summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/reallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2024-04-14Delete a few more GOST remnantstb1-21/+1
When I unifdefed GOST support, the tree wasn't fully unlocked, so I didn't want to touch a public header. All this code is in #ifndef OPENSSL_NO_GOST, which we define. ok jsing
2024-04-14Remove documentation of no longer available APItb1-85/+4
2024-04-13Error check X509_ALGOR_set0() in {dsa,ec}_pkey_ctrl()tb2-7/+16
These are four versions of near identical code: PKCS#7 and CMS controls for DSA and EC. The checks are rather incomplete and should probably be merged somehow (see the Ed25519 version in ecx_methods(). For now, only replace X509_ALGOR_set0() with its internal by_nid() version and, while there, spell NULL correctly. ok jca
2024-04-13Unwrap a line for consistency with other copy-pasted versionstb1-3/+2
2024-04-12bio_enc: various basic cleanuptb1-64/+67
Call a BIO bio rather than bi, a, or b; don't cast when assigning from or to a (void *). Drop loads of silly redundant parentheses, use better order of variable declarations. No change in the generated assembly
2024-04-12Garbage collect various *_init() pmethstb3-53/+24
It's unclear whether the functions these support were ever really used for anything else than kicking off an overenginerred state machine. ok jsing
2024-04-12Fix a potential NULL-deref in EVP_PKEY_keygen()tb1-6/+8
After a EVP_PKEY_new() failure, a NULL pointer would be passed to the keygen pmeth, which could result in tears. ok beck jsing
2024-04-11Remove parentheses after returntb1-40/+40
This file was very undecided what style to choose and often changed its mind in the middle of a function. No change in the generated assembly.
2024-04-11Rework internal tm_to_*() converterstb1-69/+66
Make them static. Don't make them allocate if passed a NULL ASN1_TIME to avoid leaks. This currently means that we accept a NULL and succeed. That's very ugly but better than what we have now. Simplify ASN1_TIME_set_string_internal() accordingly and allocate an ASN1_TIME at the API boundary of ASN1_TIME_adj_internal() and of ASN1_TIME_to_generalized_time(). ok beck (after a lot of squealing and distress)
2024-04-10symbols test: Remove a few things that are long gonetb1-19/+5
2024-04-10Re-guard the crypto_malloc macros.beck1-1/+3
accidentally not included in crypto.h commit requested and ok tb@
2024-04-10Remove the prototype of BN_gcd_nonct()tb1-2/+1
2024-04-10Hide deprecated functions in ec.hbeck5-12/+31
use LCRYPTO_UNUSED and remove the LIBRESSL_INTERNAL guard ok tb@
2024-04-10Hide deprecated functions in evp.hbeck5-14/+19
use LCRYPTO_UNUSED and remove the LIBRESSL_INTERNAL guard around them. ok tb@
2024-04-10Add HMAC_init and HMAC_CTX_reset to Symbols.namespace.beck1-0/+2
ok tb@
2024-04-10Hide symbols in bn.hbeck6-19/+21
Mark them LCRYPTO_UNUSED appropriately and remove the LIBRESSL_INTERNAL guards around them ok tb@
2024-04-10Hide a couple of LCRYPTO_UNUSED in asn1.hbeck4-10/+8
and remove the LIBRESSL_INTERNAL guards around them ok tb@
2024-04-10Add RC2 symbols to Symbols.namespace.beck1-0/+7
These got missed when they were hidden ok tb@
2024-04-10Finish hiding symbols in rand.hbeck5-6/+34
This removes the LIBRESSL_INTERNAL guards and marks the functions within as LCRYPTO_UNUSED
2024-04-10Finish Hiding symbols in crypto.hbeck9-18/+101
crypto.h already had the symbols not hidden behind LIBRESSL_INTERNAL hidden - This now picks up the reset of them marking them as LCRYPTO_UNUSED, and removes the LIBRESSL_INTERNAL guard. These symbols will now be hidden, but if we use them inside the library in a namespaced build we will get a deprecation warning. use outside the library will be as with any other hidden symbol, so fine. ok tb@
2024-04-09whirlpool_test: avoid calling arc4random_uniform(0)tb1-2/+4
This causes a SIGFPE on solaris Fixes https://github.com/libressl/portable/issues/1042
2024-04-09whirlpool_test: zap lots of trailing whitespacetb1-58/+58
2024-04-09bn_convert: plug leak spotted by ASANtb1-2/+4
2024-04-09Add a comment on abuse of EXFLAG_INVALIDtb1-1/+8
We added things we probably shouldn't have, and so did BoringSSL and OpenSSL. Terrible API is terrible. discussed with jsing
2024-04-09Add initial regress for BN_set_bit(), BN_clear_bit() and BN_mask_bits().jsing2-1/+229