summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/reallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2022-12-22new manual page BIO_accept(3)schwarze3-3/+387
2022-12-22in case of failure, always report the error with BIOerror();schwarze1-4/+14
OK tb@
2022-12-22Denote multiple arguments with 'arg ...' not 'args'kn1-4/+4
A few programs used the plural in their synopsis which doesn't read as clear as the obvious triple-dot notation. mdoc(7) .Ar defaults to "file ..." if no arguments are given and consistent use of 'arg ...' matches that behaviour. Cleanup a few markups of the same argument so the text keeps reading naturally; omit unhelpful parts like 'if optional arguments are given, they are passed along' for tools like time(1) and timeout(1) that obviously execute commands with whatever arguments where given -- just like doas(1) which doesn't mention arguments in its DESCRIPTION in the first place. For expr(1) the difference between 'expressions' and 'expression ...' is crucial, as arguments must be passed as individual words. Feedback millert jmc schwarze deraadt OK jmc
2022-12-22Mark BIO_s_log(3) as intentionally undocumented.schwarze1-3/+4
Ben Laurie invented the system logging BIO in 1999 and yet, nothing whatsoever uses it according to codesearch.debian.net. Besides, it is poorly designed and a crypto library is absolutely not the place for putting a clumsy system logging facility. Not everything needs to be a BIO!
2022-12-21Mark BIO_nread0(3), BIO_nread(3), BIO_nwrite0(3), and BIO_nwrite(3)schwarze1-2/+8
as intentionally undocumented. Bodo Moeller invented this "non-copying I/O" API in 1999, but according to codesearch.debian.net, it is still completely unused by anything. On top of that, it appears to be inflexible in so far as it only supports BIO pairs and no other BIO types and fragile in so far as it exposes pointers to internal storage and runs contrary to expectations of how BIO objects are supposed to work.
2022-12-20Mark BIO_dump_cb(3) and BIO_dump_indent_cb(3) as intentionally undocumented.schwarze1-2/+5
It appears Richard Levitte succumbed to everything-needs-a-callback-paranoia in 2004, but nobody is going to be surprised that nothing whatsoever wants to use this particular callback, according to codesearch.debian.net.
2022-12-20document BIO_fd_non_fatal_error(3) and BIO_fd_should_retry(3)schwarze1-8/+76
2022-12-19WTRAPPED is now supported by waitid(2)guenther1-3/+3
Don't test waitid(WUNTRACED) as that's not portable and only 'works' due to an implementation decision
2022-12-19document BIO_copy_next_retry(3)schwarze1-5/+34
2022-12-18document BIO_FLAGS_MEM_RDONLYschwarze1-2/+17
2022-12-18document BIO_set_retry_read(3), BIO_set_retry_write(3),schwarze1-5/+95
BIO_set_retry_special(3), BIO_clear_retry_flags(3), BIO_get_retry_flags(3), and the BIO_FLAGS_* constants
2022-12-18document the interaction with BIO_dup_chain(3)schwarze1-2/+14
2022-12-18new manual page BIO_dup_chain(3)schwarze9-19/+206
2022-12-18correct the prototypes of BIO_get_conn_ip(3) and BIO_get_conn_int_port(3);schwarze1-5/+3
from Richard Levitte via OpenSSL commit 0e474b8b in the 1.1.1 branch, which is still under a freee license
2022-12-18document BIO_number_read(3) and BIO_number_written(3)schwarze1-5/+67
2022-12-18nc: skip connection info on failed or skipped udptest()tb1-5/+8
In udp mode, nc would always print that the connected succeeded independently of whether that was actually the case. Don't do that. idea/ok mpf
2022-12-18nc: do not test the connection in non-interactive modetb1-1/+5
The connection test writes four X to the socket, which corrupts data that we may want to pipe into nc. So don't do that if stdin is not a tty but still do it in scan mode, this is needed according to chris. based on a diff by and ok mpf
2022-12-18nc: clean up and simplify connection_infO()tb1-7/+7
ok mpf as part of a larger diff
2022-12-18nc: pass protocol name to connection_info()tb1-7/+9
Avoids repeated use of ternary operator on globals.
2022-12-18nc: factor printing of connection info into a functiontb1-25/+28
This simply moves a chunk of code in this spaghetti mess into its own function with minimal changes. idea from a diff by mpf
2022-12-18Use volatile sig_atomic_t for flag set in signal handlertb1-2/+2
2022-12-17Switch to using BN_zero() instead of BN_zero_ex()tb1-2/+2
2022-12-17Move benchmark target up a bit and mark it phonytb1-4/+5
2022-12-17Zap some whitespacetb1-2/+2
2022-12-17Merge documentation of UI_null() from OpenSSL 1.1tb1-5/+21
jsing doesn't like it, but it's better than nothing. ok jsing
2022-12-17Document BIO_set_flags(3), BIO_clear_flags(3), BIO_test_flags(3),schwarze1-4/+88
and BIO_get_flags(3).
2022-12-17Link ui_null.c to buildtb1-1/+2
2022-12-17Prepare to provide UI_null()tb3-2/+24
xmlsec needs this, nothing else. Our linkers link libxmlsec1-openssl, only warns and since nothing uses this library in ports, this wasn't noticed for a long time. Reported by Thomas Mitterfellner ok jsing
2022-12-17Provide regress coverage for BN shift functions.jsing2-1/+543
Provide regress coverage for BN_lshift1(), BN_rshift1(), BN_lshift() and BN_rshift(), along with basic benchmarking functionality (run via 'make benchmark').
