summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/reallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2018-05-13Add const qualifier to the ASN1_OBJECT * parameter oftb2-5/+5
X509v3_get_ext_by_OBJ(3). tested in a bulk build by sthen ok jsing (as part of a larger diff)
2018-05-13Add a const qualifier to the ASN1_OBJECT * argument of the following:tb4-14/+16
EVP_PKEY_get_attr_by_OBJ(3), X509at_get_attr_by_OBJ(3), X509at_get0_data_by_OBJ(3), X509_REQ_get_attr_by_OBJ(3) tested in a bulk by sthen ok beck (as part of a larger diff)
2018-05-13Add a const qualifier to the argument of EVP_PKEY_get0_asn1(3).tb2-4/+4
tested in a bulk build by sthen ok beck (as part of a larger diff)
2018-05-13Add a const qualifier to the argument of EVP_PKEY_get0(3).tb2-4/+4
tested in a bulk build by sthen ok beck (as part of a larger diff)
2018-05-13Add a const qualifier to the argument of EVP_PKEY_bits(3).tb2-4/+4
tested in a bulk build by sthen ok beck (as part of a larger diff)
2018-05-13Add a const qualifier to the second argument of EVP_DigestVerifyFinal(3).tb2-4/+5
tested in a bulk build by sthen ok beck (as part of a larger diff)
2018-05-12In bio.h rev. 1.43 2018/05/12 18:51:59, tb@ added a const qualifierschwarze3-8/+8
to the argument of BIO_new_accept(3), BIO_new_connect(3), and BIO_new_mem_buf(3). Update the documentation.
2018-05-12In bio.h rev. 1.42 2018/05/12 17:47:53, tb@ added a const qualifierschwarze1-3/+3
to return value of BIO_s_mem(3). Update the manual page.
2018-05-12const qualifiers for BIO_new_mem_buf(), BIO_new_connect() andtb4-11/+11
BIO_new_accept(). The one for BIO_new_mem_buf() is a bit ugly since it needs to cast away the newly added const qualifier, as in OpenSSL commit 8ab31975bac. ok jsing
2018-05-12Add const qualifiers to the return values of BIO_s_mem() andtb3-9/+9
BIO_s_datagram(). ok jsing
2018-05-12Cleanup c2i_ASN1_BIT_STRING() code.jsing1-20/+23
Avoid overloading a variable to store both a value and an error code - we can simply inline the error calls (as done everywhere else). Remove a bunch of unnecessary parentheses and tidy a few other things. With input from tb@. ok inoguchi@ tb@
2018-05-12Add a missing bounds check in c2i_ASN1_BIT_STRING().jsing1-1/+6
This could potentially result in a left shift that exceeded the size of the storage type. Issue found by Simon Friedberger, Robert Merget and Juraj Somorovsky. ok inoguchi@ tb@
2018-05-12Use explicit_bzero() rather than memset() when clearing a BIGNUM.jsing1-2/+2
ok bcook@ tb@
2018-05-12If we fail to decode an EC point format extension, send a decode_errorjsing1-4/+6
alert rather than an internal_error alert. Issue found by Simon Friedberger, Robert Merget and Juraj Somorovsky. ok beck@ inoguchi@
2018-05-10Fix typo in RFC number.tb1-2/+2
ok benno
2018-05-03begin LibreSSL 2.8.0 dev branchbcook1-3/+3
2018-05-02In evp.h rev. 1.59 2018/05/02 15:51:41, tb@ added a const qualifierschwarze3-9/+9
to the return value of BIO_f_base64(3), BIO_f_cipher(3), and BIO_f_base64(3). Update the documentation.
2018-05-02Add const qualifiers to return value of BIO_f_{base64,cipher,md}().tb4-13/+13
tested in bulk by sthen ok jsing
2018-05-02Remove incorrect NULL checks in DH_set0_key().tb1-5/+1
Reported by Ondřej Surý, LibreSSL-portable issue #92. ok inoguchi, jsing
2018-05-01In x509.h rev. 1.46 2018/05/01 19:01:28, tb@ added const qualifiersschwarze2-6/+6
to some function arguments. Update the documentation.
2018-05-01Convert a handful of X509_*() functions to take const as in OpenSSL.tb10-43/+44
tested in a bulk by sthen ok jsing
2018-05-01In bio.h rev. 1.41 2018/05/01 13:29:09, tb@ added const qualifiersschwarze9-28/+28
to the prototypes of several functions. Update the documentation.
2018-05-01In ssl.h rev. 1.158 2018/05/01 13:30:24, tb@ changed BIO_f_ssl(3)schwarze1-3/+3
to return const. Update the documentation.
2018-05-01Fix whitespace on a few lines to reduce noise in an upcoming diff.tb1-5/+5
2018-05-01const for BIO_f_ssl(), the last const difference to OpenSSL in ourtb2-5/+5
public API in libssl. ok beck, jsing
2018-05-01const for BIO_{new,set}() and most of the BIO_{f,s}_*() family oftb14-52/+52
functions. ok beck, jsing
2018-04-30Add a missing header when compiling with -DDEBUGdenis1-1/+5
With advice from jca@ OK jca@ millert@
2018-04-29In view of the recent BN_FLG_CONSTTIME vulnerabilities in OpenSSL,schwarze4-28/+104
carefully document constant time vs. non-constant time operation of BN_div(3), BN_mod_exp(3), and BN_mod_inverse(3). Until the work that is required on the ill-designed BN_exp(3) and BN_gcd(3) interfaces can be undertaken, also document the imperfections in their behaviour, for now. Finally, mention BN_mod_exp(3) behaviour for even moduli. Delete the vague statement about some functions automatically setting BN_FLG_CONSTTIME. It created a false sense of security. Do not rely on it: not all relevant functions do that. Topic brought up by beck@, significant feedback and OK jsing@.
