summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/reallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2016-10-20canary corruption message changed a bitotto1-5/+5
2016-10-20Also place canaries in > page sized objects (if C is in effect); ok tb@otto1-103/+110
2016-10-19unifdef OPENSSL_NO_CMSjsing8-123/+8
2016-10-19Update client hello messages to follow the removal of fixed ECDH.jsing1-89/+65
2016-10-19Remove support for fixed ECDH cipher suites - these is not widely supportedjsing7-466/+42
and more importantly they do not provide PFS (if you want to use ECDH, use ECDHE instead). With input from guenther@. ok deraadt@ guenther@
2016-10-19Remove the save_errno dance inside strerror_r(3). It is from thebluhm1-5/+3
time when we had national language support. OK millert@
2016-10-17If BN_div_word() fails (by returning (BN_ULONG)-1) or if the divisionguenther1-4/+8
fails to reduce the input in the expected space then fail out instead of overflowing the allocated buffer. combines openssl commits 28a89639da50b1caed4ff3015508f23173bf3e49 and 3612ff6fcec0e3d1f2a598135fe12177c0419582 ok doug@ beck@
2016-10-16Move libcrypto, librpcsvc and gnu/usr.bin/cc/include from RDIRS to PRDIRS,tb1-2/+4
and add prereq targets, so some header files are generated by BUILDUSER during 'make prereq' instead of by root during 'make includes'. Switch the order of 'make cleandir' and 'make includes' during 'make build' so we don't generate many files twice. Except for some machine@ symlinks from ${MACHINE}/stand, /usr/obj is now clean from files generated by root during 'make build'. Those will be cleaned up in a second step. help, testing & ok deraadt, input from natano, further testing rpe
2016-10-16Roll back uintptr_t cast changes after discussions with tedu, otto anddtucker3-24/+7
others. C11 6.5.6.9 says: When two pointers are subtracted, both shall point to elements of the same array object, or one past the last element of the array object; the result is the difference of the subscripts of the two array elements. In these cases the objects are arrays of char so the result is defined, and we believe that the report is based on a compiler incorrectly trapping on defined behaviour.
2016-10-15Wrap _malloc_init() so internal calls go directlyguenther2-2/+6
prodded by otto@ ok kettenis@ otto@
2016-10-14Cast pointers to uintptr_t to avoid potential signedness errors.dtucker3-7/+24
Based on patch from yuanjie.huang at windriver.com via OpenSSH bz#2608, with & ok millert, ok deraadt.
2016-10-140xd0 -> 0xdb; ok deraadt@ millert@ tedu@otto1-3/+3
2016-10-12optimize canary code a bit by storing offset of sizes table instead ofotto1-5/+7
recomputing it all the time
2016-10-08make clear the length printed is the requested lengthotto1-3/+3
2016-10-07grammar fix previous;jmc1-2/+2
2016-10-07document "chunk canary corrupted" errorotto1-2/+7
2016-10-07stray tabotto1-2/+2
2016-10-07Beter implementation of chunk canaries: store size in chunk meta dataotto1-61/+63
instead of chunk itself; does not change actual allocated size; ok tedu@
2016-10-06typonaddy1-3/+3
2016-10-05Fix some broken .Xr links, loosely based on a diffschwarze1-13/+12
from Rob Pierce <rob at 2keys dot ca>. The content of this page may also need expert attention, i suspect it may be lacking modern algorithms and over-emphasizing obsolete ones, but i dare not touch the content.
