summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/reallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2015-07-21Convert openssl(1) nseq to new option handling.jsing1-40/+51
ok bcook@ doug@
2015-07-21Convert openssl(1) pkcs7 to new option handling.jsing1-93/+111
ok doug@
2015-07-21remove superfluous strings.hbcook1-2/+1
2015-07-21Remove duplicate check in libssl.doug2-6/+2
If len == 0, it already set try_session_cache so there's no need to check len again. Fixes Coverity issue 21687. ok bcook@
2015-07-20Correct #if/else logic in BIO's dgram_ctrl.doug2-6/+6
Coverity issue 72741 noticed that ret is being overwritten before use. The actual issue is that the #if/else logic is guarding the wrong lines. Besides impacting ret, this also made the case's break logic wrong because it was in the wrong location. ok bcook@ beck@
2015-07-20app_tminterval moved to apps_posix.c, we don't need sys/times.hbcook1-2/+1
2015-07-20prefer string.h to strings.h ok guenther@ doug@bcook2-4/+4
2015-07-20No need to recheck for NULL in openssl(1) ecparam.doug1-5/+1
Fixes Coverity issue 78802. ok bcook@
2015-07-20Don't try to run ECDH if ecdh_checks fails in openssl(1) speed.doug1-17/+23
Coverity 72744 noticed that rsa_count was overwitten. The underlying issue is that this code is supposed to be in an else block. ok bcook@
2015-07-20Avoid NULL deref in openssl(1) s_cb.doug1-5/+14
Fixes Coverity issue 24956. ok bcook@
2015-07-20Avoid possible NULL deref in openssl(1) s_server.doug1-2/+5
Fixes Coverity issue 78873. ok miod@
2015-07-20check the sigbuf value before using it.rpointel1-2/+7
ok miod@ (thanks).
2015-07-20Avoid dereferencing a NULL.doug1-5/+7
Move NULL check before use. Fixes Coverity issue 21746. ok miod@ jsing@
2015-07-20Remove condition that never happens and fix error handling.doug1-6/+5
There were two issues here: 1) in == NULL is never true because it's checked above here. (Fixes Coverity 21705) 2) All error handling is in the if (in == NULL) guard, so effectively there's no error handling and it continues on. ok miod@ jsing@
2015-07-20Various memory leaks upon error or unchecked allocations.miod2-8/+26
ok doug@
2015-07-20Use V_ASN1_UNDEF instead of -1.miod2-14/+14
Make sure ASN1_primitive_new() will return NULL in *pval in all error situations. ok bcook@ doug@
2015-07-20Check the return value of asn1_enc_save(). ok bcook@ doug@miod2-4/+8
2015-07-20When freeing an X509_CRL, if freeing the user-maintained meth_data fails,miod2-6/+8
do not forgot to nevertheless keep freeing the other fields. ok doug@ guenther@
2015-07-20In X509_PKEY_new(), make sure all allocation failures push an error to themiod2-14/+30
error stack, not only the first one. ok guenther@ doug@
2015-07-20add NetLock Kft. CA root certificate, already present in web browsers andsteven1-0/+80
needed for fetching ports distfiles. ok sthen@
2015-07-20Check return value for ENGINE_ctrl and ENGINE_ctrl_cmd.doug1-4/+15
Fixes Coverity issue 21645. ok bcook@
2015-07-20Check return value in openssl(1) s_socket.doug1-3/+6
Fixes Coverity issue 21655. ok bcook@
2015-07-20Remove check that is never true.doug1-3/+1
Fixes coverity issue 78799 as group == NULL was already an error condition above here. ok beck@
2015-07-20Warn when rename() fails in openssl(1) apps.doug1-8/+36
Fixes Coverity issues 78795 and 78803. ok bcook@
2015-07-20Add VIS_DQ to escape double quotes. OK deraadt@ semarie@ reyk@millert1-1/+3
2015-07-19Remove OpenSSL engine RSAX.doug14-1409/+12
