summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/reallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2014-11-11delete extra word in Ndderaadt1-3/+3
2014-11-09KNF (when not conflicting with other cleanup changes in progress)miod28-746/+1014
2014-11-09GOST tests, not connected to the build yet.miod2-0/+1464
2014-11-09Remove DEBUG_SIGN code. Make sure gost_key_unwrap_crypto_pro() returns failuremiod4-38/+8
instead of a printf and a success return, when the operation fails.
2014-11-09Rename internal yet public key_{un,}wrap_crypto_pro symbols by prepending amiod6-60/+64
`gost_' prefix to them, so that we do not pollute the global namespace too much.
2014-11-09Replace RAND_bytes() usage with arc4random_buf().miod6-20/+6
2014-11-09GOST crypto algorithms (well, most of them), ported from the removed GOSTmiod75-31/+13110
engine to regular EVP citizens, contributed by Dmitry Eremin-Solenikov; libcrypto bits only for now. This is a verbatim import of Dmitry's work, and does not compile in this state; the forthcoming commits will address these issues. None of the GOST code is enabled in libcrypto yet, for it still gets compiled with OPENSSL_NO_GOST defined. However, the public header gost.h will be installed.
2014-11-09Introduce EVP_MD_CTX_ctrl(), to allow for fine control of a given digest.miod4-4/+52
This functionality was already available (and optional), and used in the bowels of the ASN.1 code. This exposes it as a public interface, which will be used by the upcoming GOST code. Crank libcrypto minor version. From Dmitry Eremin-Solenikov.
2014-11-09Allow digest routines to provide their own HASH_FINAL routine; will bemiod2-6/+10
necessary for upcoming GOST code. From Dmitry Eremin-Solenikov
2014-11-08Clean up more SSLv2 remnants.jsing6-58/+30
2014-11-07More OPENSSL_NO_TLSEXT clean up.jsing3-11/+11
2014-11-07missing outlen in tls_write decltedu1-3/+3
2014-11-07Document the -servername option for openssl(1) s_client.jsing1-2/+7
Based on a diff from Rusty (rustyl at outband dot net) and OpenSSL.
2014-11-06TLS is pretty boring without TLS extensions... unifdef OPENSSL_NO_TLSEXT,jsing2-76/+2
which was already done for libssl some time back.
2014-11-06ssl_sock_init() does nothing, so remove it...jsing1-17/+1
2014-11-05edns0 is not currently supported: confirmed by sthen and ericjmc1-7/+7
diff From: Mike Burns (though my fix differs a bit)
2014-11-04simple select() to poll() conversion; reviewed by millert and dougderaadt1-9/+9
2014-11-03only call SRTP (whatever that is) functions when the connection type istedu2-10/+10
DTLS (whatever that is) instead of for TLS too. ok jsing.
2014-11-03minor cleanup of zlib code. DSO is gone. ok jsing.tedu10-434/+14
2014-11-03Add hooks to override native arc4random_buf on FreeBSD.bcook4-0/+298
The FreeBSD-native arc4random_buf implementation falls back to weak sources of entropy if the sysctl fails. Remove these dangerous fallbacks by overriding locally. Unfortunately, pthread_atfork() is also broken on FreeBSD (at least 9 and 10) if a program does not link to -lthr. Callbacks registered with pthread_atfork() simply fail silently. So, it is not always possible to detect a PID wraparound. I wish we could do better. This improves arc4random_buf's safety compared to the native FreeBSD implementation. Tested on FreeBSD 9 and 10.
2014-11-02Add a tls_connect_fds() function that allows a secure connection to bejsing3-6/+34
established using a pair of existing file descriptors. Based on a diff/request from Jan Klemkow. Rides previous libtls rename/library bump. Discussed with tedu@.
2014-11-02Remove remnants from RC2 and SEED - there are no longer any cipher suitesjsing4-106/+46
that use these algorithms (and SEED was removed from libcrypto some time ago). ok doug@
2014-11-01Initial regress for libtls hostname verification.jsing3-2/+247
2014-10-31Remove ephemeral RSA key handling.jsing1-43/+4
2014-10-31Use automatic DH ephemeral parameters instead of fixed 512 bit.jsing1-38/+23
Based on OpenSSL.