2018-04-29Correct direction of SSL_ERROR_ZERO_RETURN caseguenther1-3/+3
ok schwarze@
2018-04-28reference hosts(5) instead of networks(5)schwarze1-3/+3
2018-04-28Remove references to the obsolete getnetent(3) and networks(5).schwarze2-10/+7
2018-04-28Stop talking about /etc/networks, which is no longer used,schwarze1-39/+38
and reference gethostby*(3) and /etc/hosts instead. Say that setnetent(3), getnetent(3), and endnetent(3) now do nothing. With feedback from guenther and significant help from deraadt@.
2018-04-28Say that sethostent(3), gethostent(3), and endhostent(3) do nothing.schwarze1-50/+19
While here, stop implying plans to support additional address families in the future, and do not call gethostbyname2(3) "advanced". OK deraadt@ guenther@
2018-04-28To allow us to get rid of /etc/networks, make setnetent(3),schwarze1-75/+4
getnetent(3), and endnetent(3) do nothing, just like sethostent(3), gethostent(3), and endhostent(3) years ago. OK deraadt@ guenther@
2018-04-28Fix a small timing side channel in dsa_sign_setup(). Simple adaptationtb1-12/+25
of OpenSSL commit c0caa945f6ef30363e0d01d75155f20248403df4 to our version of this function. ok beck, jsing Original commit message: commit c0caa945f6ef30363e0d01d75155f20248403df4 Author: Pauli <paul.dale@oracle.com> Date: Wed Nov 1 06:58:13 2017 +1000 Address a timing side channel whereby it is possible to determine some information about the length of the scalar used in DSA operations from a large number (2^32) of signatures. This doesn't rate as a CVE because: * For the non-constant time code, there are easier ways to extract more information. * For the constant time code, it requires a significant number of signatures to leak a small amount of information. Thanks to Neals Fournaise, Eliane Jaulmes and Jean-Rene Reinhard for reporting this issue. Reviewed-by: Andy Polyakov <appro@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/4576)]
2018-04-28Fix a small timing side channel in ecdsa_sign_setup(). Up to whitespacetb1-8/+25
this is OpennSSL commit 4a089bbdf11f9e231cc68f42bba934c954d81a49. ok beck, jsing Original commit message: commit 4a089bbdf11f9e231cc68f42bba934c954d81a49 Author: Pauli <paul.dale@oracle.com> Date: Wed Nov 1 06:58:39 2017 +1000 Address a timing side channel whereby it is possible to determine some information about the length of the scalar used in ECDSA operations from a large number (2^32) of signatures. This doesn't rate as a CVE because: * For the non-constant time code, there are easier ways to extract more information. * For the constant time code, it requires a significant number of signatures to leak a small amount of information. Thanks to Neals Fournaise, Eliane Jaulmes and Jean-Rene Reinhard for reporting this issue. Reviewed-by: Andy Polyakov <appro@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/4576)]
2018-04-27trailing whitespace, and move arg checking before pledgebeck1-17/+17
in preparation for pledgepath ok deraadt@
2018-04-25Put function name on a separate line and zap stray whitespace.tb1-3/+4
2018-04-25In asn1.h rev. 1.46 2018/04/25 11:48:21, tb@ added const qualifiersschwarze7-30/+30
to some parameters of some functions. Update the documentation. Add a few additional missing const qualifiers while here.
2018-04-25Avoid talking about the innternal, undocumented data type "struct lhash_st",schwarze1-3/+3
show the public data type name "LHASH_OF(SSL_SESSION)" instead.
2018-04-25Document the callbacks as taking "SSL *" and "SSL_CTX *" argumentsschwarze1-7/+7
and avoid the internal, undocumented names "struct ssl_st *" and "struct ssl_ctx_st *".
2018-04-25In ssl.h rev. 1.156 2018/04/25 07:10:39, tb@ added const qualifiersschwarze5-16/+16
to some parameters and return values of some functions. Update the documentation.
2018-04-25remove whitespace before closing parenstb1-5/+5
2018-04-25Add const to functions in asn1/asn1.h as they did in OpenSSL.tb19-92/+96
BIO_f_asn1() will be taken care of later. Tested in a bulk by sthen ok bcook jca jsing
2018-04-25Fix capitalization of data. Pointed out by jsing and forgotten intb1-2/+2
previous commit.
2018-04-25The cookie in the cookie verify callback needs to be const.tb2-4/+5
ok jsing (as part of a larger diff)
2018-04-25OpenSSL started adding const to functions all over the place. Make alltb7-38/+30
our libssl functions match theirs wrt const, except for BIO_f_ssl(3) which will be fixed in a later step. this went through a i386 bulk by sthen ok jsing
2018-04-23Make the NULL check a separate if statement for readability andtb1-2/+4
grepability. Req. by jsing
2018-04-23Make whitespace between functions and structs a bit more consistent.tb1-3/+7
2018-04-23Test X509_CRL_METHOD_free(NULL)tb1-1/+2