summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/recallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2022-01-20Add and fix check for BN functions return valueinoguchi1-4/+5
ok jsing@ millert@ tb@
2022-01-20Add check for BN functions return valueinoguchi1-3/+5
CID 21665 24835 comment from jsing@ and tb@ ok jsing@ millert@ tb@
2022-01-20Add check for BIO_indent return valueinoguchi1-2/+3
CID 24869 ok jsing@ millert@ tb@
2022-01-19Document the bizarre fact that {CMS,PCKS7}_get0_signers() needs sometb2-4/+12
freeing of what they return despite being get0 functions: the stack of X509s that they return must be freed with sk_X509_free(). The get0 thus probably refers to the individual certs, but not to the stack itself. The libcrypto and libssl APIs never cease to amaze with new traps. ok inoguchi
2022-01-19Check return value from EVP_CIPHER_CTX_new in cms_pwri.cinoguchi1-2/+4
CID 345137 ok jsing@ tb@
2022-01-19Check function return value in libtlsinoguchi1-9/+21
EVP_EncryptInit_ex, EVP_DecryptInit_ex and HMAC_Init_ex are possible to fail and return error. Error from these functions will be fatal for the callback, and I choose to return -1. SSL_CTX_set_tlsext_ticket_key_cb.3 explains the return value of callback. This also could fix Coverity CID 345319. ok jsing@ tb@
2022-01-16Avoid memory leak in error path with openssl(1) smimeinoguchi1-1/+2
CID 345316 ok tb@
2022-01-16Avoid memory leak in error path with openssl(1) cmsinoguchi1-1/+3
CID 345314 345320 ok tb@
2022-01-15spellingjsg12-39/+39
ok tb@
2022-01-15Add back an accidentally dropped .Pptb1-1/+2
2022-01-15Update for HMAC_CTX_{init,cleanup} hand HMAC_cleanup removaltb1-50/+2
2022-01-15Stop documenting clone digests.tb3-47/+7
2022-01-15Minor cleanup and simplification in dsa_pub_encode()tb1-15/+8
This function has a weird dance of allocating an ASN1_STRING in an inner scope and assigning it to a void pointer in an outer scope for passing it to X509_PUBKEY_set0_param() and ASN1_STRING_free() on error. This can be simplified and streamlined. ok inoguchi
2022-01-15Add ct.h and x509_vfy.hinoguchi1-1/+3
2022-01-14Avoid buffer overflow in asn1_parse2inoguchi1-2/+2
asn1_par.c r1.29 changed to access p[0] directly, and this pointer could be overrun since ASN1_get_object advances pointer to the first content octet. In case invalid ASN1 Boolean data, it has length but no content, I thought this could be happen. Adding check p with tot (diff below) will avoid this failure. Reported by oss-fuzz 43633 and 43648(later) ok tb@
2022-01-14Enable openssl pkey -{,pub}check and pkeyparam -checktb2-6/+2
2022-01-14Undo static linking and other workarounds that are no longer neededtb6-19/+15
after the bump
2022-01-14Convert wycheproof.go for opaque EVP_AEAD_CTXtb1-11/+18
2022-01-14The cttest can link dynamically nowtb1-2/+2
2022-01-14Simplify BN_mont test slightly using a new accessor.tb1-4/+2
2022-01-14openssl(1) dgst: fix build after clones removaltb1-4/+1
ok inoguchi jsing
2022-01-14Convert openssl(1) speed for opaque EVP_AEAD_CTXtb1-13/+31
ok inoguchi jsing
2022-01-14Convert openssl(1) rsa.c for opaque RSAtb1-2/+2
ok inoguchi jsing
2022-01-14openssl(1) genrsa: simplify access to rsa->etb1-5/+3
ok inoguchi jsing
2022-01-14Convert openssl(1) gendsa.c to opaque DSAtb1-2/+2
ok inoguchi jsing
2022-01-14Convert openssl(1) dsaparam to opaque dsatb1-11/+13
ok inoguchi jsing
2022-01-14Convert openssl(1) dsa.c to opaque DSAtb1-2/+2
ok inoguchi jsing
2022-01-14Convert openssl(1) dhparam to opaque DHtb1-12/+14
ok inoguchi jsing
2022-01-14Convert openssl(1) dh.c to opaque DHtb1-10/+12
ok inoguchi jsing
2022-01-14bump libcrypto, libssl, libtls majors after struct visibility changestb3-3/+3
and Symbol addition and removal in libcrypto.
