summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/reallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2017-03-28small cleanup & optimization; ok deraadt@ millert@otto1-2/+5
2017-03-27repair knf & whitespace that jumped out of the screen during reviewderaadt1-23/+18
ok beck
2017-03-27use a path of "/" if the URL does not include a trailing / - sincebeck1-2/+5
the web server probably doesn't like it, even though you published the url without the trailing / in the certificate. (hello digicert!) ok claudio@
2017-03-27Fail early if an ocep server returns a non-200 http response, there is nobeck1-1/+4
point in trying to parse error pages as an ocsp response.
2017-03-27reinstate the capitalisation from previous, as advised by schwarze;jmc1-3/+3
2017-03-26recallocarray() for data buffer from the net.deraadt1-3/+5
ok beck
2017-03-26tweak previous;jmc3-9/+9
2017-03-26Stop enumeration all allocation functions, just say "allocation functions"libressl-v2.5.2otto1-32/+13
ok jmc@ deraadt@
2017-03-26merge new UI documentation from OpenSSLschwarze5-13/+651
2017-03-25document X509_Digest(3) and friends;schwarze2-1/+135
from Rich Salz <rsalz@openssl.org>, OpenSSL commit 3e5d9da5 etc.
2017-03-25document the public function X509_cmp_time(3);schwarze2-1/+88
from Emilia Kasper <emilia@openssl.org>, OpenSSL commit 80770da3, tweaked by me
2017-03-25correct RETURN VALUES;schwarze1-7/+13
from Richard Levitte <levitte@openssl.org>, OpenSSL commit cdd6c8c5
2017-03-25fix two more prototypes;schwarze1-5/+5
from Matt Caswell <matt@openssl.org>, OpenSSL commit b41f6b64
2017-03-25correct prototypes;schwarze1-5/+5
from Matt Caswell <matt@openssl.org>, OpenSSL commit b41f6b64
2017-03-25complete description of RETURN VALUES;schwarze1-6/+8
from Alexander Koeppe via OpenSSL commit bb6c5e7f
2017-03-25minimal stub-quality documentation of EVP_MD_CTX_ctrl(3);schwarze1-3/+17
from Todd Short <tshort@akamai.com> via OpenSSL commit 52ad5b60
2017-03-25OpenSSL documented the public function BIO_printf(3) (and friends)schwarze3-3/+91
in commit 2ca2e917. Document it here, too, but do not use their text. Be more concise and more precise at the same time.
2017-03-25document ASN1_tag2str(3); from OpenSSL commit 9e183d22schwarze1-4/+14
2017-03-25Update RFC reference for TLSEXT_TYPE_padding.jsing1-5/+2
2017-03-25Check tls1_PRF() return value in tls1_generate_master_secret().jsing1-4/+4
2017-03-25Update regress to match changes to tls1_PRF().jsing1-10/+10
2017-03-25More cleanup for tls1_PRF()/tls1_P_hash() - change the argument order ofjsing1-46/+50
tls1_PRF() so that it matches tls1_P_hash(), use more explicit argument names and change lengths to size_t. ok inoguchi@
2017-03-24add a helper function to print all pools #ifdef MALLOC_STATSotto1-1/+16
from David CARLIER
2017-03-24document new recallocarray diagnostic; zap a few diagnostics that shouldotto1-8/+9
never occur
2017-03-24move recallocarray to malloc.c andotto2-19/+207
- use internal meta-data to do more consistency checking (especially with option C) - use cheap free if possible ok deraadt@
2017-03-18Fewer magic numbers.jsing1-3/+3
2017-03-18t1_enc.cjsing1-3/+2
2017-03-18Update regress and remove temporary buffer to match changes in tls_PRF().jsing1-8/+4
2017-03-18Currently tls1_PRF() requires that a temporary buffer be provided, thatjsing1-50/+32
matches the size of the output buffer. This is used in the case where there are multiple hashes - tls_P_hash() is called with the temporary buffer and the result is then xored into the output buffer. Avoid this by simply using a local buffer in tls_P_hash() and then xoring the result into the output buffer. Overall this makes the code cleaner and simplifies all of the tls_PRF() callers. Similar to BoringSSL. ok inoguchi@
2017-03-17remove unneccessary macro;jmc1-2/+2
2017-03-17Strengthen description of recallocarray(3) behaviour, hoping that readersderaadt1-5/+10
make the behaviour -> use case connection. help from jmc and jsing
2017-03-16Convert BUF_MEM_grow() and BUF_MEM_grow_clean() to recallocarray(),jsing1-13/+3
ensuring that the buffer contents are zeroed on allocation and not leaked when resizing. It is worth noting that BUF_MEM_grow_clean() already did this manually by avoiding realloc(). ok beck@ inoguchi@
2017-03-16Use calloc() instead of malloc() followed by manually zeroing fields.jsing1-6/+3
ok beck@ inoguchi@
2017-03-14copy /etc/services in test directoryeric1-1/+2
2017-03-10refresh the test infrastructure a bit.eric3-90/+93
2017-03-10Remove the handshake digests and related code, replacing remaining usesjsing7-166/+45
with the handshake hash. For now tls1_digest_cached_records() is retained to release the handshake buffer. ok beck@ inoguchi@
2017-03-10Switch CBB to use recallocarray() - this ensures that we do not leakjsing1-2/+2
secrets via realloc(). ok inoguchi@
2017-03-10First pass at cleaning up the tls1_P_hash() function - remove a pointlessjsing1-20/+19
EVP_DigestSignInit() call and avoid the need for ctx_tmp by reordering the code slightly. ok inoguchi@
2017-03-10Add a unit test for tls1_PRF().jsing2-1/+257
2017-03-10Make tls1_PRF() non-static so it can be regress tested.jsing1-2/+7
2017-03-09The netcat server did not print the correct TLS error message ifbluhm1-2/+2
the handshake after accept had failed. Use the context of the accepted TLS connection. OK beck@
2017-03-09remove bogus variable expansioneric2-4/+4
2017-03-09missing includeeric1-1/+2
2017-03-07Correctly handle TLS PRF with MD5+SHA1 - the secret has to be partitionedjsing1-5/+26
and each hash processed separately. Tested by tb@
2017-03-07Add a test that covers a libtls client talking to a Go TLS server withjsing1-5/+107
varying minimum and maximum protocol versions. This gives us protocol version test coverage against an independent TLS stack.
2017-03-07Allow ciphers to be set on the TLS config.jsing1-0/+10
2017-03-07Provide support for libtls protocols and allow for protocols to be set onjsing1-3/+47
a TLS config. The ConnVersion function now also returns a protocol version instead of a string.
2017-03-07Add handling for errors on the TLS config and properly check/handlejsing2-6/+23
failures when setting the CA file.
2017-03-07libtls errors are much more descriptive these days - return them directlyjsing1-9/+8
and avoid adding redundant/duplicate information.
2017-03-07We no longer need to keep pointers following tls_config_set_*() calls.jsing1-6/+3