summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/recallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2022-01-19Document the bizarre fact that {CMS,PCKS7}_get0_signers() needs sometb2-4/+12
freeing of what they return despite being get0 functions: the stack of X509s that they return must be freed with sk_X509_free(). The get0 thus probably refers to the individual certs, but not to the stack itself. The libcrypto and libssl APIs never cease to amaze with new traps. ok inoguchi
2022-01-19Check return value from EVP_CIPHER_CTX_new in cms_pwri.cinoguchi1-2/+4
CID 345137 ok jsing@ tb@
2022-01-19Check function return value in libtlsinoguchi1-9/+21
EVP_EncryptInit_ex, EVP_DecryptInit_ex and HMAC_Init_ex are possible to fail and return error. Error from these functions will be fatal for the callback, and I choose to return -1. SSL_CTX_set_tlsext_ticket_key_cb.3 explains the return value of callback. This also could fix Coverity CID 345319. ok jsing@ tb@
2022-01-16Avoid memory leak in error path with openssl(1) smimeinoguchi1-1/+2
CID 345316 ok tb@
2022-01-16Avoid memory leak in error path with openssl(1) cmsinoguchi1-1/+3
CID 345314 345320 ok tb@
2022-01-15spellingjsg12-39/+39
ok tb@
2022-01-15Add back an accidentally dropped .Pptb1-1/+2
2022-01-15Update for HMAC_CTX_{init,cleanup} hand HMAC_cleanup removaltb1-50/+2
2022-01-15Stop documenting clone digests.tb3-47/+7
2022-01-15Minor cleanup and simplification in dsa_pub_encode()tb1-15/+8
This function has a weird dance of allocating an ASN1_STRING in an inner scope and assigning it to a void pointer in an outer scope for passing it to X509_PUBKEY_set0_param() and ASN1_STRING_free() on error. This can be simplified and streamlined. ok inoguchi
2022-01-15Add ct.h and x509_vfy.hinoguchi1-1/+3
2022-01-14Avoid buffer overflow in asn1_parse2inoguchi1-2/+2
asn1_par.c r1.29 changed to access p[0] directly, and this pointer could be overrun since ASN1_get_object advances pointer to the first content octet. In case invalid ASN1 Boolean data, it has length but no content, I thought this could be happen. Adding check p with tot (diff below) will avoid this failure. Reported by oss-fuzz 43633 and 43648(later) ok tb@
2022-01-14Enable openssl pkey -{,pub}check and pkeyparam -checktb2-6/+2
2022-01-14Undo static linking and other workarounds that are no longer neededtb6-19/+15
after the bump
2022-01-14Convert wycheproof.go for opaque EVP_AEAD_CTXtb1-11/+18
2022-01-14The cttest can link dynamically nowtb1-2/+2
2022-01-14Simplify BN_mont test slightly using a new accessor.tb1-4/+2
2022-01-14openssl(1) dgst: fix build after clones removaltb1-4/+1
ok inoguchi jsing
2022-01-14Convert openssl(1) speed for opaque EVP_AEAD_CTXtb1-13/+31
ok inoguchi jsing
2022-01-14Convert openssl(1) rsa.c for opaque RSAtb1-2/+2
ok inoguchi jsing
2022-01-14openssl(1) genrsa: simplify access to rsa->etb1-5/+3
ok inoguchi jsing
2022-01-14Convert openssl(1) gendsa.c to opaque DSAtb1-2/+2
ok inoguchi jsing
2022-01-14Convert openssl(1) dsaparam to opaque dsatb1-11/+13
ok inoguchi jsing
2022-01-14Convert openssl(1) dsa.c to opaque DSAtb1-2/+2
ok inoguchi jsing
2022-01-14Convert openssl(1) dhparam to opaque DHtb1-12/+14
ok inoguchi jsing
2022-01-14Convert openssl(1) dh.c to opaque DHtb1-10/+12
ok inoguchi jsing
2022-01-14bump libcrypto, libssl, libtls majors after struct visibility changestb3-3/+3
and Symbol addition and removal in libcrypto.
2022-01-14Use the correct type for ssl_callback_ctrl()tb1-3/+3
2022-01-14Convert the new record layers to opaque EVP_AEAD_CTXtb2-12/+6
ok jsing
2022-01-14Convert ssl_kex.c to opaque DHtb1-11/+11
Stop reaching into DH internals and use the new API functions instead. ok inoguchi jsing
2022-01-14Use BIO_next/BIO_set_next in ssl_lib.ctb1-3/+3
Trivial conversion to cope with opaque BIO.
