summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/reallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2018-04-25remove whitespace before closing parenstb1-5/+5
2018-04-25Add const to functions in asn1/asn1.h as they did in OpenSSL.tb19-92/+96
BIO_f_asn1() will be taken care of later. Tested in a bulk by sthen ok bcook jca jsing
2018-04-25Fix capitalization of data. Pointed out by jsing and forgotten intb1-2/+2
previous commit.
2018-04-25The cookie in the cookie verify callback needs to be const.tb2-4/+5
ok jsing (as part of a larger diff)
2018-04-25OpenSSL started adding const to functions all over the place. Make alltb7-38/+30
our libssl functions match theirs wrt const, except for BIO_f_ssl(3) which will be fixed in a later step. this went through a i386 bulk by sthen ok jsing
2018-04-23Make the NULL check a separate if statement for readability andtb1-2/+4
grepability. Req. by jsing
2018-04-23Make whitespace between functions and structs a bit more consistent.tb1-3/+7
2018-04-23Test X509_CRL_METHOD_free(NULL)tb1-1/+2
2018-04-23Make X509_CRL_METHOD_free() NULL-safe.tb1-2/+2
ok bcook
2018-04-23About half of the listed functions are wrappers of ASN1_item_free().tb1-113/+113
Annotate them.
2018-04-23Add a big pile of *_free() functions which I audited to be NULL-safe.tb1-2/+109
2018-04-19Document the "f" callback argument that tb@ asked about.schwarze1-2/+16
While here, include a patch from tb@ adding the missing return type to ENGINE_ctrl() in the SYNOPSIS.
2018-04-18tweak previous;jmc1-2/+3
2018-04-18SEE ALSO and HISTORYschwarze12-26/+301
2018-04-18delete engine(3); nothing of value left in that pageschwarze2-537/+1
2018-04-18link to ENGINE_register_RSA(3) rather than engine(3)schwarze1-8/+7
2018-04-18* Document DH_up_ref(3), DSA_up_ref(3), and RSA_up_ref(3).schwarze3-16/+73
* Correct documentation of DH_new(3), DH_free(3), DSA_new(3), DSA_free(3), RSA_new(3), and RSA_free(3) with respect to reference counting. * Stop referencing engine(3).
2018-04-18* Make the description of method selection simpler, more precise,schwarze2-128/+67
and more concise. * Correct the description of the return values of DH_set_method(3) and DSA_set_method(3). * Stop referencing engine(3).
2018-04-18* Do not document the non-existent function RSA_null_method(3).schwarze1-105/+43
* Add three missing const qualifiers to function prototypes. * Correct the argument type of RSA_new_method(3). * Remove duplicate decsription of RSA_flags(3) and RSA_new_method(3). * Make the description of method selection simpler, more precise, and more concise. * Correct description of the return value of RSA_set_method(3). * Stop referencing engine(3).
2018-04-15add a few new sentences regarding the big pictureschwarze2-2/+15
2018-04-15Rewrite the ENGINE_*(3) documentation from scratch - step 2,schwarze8-395/+633
covering the remaining functions that were documented in engine(3), except for seven functions that are completely pointless and that were merely listed but not really documented.
2018-04-15Rewrite the ENGINE_*(3) documentation from scratch (step 1,schwarze10-530/+1303
covering 60% of the documented functions). The old, abominable engine(3) manual page shall die soon.
2018-04-14In eng_lib.c rev. 1.14 2018/04/14 07:18:37, tb@ allowed ENGINE_free(3)schwarze1-53/+46
to accept a NULL argument. Document that. While here, make the related sentences more precise and less verbose. Tweaks and OK tb@.
2018-04-14Make ENGINE_free() succeed on NULL. Matches OpenSSL's behavior andtb8-41/+41
simplifies the caller side. tested by & ok inoguchi; discussed with schwarze
2018-04-14make ENGINE_finish() succeed on NULL and simplify callers as intb13-100/+58
OpenSSL commit 7c96dbcdab9 by Rich Salz. This cleans up the caller side quite a bit and reduces the number of lines enclosed in #ifndef OPENSSL_NO_ENGINE. codesearch.debian.net shows that almost nothing checks the return value of ENGINE_finish(). While there, replace a few nearby 'if (!ptr)' with 'if (ptr == NULL)'. ok jsing, tested by & ok inoguchi
2018-04-11In ssl.h rev. 1.155 2018/04/11 17:47:36, jsing@ changedschwarze1-13/+3
SSL_OP_TLS_ROLLBACK_BUG to no longer have any effect. Update the manual page.
2018-04-11Nuke SSL_OP_TLS_ROLLBACK_BUG - this is a workaround for buggy clients fromjsing2-36/+17
around the SSLv3/TLSv1.0 period... and buggy clients are buggy. This also helps to clean up the RSA key exchange code. ok "kill it with fire" beck@ tb@
2018-04-10Delete the description of the argument of the "ciphers" commandschwarze1-145/+13
because it was (1) woefully incomplete, (2) partially outdated and wrong, (3) in parts imprecisely worded and hard to understand, (4) excessively technical for a section 1 manual, (5) of excessive size for this particular page, (6) and didn't belong here in the first place because it essentially tried to document a C API - SSL_CTX_set_cipher_list(3), which is now documented, so point to it.
