summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/reallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2015-04-29free() can handle NULL.doug2-16/+8
ok jsing@
2015-04-29Reject dNSName of " " for subjectAltName extension.doug1-1/+20
RFC 5280 says " " must not be used as a dNSName. ok jsing@ jca@
2015-04-29Add missing BN_CTX_end() calls.doug8-36/+36
After calling BN_CTX_start(), there must be a BN_CTX_end() before returning. There were missing BN_CTX_end() calls in error paths. One diff chunk was simply removing redundant code related to this. ok deraadt@
2015-04-27Not all Linux libc's include linux/sysctl.h in sys/sysctl.h.bcook2-4/+6
Include it if we have the sysctl syscall.
2015-04-27Support AIX versions without WPAR support.bcook2-2/+10
From Michael Felt.
2015-04-25Don't ignore the reference count in X509_STORE_free.doug2-2/+10
Based on this upstream commit: bff9ce4db38b297c72a6d84617d71ae2934450f7 which didn't make it into a release until 1.0.2. Thanks to william at 25thandclement dot com for reporting this! ok deraadt@ jsing@ beck@
2015-04-25Check for invalid leading zeros in CBS_get_asn1_uint64.doug3-8/+20
ASN.1 integers cannot have all zeros or all ones for the first 9 bits. This rule ensures the numbers are encoded with the smallest number of content octets (see ITU-T Rec X.690 section 8.3.2). Based on BoringSSL commit 5933723b7b592e9914f703d630b596e140c93e16 ok deraadt@ jsing@
2015-04-23Do not need to buf[0] = 0 before strlcpy(buf, ...deraadt2-4/+2
2015-04-15Only set the cipher list if one was specified and actually check the returnjsing1-7/+12
value from SSL_CTX_set_cipher_list(). Also remove pointless getenv() handling. ok bcook@ doug@
2015-04-15Clean up the ssl_bytes_to_cipher_list() API - rather than having thejsing6-42/+30
ability to pass or not pass a STACK_OF(SSL_CIPHER) *, which is then either zeroed or if NULL a new one is allocated, always allocate one and return it directly. Inspired by simliar changes in BoringSSL. ok beck@ doug@
2015-04-15Now that tls_close() is more robust, consider a failure to be fatal.jsing1-1/+1
2015-04-15Treat SSL_ERROR_ZERO_RETURN as a success, rather than a failure. Alsojsing1-5/+6
ensure that outlen is set to zero so that tls_read() has read(2) like semantics for EOF. Spotted by doug@
2015-04-15Make tls_close() more robust - do not rely on a close notify being receivedjsing1-13/+17
from the other side and only return TLS_READ_AGAIN/TLS_WRITE_AGAIN if we failed to send a close notify on a non-blocking socket. Otherwise be more forceful and always shutdown/close the socket regardless of other failures. Also do not consider ENOTCONN or ECONNRESET to be a shutdown failure, since there are various situations where this can occur. ok doug@ guenther@
2015-04-14Another couple of commas in the wrong place, ok jmcnicm1-3/+3
2015-04-14Move verify externs into the header file.jsing4-12/+8
2015-04-14Convert openssl(1) s_time to new option handling.jsing1-201/+178
ok doug@
2015-04-14Clean up and improve openssl(1) errstr:jsing1-21/+28
- Use BIO_new_fp() instead of BIO_new()/BIO_set_fp() and handle NULL return value in a more appropriate manner. - Use stroul() instead of sscanf() with appropriate error checking. ok doug@
2015-04-13Convert openssl(1) errstr to new option handling.jsing1-6/+34
ok bcook@ doug@
2015-04-12Remove d2i_X509_PKEY and i2d_X509_PKEY from the SSLeay days.doug4-88/+4
i2d_X509_PKEY is a "needs to implement" and d2i_X509_PKEY is broken. Removed upstream in commit b1f3442857c1fd76e91941141bf671d19e90a79d. ok deraadt@, jsing@
2015-04-11Send OPENSSL_issetugid() straight to hell, no final cigarette.deraadt7-34/+6
The issetugid() API is supposed to make a strong promise where "0 means it is safe to look at the environment". Way back in the past someone on the OpenSSL team responded to the environment access danger by creating a wrapper called OPENSSL_issetugid, and went to use it a number of places. However, by default on systems lacking true issetugid(), OPENSSL_issetugid returns 0. 0 indicating safely. False safety. Which means OPENSSL_issetugid() fails to make any sort of promise about safety, in fact it is just the opposite. Can you believe the OpenSSL team? This nastiness was noticed over the years, however noone could gain traction and get it fixed in OpenSSL. Also see a paragraph about this in http://www.tedunangst.com/flak/post/worst-common-denominator-programming ok jsing
2015-04-11Remove all getenv() calls, especially those wrapped by issetugid().deraadt13-115/+30
getenv()'s wrapped by issetugid() are safe, but issetugid() is correct difficult to impliment on many operating systems. By accident, a grand experiment was run over the last year, where issetugid() returned 1 (the safe value) on a few operating systems. Noone noticed & complained that certain environment variables were not working....... ok doug beck jsing, discussion with others
2015-04-11Put back a goto end that was unintentionally removed.jsing1-1/+2
Spotted by doug@
2015-04-11Convert openssl(1) pkeyparam to new option handling.jsing1-61/+74
2015-04-07Make pthread_atfork() track the DSO that called it like atexit() does,guenther3-2/+81
unregistering callbacks if the DSO is unloaded. Move the callback handling from libpthread to libc, though libpthread still overrides the inner call to handle locking and thread-library reinitialization. Major version bump for both libc and libpthread. verification that this fixes various ports ajacoutot@ asm assistance miod@; ok millert@ deraadt@
2015-04-06bludgeon DES support out of crypt. long live the bcrypt.tedu2-761/+9
2015-04-06improve realloc. when expanding a region, actually use the free page cachetedu1-7/+16
instead of simply zapping it. this can save many syscalls in a program that repeatedly grows and shrinks a buffer, as observed in the wild.