2022-12-17Revise cipher list regress coverage of SSL_set_security_level().jsing1-21/+43
A SSL_set_security_level() call was added to the cipher list regress, which expects a failure - however, it should succeed and fails for a completely unrelated reason. Rework this regress so that it actually passes and tests for the expected behaviour.
2022-12-17Provide BN_zero()/BN_one() as functions and make BN_zero() always succeed.jsing3-7/+22
BN_zero() is currently implemented using BN_set_word(), which means it can fail, however almost nothing ever checks the return value. A long time ago OpenSSL changed BN_zero() to always succeed and return void, however kept BN_zero as a macro that calls a new BN_zero_ex() function, so that it can be switched back to the "can fail" version. Take a simpler approach - change BN_zero()/BN_one() to functions and make BN_zero() always succeed. This will be exposed in the next bump, at which point we can hopefully also remove the BN_zero_ex() function. ok tb@
2022-12-17X509_check_purpose.3: incorporate feedback from jsingtb1-5/+5
2022-12-16In bio.h rev. 1.54, jsing@ and tb@ provided BIO_callback_fn_ex(3),schwarze1-77/+192
BIO_set_callback_ex(3), BIO_get_callback_ex(3), and BIO_callback_fn(3). Document them, in part by merging from the OpenSSL 1.1.1 branch, which is still under a free license, but heavily tweaked by me, in particular: * mention that BIO_set_callback_arg(3) is misnamed; * keep our more detailed explanation of the "ret" argument; * make the list of callback invocations more readable; * and update the HISTORY section.
2022-12-16Document extension caching of X509_check_purpose()tb1-23/+43
The overwhelming majority of callers of X509_check_purpose() in our tree pass a purpose of -1. In this case X509_check_purpose() acts as a wrapper of x509v3_cache_extensions() which makes sanity checks like non-negativity of ASN.1 integers or canonicity of RFC 3779 extensions as well as checking uniqueness of extensions. from schwarze who beat an initial diff of mine into shape
2022-12-16add a CAVEATS section warning the user to not create cycles;schwarze1-1/+34
OK tb@
2022-12-16Revert BIO_push(3) cycle prevention (bio_lib.c rev. 1.42).schwarze2-39/+7
jsing@ worries that cycle prevention might increase risk because software that is not checking return values (and indeed, not checking is likely common in practice) might silently behave incorrectly with cycle prevention whereas without, it will likely either crash right away through infinite recursion or at least hang in an infinite loop when trying to use the cyclic chain, in both cases making it likely that the bug will be found and fixed. Besides, tb@ points out that BIO_set_next(3) ought to behave as similarly as possible to BIO_push(3), but adding cycle prevention to BIO_set_next(3) would be even less convincing because that function does not provide a return value, encouraging users to expect that it will always succeed. While a safe idiom for checking the success of BIO_set_next(3) could easily be designed, let's be realistic: application software would be highly unlikely to pick up such an idiom.
2022-12-15In curve25519.h rev. 1.4 to 1.7, tb@ and jsing@ providedschwarze1-11/+121
ED25519_keypair(3), ED25519_sign(3), and ED25519_verify(3). Document them.
2022-12-15The argument to ctype functions must be EOF or representable as anflorian1-2/+2
unsigned char. Casting to int is particularly useless because that's what the compiler already does. We need to prevent sign extension, not write down that we want sign extension. OK deraadt, kn, miod, op
2022-12-14In evp.h rev. 1.109 and 1.112, jsing@ and tb@ providedschwarze1-61/+154
EVP_PKEY_new_raw_private_key(3), EVP_PKEY_new_raw_public_key(3), EVP_PKEY_get_raw_private_key(3), and EVP_PKEY_get_raw_public_key(3). Merge the documentation from the OpenSSL 1.1.1 branch, which is still under a free license. I tweaked the text somewhat for conciseness, and argument names for uniformity.
2022-12-14In asn1.h rev. 1.71 and 1.72, jsing@ and tb@ provided ASN1_buf_print(3).schwarze4-5/+78
Document it.
2022-12-12Bump to LibreSSL 3.7.1tb1-3/+3
2022-12-11Add a small blurb on @SECLEVEL=nlibressl-v3.7.0tb1-2/+8
2022-12-10bio chain test: compress some error printingtb1-5/+4
2022-12-10bio chain test: deduplicate chain walking codetb1-52/+40
2022-12-10bio chain test: handle walking of empty chainstb1-27/+15
Rework the loops walking the chains to be correct for empty chains as well. This simplifies the checking at the cost of slightly more initialization and will allow further refactoring in a subsequent check.
2022-12-09bio chain test: add a consistency check for chain lengthstb1-1/+9
2022-12-09bn/Makefile: tidy up and simplifytb1-16/+10
2022-12-09bio chain test: make two errors noisytb1-3/+11
2022-12-09bio chain test: ensure the length of empty chains is 0tb1-3/+9
2022-12-09bio chain test: various minor readability tweakstb1-6/+8
Align initialization in walk_backward() with walk_forward(), fix grammar in a comment and move initialization of oldhead_len in a place consistent with the other length initializations in that function