2018-04-10Write documentation for the control string parameter from scratch,schwarze1-30/+273
collecting the information by inspecting the source code.
2018-04-10tweak usage()tb1-1/+1
2018-04-08Fail early if an X509_VERIFY_PARAM is poisoned - don't allowbeck1-8/+10
this to be "overridden" by the user supplied callback. ok jsing@
2018-04-08sort the list of data structures and add the missing ECDH and ECDSA;schwarze1-57/+13
triggered by OpenSSL commit a73d990e Feb 27 19:02:24 2018 +0100, but with different content
2018-04-07tweak previous;jmc1-4/+4
2018-04-07Correct man page for OpenSSL_no_config() to indicate that itbeck1-4/+8
suppresses any future config file loading. ok schwarze@ with a nit from jsing@
2018-04-07Remove function pointers for ssl_{read,write,peek}.jsing8-59/+11
Now that everything goes through the same code path, we can remove a layer of indirection and just call ssl3_{read,write,peek} directly. ok beck@ inoguchi@
2018-04-07Nuke SSL3_FLAGS_DELAY_CLIENT_FINISHED and SSL3_FLAGS_POP_BUFFER.jsing4-70/+8
These flags enabled experimental behaviour in the write path, which nothing uses. Removing this code greatly simplifies ssl3_write(). ok beck@ inoguchi@ sthen@ tb@
2018-04-07Revise regress to match tls_keypair_clear() removal.jsing1-18/+3
2018-04-07Correct tls_config_clear_keys() behaviour.jsing3-30/+18
Previously this incorrectly called tls_keypair_clear(), which results in the private key being cleared, along with the certificate, OCSP staple and pubkey hash. This breaks OCSP stapling if tls_config_clear_keys() is called following tls_configure(), as is done by httpd. Fix this by calling tls_keypair_clear_key() so that only the private key is cleared, leaving the other public data untouched. While here, remove tls_keypair_clear() and fold the necessary parts into tls_keypair_free(). ok beck@
2018-04-07Switch to OPENSSL_init_ssl() and prevent an openssl configuration file fromjsing1-3/+2
being loaded behind our back, at a later point. ok beck@
2018-04-07tweak previous;jmc1-8/+8
2018-04-07test X509_NAME_add_entry_by_txt(3); feedback and OK jsing@schwarze4-2/+81
2018-04-07sys/uio.h is not used anymoreotto1-3/+2
2018-04-06Revert revision 1.12 commit. Although *pval looks like a C pointer,bluhm1-2/+5
it may be something else. For primitive types it is possible that a boolean int has been casted to an ASN1_VALUE pointer. Then the 64 bit read access to *pval may crash due to alignent or 32 bit size. bug report Anton Borowka; OK tedu@ jsing@ miod@
2018-04-06Avoid leaking str if EVP_Digest() fails.tb1-3/+6
Found and fixed by Bernd Edlinger as part of OpenSSL commit 83b4049ab75e9da1815e9c854a9297bca3d4af6b ok jsing, deraadt, bcook
2018-04-06poison for X509_VERIFY_PARAM'sbeck4-45/+107
Tighten up checks for various X509_VERIFY_PARAM functions, and allow for the verify param to be poisoned (preculding future successful cert validation) if the setting of host, ip, or email for certificate validation fails. (since many callers do not check the return code in the wild and blunder along anyway) Inspired by some discussions with Adam Langley. ok jsing@
2018-04-04Fix two bugs in X509_NAME_add_entry(3):schwarze1-7/+4
(1) Evaluate the "set" argument, which says whether to create a new RDN or to prepend or append to an existing one, before reusing it for a different purpose, i.e. for the "set" field of the new X509_NAME_ENTRY structure. (2) When incrementing of some "set" fields is needed, increment the correct ones: All those to the right of the newly inserted entry, but not the one of that entry itself. These two bugs caused wrong results whenever using loc != -1, i.e. whenever inserting rather than appending entries, even when using set == 0 only, that is, even when using single-values RDNs only. Both bugs have been continuously present since at least SSLeay-0.8.1 (released July 18, 1997) and the second one since at least SSLeay-0.8.0 (released June 25, 1997), so both are over twenty years old. I found these bugs by code inspection while trying to document the function X509_NAME_ENTRY_set(3), which is public, but undocumented in OpenSSL. OK beck@, jsing@
2018-04-03KNF: move two opening curly braces of function bodies to their own linestb2-4/+6
2018-04-03Typo: typdef -> typedef.tb1-3/+3
From Edgar Pettijohn
2018-04-03Add missing $OpenBSD$ tags.tb2-0/+2
2018-04-02In ssl.h rev. 1.151 2018/03/17 15:48:31, tb@ providedschwarze1-6/+34
SSL_CTX_get_default_passwd_cb(3) and SSL_CTX_get_default_passwd_cb_userdata(3). Merge the documentation, tweaked by me; from Christian Heimes <cheimes at redhat dot com> via OpenSSL commit 0c452abc Mar 2 12:53:40 2016 +0100.