summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/reallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2014-07-11Fix incorrect duplicate mlinksbeck1-8/+1
ok bcook@
2014-07-11Make sure BN_sqr never returns negative numbers.miod2-2/+4
OpenSSL PR #3400 via OpenSSL trunk.
2014-07-11Accept CCS again after `finished' has been sent by the client; at this pointmiod2-10/+12
keys have been correctly set up so it is ok to accept CCS from the server. Without renegotiation can sometimes fail. OpenSSL PR #3400 via OpenSSL trunk.
2014-07-11Correct incorrect mlinksbeck1-5/+1
ok bcook@
2014-07-11In dtls1_clear_queues(), free buffered_add_data.q correctly, it's made ofmiod2-8/+8
DTLS1_RECORD_DATA, not hm_fragment. OpenSSL PR #3286 via OpenSSL trunk.
2014-07-11Fix incorrect mlinksbeck1-3/+1
ok bcook@
2014-07-11Fix version number processing in cms_sd_set_version(); OpenSSL PR #3249 viamiod2-6/+6
OpenSSL trunk.
2014-07-11Remove duplicate 0x for salt len in output; Martin Kaiser via OpenSSL trunk.miod2-4/+4
2014-07-11When looking for the issuer of a certificate, if the current candidate ismiod6-26/+194
expired or not valid yet, continue looking; only return an expired certificate if no valid certificates have been found. OpenSSL PR #3359 via OpenSSL trunk.
2014-07-11In ssl3_get_client_key_exchange() parsing a GOST session key, invoke themiod2-26/+16
regular ASN.1 parser rather than trying to handroll one and potentially misbehave; OpenSSL PR #3335 via OpenSSL trunk.
2014-07-11Missing calloc() return value check in dgram_sctp_ctrl(); from Kurt Roeckx viamiod2-22/+42
OpenSSL trunk
2014-07-11Make CMS_decrypt_set1_pkey() return an error if no recipient type matches,miod2-6/+8
instead of returning a random key; OpenSSL PR #3348 via OpenSSL trunk
2014-07-11Missing initialization for error line in error paths; from Coverity viamiod2-2/+8
OpenSSL trunk.
2014-07-11Missing initialization; OpenSSL PR#3289 and #3345 via OpenSSL trunk.miod2-4/+6
2014-07-11Provide correct version details for LibreSSL.jsing2-154/+6
ok beck@ deraadt@ miod@
2014-07-11Clean up versioning and remove #ifdefs that we do not define.jsing2-68/+18
ok beck@
2014-07-11Make sure we leave OPENSSL_NO_PSK in the conf files so thingsbeck26-0/+26
can know... ok jsing@
2014-07-11Suspicions confirmed by sthen's searching that nothing uses ossl_ssize_tderaadt1-3/+1
except embedded openssl's in other trees.
2014-07-11Remove PSK from the ssl regress.jsing2-134/+1
2014-07-11pour some water on an ass emberderaadt2-2/+2
spotted by doctor jsing, always keeping an eye out for these
2014-07-11Fetch the specific license which will be used fromderaadt2-0/+48
https://www.openssl.org/~appro/camellia/dist/BSD_license.txt It isn't our concern to supply the other licences mentioned in source files; that is realy not our problem.
2014-07-11Add locking for __cxa_finalize() as it modifies the page permissions of thekettenis1-1/+5
__atexit tables and touches global variables. From Srinavasa Nagaraju through Android/Elliott Hughes. ok tedu@, guenther@
2014-07-11Remove the commentary about the majority of this code being underderaadt2-6/+4
'BSD-style Open Source licenses'. It is a bit improper of OpenSSL to classify themselves into the BSD community without a clear justification for the extra clauses / terms...
2014-07-11More e_os2.h clean up. Also move the includes inside the guard.jsing1-20/+12
ok deraadt@ who also has a similar diff.