2014-10-31Remove an outdated comment re EDH vs DHE - DHE is now used consistently andjsing2-16/+2
there are backwards compatible names/aliases for EDH.
2014-10-31Update comments for TLS ExtensionType values - many of the referencedjsing2-76/+92
drafts are now RFCs. Also add the TLS extension type for ALPN and be consistent with RFC reference formatting.
2014-10-31Crank libssl major due to recent additions, removals and changes.jsing2-4/+4
2014-10-31Remove now unused remnants from public structs.jsing4-14/+4
2014-10-31Add support for automatic DH ephemeral keys.jsing12-44/+194
This allows an SSL server to enable DHE ciphers with a single setting, which results in an DH key being generated based on the server key length. Partly based on OpenSSL.
2014-10-31Remove support for ephemeral/temporary RSA private keys.jsing14-474/+88
The only use for these is via SSL_OP_EPHEMERAL_RSA (which is effectively a standards violation) and for RSA sign-only, should only be possible if you are using an export cipher and have an RSA private key that is more than 512 bits in size (however we no longer support export ciphers). ok bcook@ miod@
2014-10-31Update regress for the libressl to libtls rename.jsing4-0/+288
2014-10-31Rename libressl to libtls to avoid confusion and to make it easier tojsing13-451/+422
distinguish between LibreSSL (the project) and libressl (the library). Discussed with many.
2014-10-30clean up verbiage around the calculations; ok ingo jmc ottoderaadt1-5/+5
2014-10-30Don't mention old systems where realloc(NULL, n) didn't work as wemillert1-11/+7
don't want to give people the idea that this is non-portable (it has been present since C89). OK deraadt@ schwarze@
2014-10-30my mistake. we already did increase buffers to 16k; increasing to 64ktedu1-2/+2
would be the next stage of embiggening. restore 16k.
2014-10-30rework the poll loop to poll in both directions so it doesn't get stucktedu1-47/+211
if one pipe stalls out. from a diff by Arne Becker. (buffer size left alone for now)
2014-10-28deregister; no binary changejsg100-460/+460
ok jsing@ miod@
2014-10-28Check the result of sk_*_push() operations for failure.miod18-88/+170
ok doug@ jsing@
2014-10-26POLLIN is not guaranteed to be set in revents for EOF so check formillert1-3/+3
POLLHUP too. OK deraadt@
2014-10-24Remove unnecessary include: netinet/in_systm.h is not needed by theselteo1-2/+1
programs. ok deraadt@ millert@
2014-10-23Save space in man page: err() -> errc() and combine vars.doug1-18/+11
Suggested by millert@ and schwarze@. OK schwarze@, millert@
2014-10-22In PKCS12_setup_mac(), do not assign p12->mac->salt->length until the allocationmiod2-16/+18
of p12->mac->salt->data has actually succeeded. In one of my trees for a long time already...
2014-10-22Avoid a NULL pointer dereference that can be triggered byjsing2-4/+4
SSL3_RT_HANDSHAKE replays. Reported by Markus Stenberg <markus.stenberg at iki.fi> - thanks! ok deraadt@
2014-10-22#undef LIBRESSL_INTERNAL for the RAND_pseudo_bytes() test.jsing1-0/+2
2014-10-22Place most of the RAND_* functions under #ifndef LIBRESSL_INTERNAL (somejsing2-2/+8
are still needed for the engine). Our code should use arc4random instead.
2014-10-22Use arc4random_buf() instead of RAND(_pseudo)?_bytes().jsing8-36/+19
ok bcook@
2014-10-22None of these need <openssl/rand.h>jsing3-6/+3
2014-10-22Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes() (mostjsing4-21/+15
with unchecked return values).
2014-10-22None of these need <openssl/rand.h>jsing5-5/+0