missed one free of pkey in an unlikely error path. After the conversion pkey is no longer owned by us, so we mustn't free it. ok jsing
2023-04-13The NBs have been duly noted and ignored. Drop them.tb2-20/+2
2023-04-13Zap trailing whitespacetb1-9/+9
2023-04-13Remove files that definitely contain no code anymoretb5-354/+0
(experts disagree whether they ever did)
2023-04-13Drop now useless files from the Makefiletb1-6/+1
2023-04-13Fold ECDSA sign and verify mess into ecs_ossl.ctb3-63/+68
discussed with jsing
2023-04-13Move RSA_generate_key() from rsa_depr.c to rsa_gen.ctb2-34/+35
Discussed with jsing
2023-04-13Move DSA_generate_parameters() from dsa_depr.c to dsa_gen.ctb2-21/+23
Discussed with jsing
2023-04-13Move DH_generate_parameters() from dh_depr.c to dh_gen.ctb2-20/+21
discussed with jsing
2023-04-13Fix compilation on sparc64.mbuhl1-2/+3
2023-04-13ec_lib.c: fix a few NULL misspellingstb1-6/+6
2023-04-13Fix various early return issues spotted by coveritytb1-13/+13
A large mechanical diff led to sloppy review and gave coverity an opportunity to be right for once. First time in a good many weeks. same diff/ok jsing
2023-04-13ectest: missing error checkingtb1-5/+11
CID 452228
2023-04-12remove duplicate linesjsg1-3/+2
2023-04-12Remove now unused sha_local.h.jsing1-419/+0
2023-04-12Provide and use crypto_ro{l,r}_u{32,64}().jsing3-25/+39
Various code in libcrypto needs bitwise rotation - rather than defining different versions across the code base, provide a common set that can be reused. Any sensible compiler optimises these to a single instruction where the architecture supports it, which means we can ditch the inline assembly. On the chance that we need to provide a platform specific versions, this follows the approach used in BN where a MD crypto_arch.h header could be added in the future, which would then provide more specific versions of these functions. ok tb@
2023-04-12Provide and use crypto_store_htobe64().jsing2-23/+43
It is common to need to store data in a specific endianness - rather than handrolling and deduplicating code to do this, provide a crypto_store_htobe64() function that converts from host endian to big endian, before storing the data to a location with unknown alignment. ok tb@
2023-04-11Handle BN_CTX at the EC API boundary.jsing11-491/+553
The EC API allows callers to optionally pass in a BN_CTX, which means that any code needing a BN_CTX has to check if one was provided, allocate one if not, then free it again. Rather than doing this dance throughout the EC code, handle the BN_CTX existance at the EC API boundary. This means that lower level implementation code can simply assume that the BN_CTX is available. ok tb@
2023-04-11Clean up unused BIGNUM.jsing1-4/+1
2023-04-11Document the RETURN VALUES of BIO_method_type(3) and BIO_method_name(3)schwarze14-28/+160
for the various BIO types.
2023-04-11Recommit jsing's r1.27 - portable is readytb1-23/+4
Use htobe64() instead of testing BYTE_ORDER and then handrolling htobe64(). Thanks to tobhe for providing most of the fix via openiked-portable