2015-04-06readdir() is thread-safe when DIR handles aren't shared, so delete the lock.guenther2-6/+2
(POSIX is fixing its description: readdir_r() was a botch) Patch from Carlos Mart�n Nieto (cmn (at) dwim.me) no -portable concerns bcook@
2015-04-03comma fix;jmc1-3/+3
2015-04-02Handle the case where multiple calls to SSL_shutdown() are required tojsing2-8/+14
close the connection. Also correctly handle the error on failure. Diff from cookieandscream via github.
2015-04-02Correct man page title.jsing1-2/+2
Diff from Tim van der Molen. ok jmc@
2015-04-02Document the fact that the tls_accept_*() functions can returnjsing1-7/+11
TLS_READ_AGAIN and TLS_WRITE_AGAIN. Based on a diff from Tim van der Molen.
2015-03-31Bump libtls minor due to API addition.jsing1-1/+1
2015-03-31Provide a tls_accept_fds() function, which allows a TLS connection to bejsing4-9/+39
accepted via an existing pair of file descriptors. Based on a diff from Jan Klemkow.
2015-03-31Nuke the OPENSSL_MAX_TLS1_2_CIPHER_LENGTH hack - this has to be enabled atjsing4-44/+4
compile time, which we do not do and are unlikely to ever do. Additionally, there are two runtime configurable alternatives that exist. ok bcook@ doug@
2015-03-31Store errors that occur during a tls_accept_socket() call on the contextjsing4-11/+12
for the server, rather than on the context for the connection. This makes more sense than the current behaviour does. Issue reported by Tim van der Molen.
2015-03-30add initial AIX getentropy/arc4random files. Thanks to Michael Felt.bcook4-0/+1002
2015-03-27Factor out the init_buf initialisation code, rather than duplicating itjsing16-206/+112
in four different places. ok doug@ guenther@
2015-03-27BUF_MEM_free() has its own explicit NULL check.jsing2-18/+12
2015-03-26The code in socks.c writes multiple times in a row to a socket. If thetobias1-3/+6
socket becomes invalid between these calls (e.g. connection closed), write will throw SIGPIPE. With this patch, SIGPIPE is ignored so we can handle write's -1 return value (errno will be EPIPE). Ultimately, it leads to program exit, too -- but with nicer error message. :) with input by and ok djm
2015-03-26Fix error message in case of write failure.tobias1-3/+3
ok djm
2015-03-26Check for short writes in fdpass(). Clean up while at it.tobias1-4/+3
ok djm
2015-03-26Sync camel case of "ProxyUseFdpass" with ssh_config(5).tobias1-3/+3
ok djm
2015-03-23Make rcmdsh(3) not fail if it is passed a non resolvable hostname.halex3-20/+16
Instead, silently ignore the fact and instead let the underlying ssh (or $RSH) command handle it. ok millert@
2015-03-22differentiate between a failed read, returning -1, and encounteringhalex1-2/+4
end-of-file, returning 0, in order not to print an unrelated strerror(errno) in the latter case ok millert@
2015-03-22sys/sysctl.h includes linux/sysctl.h, remove the extra unchecked includebcook2-4/+2
2015-03-22Since Windows needs BIO_sock_init() before you can call any networkingbcook2-12/+7
functions, and ocsp and s_time need networking enabled too, this just moves BIO_sock_init() up into main() as a catch-all for all of the commands. Of course, it is a no-op on any other platform. ok @guenther
2015-03-22unmute rcmd hostname lookup failurehalex1-3/+2
ok millert@ jung@
2015-03-21free the server certificate in tls_connect_fds(); fixes a memory leak withsthen1-1/+2
repeated use of tls_connect. ok jsing
2015-03-21Fix indentation that incorrectly implies a different control flow.doug6-16/+22
The actual control flow is intentional while the indenting is incorrect. This is intended to be a cosmetic change. Verified that each of these was part of a KNF commit that wasn't intending to change behavior. Also, double checked against the history of changes in OpenSSL and BoringSSL. Addresses Coverity CIDs: 78842, 78859, 78863. ok tedu@
2015-03-20Fix a memory leak in an error path.doug2-2/+6
From OpenSSL commit 5e5d53d341fd9a9b9cc0a58eb3690832ca7a511f. ok guenther@, logan@