summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/reallocarray.c (unfollow)
Commit message (Expand)AuthorFilesLines
2014-08-07Correct test reversed during merge of fix for CVE-2014-3509guenther2-4/+4
2014-08-07Fix CVE-2014-3506, DTLS handshake message size checks. Fromguenther2-32/+44
2014-08-07Oops, revert changes commited by mistake. The previous commit was supposedmiod13-53/+59
2014-08-07When you expect a function to return a particular value, don't put a commentmiod15-71/+59
2014-08-07Fix CVE-2014-3511; TLS downgrade, verbatim diffderaadt2-10/+54
2014-08-07merge CVE-2014-3510; Fix DTLS anonymous EC(DH) denial of servicederaadt2-2/+18
2014-08-06merge fix for CVE-2014-3509 -- basically a missing s->hit check; ok guentherderaadt2-18/+26
2014-08-06Prevent a possible use after free by mimicing the s3_srvr.c fixes contributed bymiod2-8/+2
2014-08-06Allow B64_EOF to follow a base64 padding character. This restores previousjsing2-4/+6
2014-08-06Correct error checks in EVP_read_pw_string_min(): UI_add_input_string()guenther2-6/+6
2014-08-06Add support for loading the public/private key from memory, rather thanjsing4-13/+97
2014-08-05Add $OpenBSD$ tags.jsing8-0/+8
2014-08-04Implement ressl_accept_socket, which allocates a new server connectionjsing2-4/+45
2014-08-04Return -1 on error (not 1).jsing1-3/+3
2014-08-04A ressl server needs different configuration from a ressl client - providejsing3-0/+41
2014-08-04Provide a function that returns a server connection context.jsing2-0/+15
2014-08-04Provide a utility function for loading a private/public keypair.jsing2-0/+21
2014-08-04Improve ressl_{read,write} handling of non-blocking reads/writes.jsing2-16/+31
2014-08-04Free the SSL context first and let the reference counting do its thing.jsing1-5/+2
2014-08-04In chacha_init(), allow for a NULL iv. Reported by znz on github.miod2-4/+6
2014-08-03X509_NAME_get_text_by_NID() returns -1 on error so the typejsg1-1/+1
2014-07-29Fix a usage string; the proper spelling of 'alot' is 'a lot'.blambert1-2/+2
2014-07-28Remove SRP code. It contains a bug (this should not surprise anyone), buttedu12-3635/+2
2014-07-28The RSA, DH, and ECDH temporary key callbacks expect the number of keybitsguenther6-18/+42
2014-07-28remove non-portable __progname extern from arc4random unit test.bcook1-2/+1
2014-07-27Link dependencies on libssl and libcrypto were missing.guenther1-2/+3
2014-07-25Add missing year to copyright.jsing4-8/+8
2014-07-25BIO_free() returns immediately when the sole input is NULL.doug26-96/+61
2014-07-23level_add_node(): if a memory allocation failure causes us to attempt to cleanmiod2-8/+14
2014-07-23Make sure PEM_def_callback() correctly handles negative buffer sizes; all usesmiod2-20/+34
2014-07-23Check the return value of the UI functions (including UI_new() which returnmiod2-12/+22
2014-07-22Now that DES_random_key() can be trusted, use it to generate DES keys in themiod4-24/+20
2014-07-22In DES_random_key(), force the generated key to the odd parity before checkingmiod2-16/+16
2014-07-22Handle failure of NETSCAPE_SPKI_b64_encode() and don't leak memoryguenther1-6/+10
2014-07-22Use Cm instead of Li for 'MASK:'guenther1-2/+2
2014-07-22Rewrite the description of the string_mask config file option to matchguenther1-34/+30
2014-07-22Kill a bunch more BUF_strdup's - these are converted to have a check forbeck12-30/+40
2014-07-22better match proposed syscall apibcook2-16/+4
2014-07-21protect sysctl path with SYS__sysctl instead; from enh@google, ok bcookderaadt2-12/+12
2014-07-21Use explicit_bzero() instead of memset() on buffers going out of scope.guenther6-12/+18
2014-07-21cast from void * before math; enh@googlederaadt2-4/+4
2014-07-21missing newlinederaadt1-1/+2
2014-07-21Switch from <sys/endian.h> or <machine/endian.h> to the new,guenther5-10/+10
2014-07-20Move more OS-specific functionality to arc4random.h headers.bcook10-14/+88
2014-07-20initial win32 ARC4_LOCK/UNLOCK implementation.bcook2-2/+42
2014-07-20From ISO/IEC 9899:1999 and 9899:201x,guenther2-5/+5
2014-07-20Demonstrate how new linux getrandom() will be called, at least untilderaadt2-2/+74
2014-07-20Mark the format string argument to BIO_*printf as not being allowed to be NULLguenther2-10/+14
2014-07-20Fix ordering breakage, moving the fclose() test last again.guenther1-6/+22
2014-07-20Make sure the correct errno is reported by warn* or err* and notguenther7-7/+14