2022-01-14bio_ssl.c needs to peek into bio_local.htb2-2/+4
2022-01-14Update Symbols.listtb1-49/+190
ok inoguchi
2022-01-14Unconditionally comment out OPENSSL_NO_RFC3779tb1-3/+1
ok inoguchi jsing
2022-01-14Remove header guard around RFC 3779 declarationstb1-3/+1
ok inoguchi jsing
2022-01-14Expose Certificate Transparency symbols in headerstb3-11/+3
ok inoguchi jsing
2022-01-14Hide OBJ_bsearch_ from public visibility,tb1-84/+4
This removes OBJ_bsearch_ex_() from the exported symbols and makes OBJ_bsearch_() semi-private. It is still used in libssl. While here, remove some hideous unused macros ok inoguchi jsing
2022-01-14Move ASN1_BOOLEAN to internal only.tb2-5/+5
This moves {d2i,i2d}_ASN1_BOOLEAN() to internal only. They are unused, but help us testing the encoding. ok jsing
2022-01-14Remove check_defer and obj_cleanup_defer from public visibilitytb1-1/+3
ok inoguchi jsing
2022-01-14Remove name_cmp from public visibilitytb2-2/+3
ok inoguchi jsing
2022-01-14Remove all asn1_* symbols from public visibilitytb2-18/+18
ok inoguchi jsing
2022-01-14Implement new-style OpenSSL BIO callbackstb15-145/+266
This provides support for new-style BIO callbacks in BIO_{read,write,gets,puts}() and a helper function to work out whether it should call the new or the old style callback. It also adds a few typedefs and minor code cleanup as well as the BIO_{get,set}_callback_ex() from jsing, ok tb
2022-01-14Garbage collect last use of EVP_ecdsa()tb1-2/+1
ok inoguchi jsing
2022-01-14Remove legacy sign/verify from EVP_MD.tb20-657/+62
This removes m_dss.c, m_dss1.c, and m_ecdsa.c and the corresponding public API EVP_{dss,dss1,ecdsa}(). This is basically the following OpenSSL commit. The mentioned change in RSA is already present in rsa/rsa_pmeth.c. ok inoguchi jsing commit 7f572e958b13041056f377a62d3219633cfb1e8a Author: Dr. Stephen Henson <steve@openssl.org> Date: Wed Dec 2 13:57:04 2015 +0000 Remove legacy sign/verify from EVP_MD. Remove sign/verify and required_pkey_type fields of EVP_MD: these are a legacy from when digests were linked to public key types. All signing is now handled by the corresponding EVP_PKEY_METHOD. Only allow supported digest types in RSA EVP_PKEY_METHOD: other algorithms already block unsupported types. Remove now obsolete EVP_dss1() and EVP_ecdsa(). Reviewed-by: Richard Levitte <levitte@openssl.org> Plus OpenSSL commit 625a9baf11c1dd94f17e5876b6ee8d6271b3921d for m_dss.c
2022-01-14Make RSA, RSA_PSS_PARAMS and RSA_METHOD opaquetb3-83/+80
Move the struct internals to rsa_locl.h and provide a missing typedef in ossl_typ.h. ok inoguchi jsing
2022-01-14Make structs in ocsp.h opaquetb2-234/+260
This adds a little order to this pig sty. ok inoguchi jsing
2022-01-14Move ECDSA_SIG to ecs_locl.htb2-11/+7
We can't make ECDSA_METHOD opaque since it is still used in smtpd(8) ok inoguchi jsing
2022-01-14Simplify DSAPublicKey_ittb4-56/+25
This was obtained by porting the OpenSSL commit below and then using expand_crypto_asn1.go to unroll the new ASN.1 macros - actually the ones from 987157f6f63 which fixed the omission of dsa_cb() in the first commit. ok inoguchi jsing commit ea6b07b54c1f8fc2275a121cdda071e2df7bd6c1 Author: Dr. Stephen Henson <steve@openssl.org> Date: Thu Mar 26 14:35:49 2015 +0000 Simplify DSA public key handling. DSA public keys could exist in two forms: a single Integer type or a SEQUENCE containing the parameters and public key with a field called "write_params" deciding which form to use. These forms are non standard and were only used by functions containing "DSAPublicKey" in the name. Simplify code to only use the parameter form and encode the public key component directly in the DSA public key method. Reviewed-by: Richard Levitte <levitte@openssl.org>
2022-01-14Make DSA opaquetb2-65/+57
This moves DSA_SIG, DSA and DSA_METHOD to dsa_locl.h. ok inoguchi jsing
2022-01-14Make structs in dh.h opaquetb2-51/+44
This moves the struct internals for DH and DH_METHOD to dh_local.h. ok inoguchi jsing