2022-01-14Use the correct type for ssl_callback_ctrl()tb1-3/+3
2022-01-14Convert the new record layers to opaque EVP_AEAD_CTXtb2-12/+6
ok jsing
2022-01-14Convert ssl_kex.c to opaque DHtb1-11/+11
Stop reaching into DH internals and use the new API functions instead. ok inoguchi jsing
2022-01-14Use BIO_next/BIO_set_next in ssl_lib.ctb1-3/+3
Trivial conversion to cope with opaque BIO.
2022-01-14bio_ssl.c needs to peek into bio_local.htb2-2/+4
2022-01-14Update Symbols.listtb1-49/+190
ok inoguchi
2022-01-14Unconditionally comment out OPENSSL_NO_RFC3779tb1-3/+1
ok inoguchi jsing
2022-01-14Remove header guard around RFC 3779 declarationstb1-3/+1
ok inoguchi jsing
2022-01-14Expose Certificate Transparency symbols in headerstb3-11/+3
ok inoguchi jsing
2022-01-14Hide OBJ_bsearch_ from public visibility,tb1-84/+4
This removes OBJ_bsearch_ex_() from the exported symbols and makes OBJ_bsearch_() semi-private. It is still used in libssl. While here, remove some hideous unused macros ok inoguchi jsing
2022-01-14Move ASN1_BOOLEAN to internal only.tb2-5/+5
This moves {d2i,i2d}_ASN1_BOOLEAN() to internal only. They are unused, but help us testing the encoding. ok jsing
2022-01-14Remove check_defer and obj_cleanup_defer from public visibilitytb1-1/+3
ok inoguchi jsing
2022-01-14Remove name_cmp from public visibilitytb2-2/+3
ok inoguchi jsing
2022-01-14Remove all asn1_* symbols from public visibilitytb2-18/+18
ok inoguchi jsing
2022-01-14Implement new-style OpenSSL BIO callbackstb15-145/+266
This provides support for new-style BIO callbacks in BIO_{read,write,gets,puts}() and a helper function to work out whether it should call the new or the old style callback. It also adds a few typedefs and minor code cleanup as well as the BIO_{get,set}_callback_ex() from jsing, ok tb
2022-01-14Garbage collect last use of EVP_ecdsa()tb1-2/+1
ok inoguchi jsing
2022-01-14Remove legacy sign/verify from EVP_MD.tb20-657/+62
This removes m_dss.c, m_dss1.c, and m_ecdsa.c and the corresponding public API EVP_{dss,dss1,ecdsa}(). This is basically the following OpenSSL commit. The mentioned change in RSA is already present in rsa/rsa_pmeth.c. ok inoguchi jsing commit 7f572e958b13041056f377a62d3219633cfb1e8a Author: Dr. Stephen Henson <steve@openssl.org> Date: Wed Dec 2 13:57:04 2015 +0000 Remove legacy sign/verify from EVP_MD. Remove sign/verify and required_pkey_type fields of EVP_MD: these are a legacy from when digests were linked to public key types. All signing is now handled by the corresponding EVP_PKEY_METHOD. Only allow supported digest types in RSA EVP_PKEY_METHOD: other algorithms already block unsupported types. Remove now obsolete EVP_dss1() and EVP_ecdsa(). Reviewed-by: Richard Levitte <levitte@openssl.org> Plus OpenSSL commit 625a9baf11c1dd94f17e5876b6ee8d6271b3921d for m_dss.c
2022-01-14Make RSA, RSA_PSS_PARAMS and RSA_METHOD opaquetb3-83/+80
Move the struct internals to rsa_locl.h and provide a missing typedef in ossl_typ.h. ok inoguchi jsing
2022-01-14Make structs in ocsp.h opaquetb2-234/+260
This adds a little order to this pig sty. ok inoguchi jsing
2022-01-14Move ECDSA_SIG to ecs_locl.htb2-11/+7
We can't make ECDSA_METHOD opaque since it is still used in smtpd(8) ok inoguchi jsing