summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/reallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2018-02-13Add the missing RETURN VALUES section.schwarze1-5/+118
Mostly from Paul Yang via OpenSSL commit 1f13ad31 Dec 25 17:50:39 2017 +0800, tweaked by me for conciseness and accuracy.
2018-02-13Add the missing RETURN VALUES section, mostly from Paul Yangschwarze1-11/+38
via OpenSSL commit 1f13ad31 Dec 25 17:50:39 2017 +0800, but fixing two bugs in his description. This commit also includes a few minor improvements to the description of DES_fcrypt(3), also from OpenSSL, tweaked by me.
2018-02-13Correctly describe BN_get_word(3) and BN_set_word(3).schwarze1-20/+25
These functions constitute an obvious portability nightmare, but that's no excuse for incorrect documentation. Pointed out by Nicolas Schodet via OpenSSL commit b713c4ff Jan 22 14:41:09 2018 -0500.
2018-02-13Mention that BN_new(3) sets the value to zero;schwarze1-5/+6
from Hubert Kario <hkario at redhat dot com> via OpenSSL commit 681acb31 Sep 29 13:10:34 2017 +0200.
2018-02-13Delete duplicate .Nm entry in the NAME section,schwarze1-4/+4
from Rich Salz via OpenSSL commit 8162f6f5 Jun 9 17:02:59 2016 -0400. Merging the RETURN VALUES section really wouldn't make much sense here, it contains no additional information and i don't see any way to reorganize the content and make it better.
2018-02-13Add the missing RETURN VALUES section.schwarze1-14/+76
Triggered by OpenSSL commit 1f13ad31 Dec 25 17:50:39 2017 +0800 by Paul Yang, but reworded for intelligibility and precision. While here, also expand the description of the "ret" argument of BIO_callback_fn(). That's a fairly complicated and alarmingly powerful concept, but the description was so brief that is was barely comprehensible.
2018-02-12Add the missing RETURN VALUES section;schwarze1-3/+21
from Paul Yang via OpenSSL commit 1f13ad31 Dec 25 17:50:39 2017 +0800 with tweaks by me.
2018-02-12Add the missing RETURN VALUES section;schwarze1-3/+15
from Paul Yang via OpenSSL commit 1f13ad31 Dec 25 17:50:39 2017 +0800.
2018-02-12Add missing RETURN VALUES section.schwarze1-4/+15
From Paul Yang via OpenSSL commit 1f13ad31 Dec 25 17:50:39 2017 +0800 with one tweak.
2018-02-12Add the missing RETURN VALUES section and reorder the contentschwarze1-35/+93
accordingly. Make some statements more precise, and point out some dangerous traps in these ill-designed interfaces. Also do some minor polishing while here. Triggered by OpenSSL commit 1f13ad31 Dec 25 17:50:39 2017 +0800 by Paul Yang, but not using most of his wording because that is in part redundant, in part incomplete, and in part outright wrong.
2018-02-11Document three more functions recently made public by jsing@schwarze1-18/+185
as requested by jsing@, and also document six more related functions that have already been public before that. OpenSSL fails to document any of these.
2018-02-11typo in output string; from edgar pettijohnjmc1-2/+2
2018-02-11Merge documentation from OpenSSL for seven functionsschwarze1-7/+196
that jsing@ recently exposed publicly in libcrypto. Requested by jsing@.
2018-02-10Be more specific about when the session file will be updated.jsing1-2/+2
2018-02-10Bump TLS API version since we've added more functionality.jsing1-2/+2
2018-02-10Move the keypair pubkey hash handling code to during config.jsing4-69/+95
The keypair pubkey hash was being generated and set in the keypair when the TLS context was being configured. This code should not be messing around with the keypair contents, since it is part of the config (and not the context). Instead, generate the pubkey hash and store it in the keypair when the certificate is configured. This means that we are guaranteed to have the pubkey hash and as a side benefit, we identify bad certificate content when it is provided, instead of during the context configuration. ok beck@
2018-02-10Tidy/standardise some code.jsing1-6/+3
2018-02-10Remove NULL check from tls_conninfo_cert_pem() - all of the other conninfojsing1-3/+1
functions require the conninfo passed in to be non-NULL.