2014-07-11Revert change that snuck into previous commit.jsing2-6/+2
2014-07-11Remove the PSK code. We don't need to drag around thisbeck25-1507/+27
baggage. ok miod@ jsing@
2014-07-11better document perils of setuid getenv and xr with issetugidtedu1-2/+10
ok deraadt
2014-07-11The only thing openssl is consistant about is inconsistancy, so therederaadt2-2/+2
are many variations of their license and we need to say: licenses which follow: rather than license which follows:
2014-07-11say hi to the bitbucketderaadt5-12388/+0
2014-07-11replace u_int32_t with uint32_tbcook1-4/+5
ok beck@
2014-07-11replace u_int8_t with uint8_tbcook2-6/+10
ok beck@
2014-07-11Only import cryptlib.h in the four source files that actually need it.jsing690-2194/+2290
Remove the openssl public includes from cryptlib.h and add a small number of includes into the source files that actually need them. While here, also sort/group/tidy the includes. ok beck@ miod@
2014-07-11Add a small note about LibReSSL at the start of this.beck2-0/+14
ok jsing@
2014-07-11No need to keep ssl23_foo() flavours mapping to ssl3_foo().miod9-86/+24
ok tedu@
2014-07-11Remove JPAKE remnants - there is no jpake.h, so if OPENSSL_NO_JPAKE wasjsing4-16/+2
removed from opensslconf.h, this would no longer compile.
2014-07-11Fix dumb copy/paste mistake.matthew1-3/+3
Noticed testing with clang.
2014-07-11Fix explicit_bzero regress for Solaris and OS X compatibilitymatthew1-27/+68
Solaris and OS X clobber the signal stack when returning to the main stack, which caused the original testing strategy (inspecting the signal stack once we're back on the main stack) to fail. To be compatible with this behavior, the regress test now inspects the signal stack space while we're still executing on it. This is a bit iffy because we might clobber it ourselves while inspecting it, but we as long as its not completely clobbered we should be okay. thx bcook for the Solaris test account
2014-07-10Explicitly include <openssl/opensslconf.h> in every file that referencesjsing394-550/+1462
an OPENSSL_NO_* define. This avoids relying on something else pulling it in for us, plus it fixes several cases where the #ifndef OPENSSL_NO_XYZ is never going to do anything, since OPENSSL_NO_XYZ will never defined, due to the fact that opensslconf.h has not been included. This also includes some miscellaneous sorting/tidying of headers.
2014-07-10OPENSSL_stderr() is unused so nuke it. OPENSSL_showfatal() is only used byjsing4-24/+6
OpenSSLDie(), which is in the same file, so just make it static. ok miod@
2014-07-10Use size_t as realloc() size argument whenever possible. ok tedu@miod4-12/+16
2014-07-10Simplify realloc() usage; ok tedu@miod2-30/+12
2014-07-10Upon realloc() failure, free() the original pointer and remove the stupidmiod2-6/+6
comments implying you don't have to. ok tedu@
2014-07-10KNFmiod2-52/+68
2014-07-10Fix a double free in a can't-fail error path in PKCS7_decrypt(), by removingmiod2-20/+12
the error path altogether and simplifying the local variables as a result. joint work with jsing@; ok jsing@ tedu@
2014-07-10remove unused variable from ssl3_get_client_hellobcook2-6/+4
ok tedu@ miod@
2014-07-10as noted by google/android via kettenis, atexit handlers can install newtedu1-1/+8
handlers. if this happens, restart the loop. ok kettenis matthew millert miod
2014-07-10Inline the only use of the HEX_SIZE macro and nuke both DECIMAL_SIZE andjsing4-14/+6
HEX_SIZE. ok beck@ miod@
2014-07-10Make sure srp_Calc_k() digest operations are checked for error; frommiod2-18/+34
Florian Zumbiehl (florz , florz . de) on tech@
2014-07-10Make sure SRP_Calc_client_key() returns NULL instead of a pristine BN_new()miod2-8/+18
upon error; from Florian Zumbiehl (florz , florz . de) on tech@
2014-07-10Nuke OPENSSL_NONPIC_relocated since nothing uses it.jsing4-8/+4
ok miod@