OpenSSL stopped building it last year and removed it this year. Based on OpenSSL commit c436e05bdc7f49985a750df64122c960240b3ae1. Also cranked major version in libcrypto, libssl and libtls. "fine with me" bcook@ miod@
2015-07-19Allow *_free() functions in libssl to handle NULL input.doug9-9/+34
This mimics free()'s behavior which makes error handling simpler. ok bcook@ miod@
2015-07-19Drop stupid (int) casts for the arguments of malloc() and friends. This ismiod18-48/+48
not 16-bit MS-DOS anymore. ok bcook@ tedu@
2015-07-19unifdef -UCBC_HANDLES_TRUNCATED_IOmiod2-38/+2
ok bcook@ doug@
2015-07-19Verify ASN1 objects types before attempting to access them as a particularmiod4-4/+12
type. ok guenther@ doug@
2015-07-19tweak previous; ok dougjmc1-4/+4
2015-07-19Convert ssl3_get_certificate_request to CBS.doug2-62/+66
ok miod@
2015-07-19Fix symbol collision with libtls.doug7-36/+36
Pointed out by guenther. ok guenther@
2015-07-19Add TLS_method, TLS_client_method and TLS_server_method.doug9-9/+321
Use these instead of SSLv23_*method when you want to make sure TLS is used. By default, we disable SSLv3 but it's still possible for the user to re-enable it. TLS_*method does not allow SSLv3. Both BoringSSL and (next version of) OpenSSL have these methods. However, they have changed the implementation significantly. We will as well, but not right now. Riding the libssl major bump. ok miod@ bcook@
2015-07-19Crank major and remove legacy variables.doug6-30/+6
Libtls is riding this crank. ok miod@ bcook@
2015-07-19Crank the major of libtls: the behaviour of tls_write() has beenreyk1-1/+1
changed in an incompatible way regarding partial writes. OK miod@ deraadt@
2015-07-19Free memory when finished.doug1-2/+6
Fixes coverity 78835. ok bcook@
2015-07-19Add documentation on how to use TLS_{READ,WRITE}_AGAIN.doug1-2/+29
ok beck@
2015-07-19Now that it is safe to invoke X509_STORE_CTX_cleanup() if X509_STORE_CTX_init()miod4-16/+32
fails, check its return value and correctly mop up after ourselves. ok beck@ doug@
2015-07-19Only close descriptor if not already closed.doug1-3/+5
Fixes coverity 78916. ok miod@ bcook@
2015-07-19Free variable before potentially reusing.doug1-1/+2
Fixes coverity 78824. ok bcook@ miod@
2015-07-19Free passin on error.doug1-4/+4
Fixes coverity 78826. ok miod@ bcook@
2015-07-19Fix coverity 105339, by correctly checking return from strtollbeck1-1/+1
ok miod@ bcook@
2015-07-19Put explicit braces around assignment used in a conditional.miod2-4/+4
ok bcook@ doug@
2015-07-19Remove the logic responsible for outputting most AES-NI instructions asmiod6-214/+0
raw byte sequences. The toolchains have had some time to update and assemble the instructions correctly (except for p{ins,ext}rd which are not supported yet by as(1) under OpenBSD, but will be fixed shortly). Inspired by a discussion between tedu@ and John-Mark Gurney. Verified to still work on Mac OS X and average Linux distros by bcook@
2015-07-19Replace `.byte 0x48,0x83,0xEC,0x08' with `sub \$8,%rsp' which is exactly themiod2-4/+4
same four bytes, unobfuscated.
2015-07-19Simplify X509_STORE_CTX_init and make it safe with stack variables.doug2-116/+110
The current version is not safe with stack variables because it may return prematurely with a partially constructed object on error. ok miod@ a while back
2015-07-19Remove case that can never happen.doug2-10/+2
It's a little convoluted due to gotos, but at that point, pci is always NULL. Spotted by Coverity 21702. ok miod@ beck@ bcook@
2015-07-19Fix Coverity 72742 - ret is overwritten immediately after this.beck2-4/+2
ok doug@
2015-07-19Remove effectively unused variable.doug1-4/+1
Fixes Coverity issue 21693. ok beck@ bcook@