2018-02-10Document functions for client-side TLS session support.jsing2-9/+56
2018-02-10Add support to libtls for client-side TLS session resumption.jsing6-5/+195
A libtls client can specify a session file descriptor (a regular file with appropriate ownership and permissions) and libtls will manage reading and writing of session data across TLS handshakes. Discussed at length with deraadt@ and tedu@. Rides previous minor bump. ok beck@
2018-02-10Bump lib{crypto,ssl,tls} minors due to symbol addition.jsing3-3/+3
2018-02-10Expose X509_VERIFY_PARAM_* functions that appeared in the OpenSSL 1.0.2jsing2-1/+26
API and are now in use by various libraries and applications.
2018-02-08Update regress to use tlsext_serverhello_parse().jsing1-5/+3
2018-02-08Complete the TLS extension rewrite on the client-side.jsing4-156/+93
The RI logic gets pulled up into ssl3_get_server_hello() and ssl_parse_serverhello_tlsext() gets replaced by tlsext_client_parse(), which allows a CBS to be passed all the way down. This also deduplicates the tlsext_client_build() and tlsext_server_build() code. ok beck@
2018-02-08Convert option handling for openssl(1) genpkey.jsing1-110/+177
ok beck@ inoguchi@
2018-02-08Update regress to match change to tls_keypair_pubkey_hash().jsing1-3/+4
2018-02-08Have tls_keypair_pubkey_hash() call tls_keypair_load_cert() instead ofjsing3-14/+11
rolling its own certificate loading. This also means we get better error reporting on failure.
2018-02-08Add a regress test that covers libtls keypairs.jsing3-1/+248
2018-02-08Tweak compiler flags to include -DLIBRESSL_INTERNAL and make more warningsjsing1-2/+2
fatal.
2018-02-08Ensure that tls_keypair_clear() clears the OCSP staple and pubkey hash.jsing1-6/+5
2018-02-08Do not bother NULLing pointers in a struct that is about to be freed.jsing1-10/+1
2018-02-08Move tls_keypair_pubkey_hash() to the keypair file.jsing3-43/+43
2018-02-08Avoid a memory leak that results when the same tls_config is reused.jsing1-1/+4
Reported by and fix from Nate Bessette <openbsd at nate dot sh> - thanks.
2018-02-08Assert tedu's copyright since some of the code moved here is his.jsing1-1/+2
2018-02-08Split keypair handling out into its own file - it had already appearedjsing6-166/+215
in multiple locations. ok beck@
2018-02-07use consistent style for for loop in unmap(), no functional changeotto1-4/+2
2018-02-07Restore a check before BN_free() that needs to exist and write it such thatjsing1-2/+3
the intent is more obvious.
2018-02-07Nuke some more free NULL guards.jsing1-9/+5
2018-02-07Indent labels with a single space so that diff prototypes are more useful.jsing45-190/+190
2018-02-07Add more free functions for NULL checks.jsing1-16/+67
2018-02-07Remove guards around *_free() calls since these functions handle NULL.jsing18-114/+67
2018-02-07Remove guards around *_free() calls since these functions handle NULL.jsing1-27/+15
2018-02-07Add more functions (based on those used in OpenSSH) to the free NULL test.jsing1-1/+19
2018-02-07Restore the old behavior when a port number without a host name isbluhm1-10/+12
passed to BIO_get_accept_socket(). This is part of the API and it fixes "openssl ocsp -port 12345" in server mode. from markus@; OK jsing@ beck@
2018-02-06Do not call freeaddrinfo() with a NULL parameter.bluhm1-2/+3
OK jsing@
2018-02-06Remove manual shutdown and close of the socket since in this casetb1-7/+1
SSL_free will do this a second time. ok jsing
2018-02-06Respect the OPENSSL make variable everywhere so thattb7-20/+22
make OPENSSL=/usr/src/usr.bin/openssl/obj/openssl actually does the expected thing instead of running a mixture of both the openssl below /usr/obj and the one below /usr/bin. Found the hard way via backtraces that made no sense whatsoever. ok jsing
2018-02-05Do not bother NULLing pointers in memory that is freed immediately after.jsing1-3/+1
2018-02-05Be consistent with the goto label names used in libtls code.jsing4-51/+52
No change to generated assembly.
2018-01-30keep in sync with ld.so malloc.cotto1-2/+3