2016-10-03use the same type for buf as the return type in tls_load_filebcook1-2/+3
ok tedu@, noted by kinichiro
2016-10-02Check for and handle failure of HMAC_{Update,Final} or EVP_DecryptUpdate()guenther1-5/+11
based on openssl commit a5184a6c89ff954261e73d1e8691ab73b9b4b2d4 ok bcook@
2016-10-02Detect zero-length encrypted session data early, instead of when malloc(0)guenther1-2/+2
fails or the HMAC check fails. Noted independently by jsing@ and Kurt Cancemi (kurt (at) x64architecture.com) ok bcook@
2016-10-02In X509_cmp_time(), pass asn1_time_parse() the tag of the field beingguenther1-2/+3
parsed so that a malformed GeneralizedTime field is recognized as an error instead of potentially being interpreted as if it was a valid UTCTime. Reported by Theofilos Petsios (theofilos (at) cs.columbia.edu) ok beck@ tedu@ jsing@
2016-09-23Append to CLEANFILES instead of replacing it, so libcrypto.pc isnatano1-2/+2
deleted on make clean. ok millert
2016-09-22trim STANDARDS; ok jsinglibressl-v2.5.0jmc1-13/+1
2016-09-22some minor cleanup;jmc1-47/+17
2016-09-22shorten x509;jmc1-755/+414
2016-09-22Improve on code from the previous commit.jsing1-7/+5
ok bcook@
2016-09-22Avoid unbounded memory growth, which can be triggered by a clientjsing1-9/+20
repeatedly renegotiating and sending OCSP Status Request TLS extensions. Fix based on OpenSSL.
2016-09-22Check for packet with truncated DTLS cookie.guenther1-12/+17
Flip pointer comparison logic to avoid beyond-end-of-buffer pointers to make it less likely a compiler will decide to screw you. Based on parts of openssl commits 6f35f6deb5ca7daebe289f86477e061ce3ee5f46 and 89c2720298f875ac80777da2da88a64859775898 ok jsing@
2016-09-22Improve ticket validity checking when tlsext_ticket_key_cb() callbackguenther1-4/+25
chooses a different HMAC algorithm. Avert memory leaks if the callback preps the HMAC in some way. Based on openssl commit 1bbe48ab149893a78bf99c8eb8895c928900a16f but retaining a pre-callback length check to guarantee the callback is provided the buffer that the API claims. ok bcook@ jsing@
2016-09-22revert documentation update for the clearning behavior we already revertedbcook1-5/+1
2016-09-21Delete casts to off_t and size_t that are implied by assignmentsguenther6-20/+19
or prototypes. Ditto for some of the char* and void* casts too. verified no change to instructions on ILP32 (i386) and LP64 (amd64) ok natano@ abluhm@ deraadt@ millert@
2016-09-20shorten version;jmc1-17/+4
2016-09-20shorten the verify error list;jmc1-42/+41
2016-09-20Avoid selecting weak digests for (EC)DH when using SNI.bcook1-3/+12
from OpenSSL: SSL_set_SSL_CTX is normally called for SNI after ClientHello has received and the digest to use for each certificate has been decided. The original ssl->cert contains the negotiated digests and is now copied to the new ssl->cert. noted by David Benjamin and Kinichiro Inoguchi
2016-09-19put the spkac section in the right place;jmc1-60/+60
2016-09-19shorten verify;jmc1-154/+96
2016-09-19Update ld search path for libssl/libcrypto, fixes cross-build after source ↵bcook2-6/+6
moved. from Patrick Wildt
2016-09-18move page junking tp unmap(), right before we stick the region in the cache;otto1-6/+6
ok tedu@
2016-09-17remove comment about CMS; ok jsingderaadt1-3/+2
2016-09-15add some Xr for acme-client(1);jmc1-1/+2
2016-09-15some spkac shortening; ok beckjmc1-68/+13
2016-09-15shorten ts;jmc1-283/+63
2016-09-14Set callbacks on the right tls ctx on accept.bcook1-2/+2
From Tobias Pape
2016-09-14Handle the FLUSH BIO cntl, that happens at the end of SSL handshakes.bcook1-1/+2
from Tobias Pape
2016-09-14Allow callback read/write functions to set TLS_WANT_POLLOUT/POLLIN.bcook1-3/+21
from Tobias Pape
2016-09-14Generate pkg-config files at build time like everything else. Thisnatano2-4/+6
avoids permission problems due to the build and install stages being run by different users. ok deraadt jasper
2016-09-13add a little more typing to the first callback argument.tedu2-7/+7
it's always a tls context.