summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/reallocarray.c (unfollow)
Commit message (Expand)AuthorFilesLines
2014-08-13munmap correct object in (extremely unlikely, and effectively terminal)deraadt6-12/+12
2014-08-12Merge a patch that i successfully pushed to OpenSSL,schwarze2-2/+2
2014-08-12Replace intrinsic ROTATE macros with an inline.bcook2-82/+20
2014-08-11Guard RSA / RC4-5 ASM when NO_ASM is not definedbcook6-12/+18
2014-08-11Check the return value of sk_SSL_CIPHER_new_null(), since it allocatesjsing2-10/+14
2014-08-11Unchecked memory allocation and potential leak upon error inmiod2-10/+24
2014-08-11Remove now-unused SSL2_STATE as well as ssl2-specific state machine values.miod2-234/+2
2014-08-11Currently, ssl3_put_char_by_bytes(NULL, NULL) is just a long handed wayjsing6-26/+24
2014-08-11Provide a ssl3_get_cipher_by_id() function that allows ciphers to be lookedjsing6-30/+36
2014-08-10Tweak cipher list comments and add missing cipher value comments.jsing2-10/+52
2014-08-10Remove disabled (weakened export and non-ephemeral DH) cipher suites fromjsing2-940/+10
2014-08-10Since we no longer need to support SSLv2-style cipher lists, startjsing32-182/+68
2014-08-10AF_IMPLINK and AF_BLUETOOTH are gone, but add printing of SOCK_SEQPACKETguenther1-6/+5
2014-08-10Only need <stdint.h> and not all of <inttypes.h> hereguenther1-2/+2
2014-08-08Fix CVE-2014-3507, avoid allocating and then leaking a fresh fragmentguenther2-4/+14
2014-08-08Fix CVE-2014-3508, pretty printing and OID validation:guenther4-24/+56
2014-08-07Correct test reversed during merge of fix for CVE-2014-3509guenther2-4/+4
2014-08-07Fix CVE-2014-3506, DTLS handshake message size checks. Fromguenther2-32/+44
2014-08-07Oops, revert changes commited by mistake. The previous commit was supposedmiod13-53/+59
2014-08-07When you expect a function to return a particular value, don't put a commentmiod15-71/+59
2014-08-07Fix CVE-2014-3511; TLS downgrade, verbatim diffderaadt2-10/+54
2014-08-07merge CVE-2014-3510; Fix DTLS anonymous EC(DH) denial of servicederaadt2-2/+18
2014-08-06merge fix for CVE-2014-3509 -- basically a missing s->hit check; ok guentherderaadt2-18/+26
2014-08-06Prevent a possible use after free by mimicing the s3_srvr.c fixes contributed bymiod2-8/+2
2014-08-06Allow B64_EOF to follow a base64 padding character. This restores previousjsing2-4/+6
2014-08-06Correct error checks in EVP_read_pw_string_min(): UI_add_input_string()guenther2-6/+6
2014-08-06Add support for loading the public/private key from memory, rather thanjsing4-13/+97
2014-08-05Add $OpenBSD$ tags.jsing8-0/+8
2014-08-04Implement ressl_accept_socket, which allocates a new server connectionjsing2-4/+45
2014-08-04Return -1 on error (not 1).jsing1-3/+3
2014-08-04A ressl server needs different configuration from a ressl client - providejsing3-0/+41
2014-08-04Provide a function that returns a server connection context.jsing2-0/+15
2014-08-04Provide a utility function for loading a private/public keypair.jsing2-0/+21
2014-08-04Improve ressl_{read,write} handling of non-blocking reads/writes.jsing2-16/+31
2014-08-04Free the SSL context first and let the reference counting do its thing.jsing1-5/+2
2014-08-04In chacha_init(), allow for a NULL iv. Reported by znz on github.miod2-4/+6
2014-08-03X509_NAME_get_text_by_NID() returns -1 on error so the typejsg1-1/+1
2014-07-29Fix a usage string; the proper spelling of 'alot' is 'a lot'.blambert1-2/+2
2014-07-28Remove SRP code. It contains a bug (this should not surprise anyone), buttedu12-3635/+2
2014-07-28The RSA, DH, and ECDH temporary key callbacks expect the number of keybitsguenther6-18/+42
2014-07-28remove non-portable __progname extern from arc4random unit test.bcook1-2/+1
2014-07-27Link dependencies on libssl and libcrypto were missing.guenther1-2/+3
2014-07-25Add missing year to copyright.jsing4-8/+8
2014-07-25BIO_free() returns immediately when the sole input is NULL.doug26-96/+61
2014-07-23level_add_node(): if a memory allocation failure causes us to attempt to cleanmiod2-8/+14
2014-07-23Make sure PEM_def_callback() correctly handles negative buffer sizes; all usesmiod2-20/+34
2014-07-23Check the return value of the UI functions (including UI_new() which returnmiod2-12/+22
2014-07-22Now that DES_random_key() can be trusted, use it to generate DES keys in themiod4-24/+20
2014-07-22In DES_random_key(), force the generated key to the odd parity before checkingmiod2-16/+16
2014-07-22Handle failure of NETSCAPE_SPKI_b64_encode() and don't leak memoryguenther1-6/+10