summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/system.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2009-05-25add ipsCA as a valid authority.dlg1-0/+51
ok beck@
2009-05-06Document AI_NUMERICSERV; feedback and ok millert@jacekm1-2/+9
2009-04-19update protocols for s_client;s -starttls; from bradjmc1-5/+8
2009-04-12document that no leading whitespace is permitted between the option andokan1-3/+5
argument if the argument is deemed to be optional ('::'). feedback and ok jmc@ and millert@
2009-04-10resync libssl/libcrypto pod documentation - quite a few more pages anddjm1-27/+242
MLINKS; feedback and ok jmc@
2009-04-06sync with 0.9.8k;jmc1-9/+19
2009-04-06crankus majorisdjm3-3/+3
2009-04-06resolve conflictsdjm79-245/+430
2009-04-06import of OpenSSL 0.9.8kdjm51-156/+15047
2009-04-06import of OpenSSL 0.9.8kdjm75-194/+356
2009-04-06import of OpenSSL 0.9.8kdjm39-149/+18486
2009-03-17correct argument type for swap64(); from Thomas Pfaffjmc1-3/+3
2009-02-18Test to show glob bug introduced with POSIX char class support.millert1-0/+3
2009-02-18Add missing CURDIRmillert1-2/+2
2009-02-13kill whitespace at eol;jmc1-2/+2
2009-02-13decribe 'F' better and mention flags are debugging aids; ok tedu@ jmc@otto1-8/+10
2009-02-10correct function definitions; from Markus Bergkvistjmc1-4/+4
2009-01-30missing ssl_sock_init() call in init_client() (used bydjm1-3/+10
"openssl s_client"), fix an unlikely memory leak
2009-01-30remove some gratuitous changes that do nothing other than inreasedjm1-2/+1
the size of the diff against openssl mainline
2009-01-12convert a strdup (into a purpose-allocated buffer) in libcrypto to adjm2-4/+6
memcpy to avoid linker deprecation warnings; pointed out by dkrause@
2009-01-09openssl-0.9.8j enables RFC3546 TLS extensions by default (e.g. the verydjm13-39/+0
useful "server name indication" that allows multihomed TLS server), so remove the #define to disable it here
2009-01-09adjust Makefile and crank major for openssl-0.9.8jdjm17-16/+56
2009-01-09resolve conflictsdjm538-7811/+10571
2009-01-09import openssl-0.9.8jdjm263-2494/+3222
2009-01-09import openssl-0.9.8jdjm532-8743/+31783
2009-01-09import openssl-0.9.8jdjm79-606/+3434
2009-01-08Add a missing MLINK for BIO_new_socket.oga1-1/+2
Noticed by blambert@. Ok jmc@.
2009-01-05This commit was manufactured by cvs2git to create branch 'OPENSSL'.cvs2svn4-0/+2088
2009-01-05update to openssl-0.9.8i; tested by several, especially krw@djm190-3245/+5824
2009-01-03reintroduce extra malloc protections, but avoiding the use ofdjm1-164/+229
PAGE_(SIZE|SHIFT|MASK) defines that evaluate to variables on the sparc architecture; ok otto@ tested on my reanimated ss20
2008-12-31PAGE_SIZE is not a valid symbol to use in that way. In particular,deraadt1-235/+164
on sparc, it expands to something that just plain does not work, because the page size can be variable. Sorry we didn't spot this before. Backing it all out to allow sparc to build; please find a different way to fix it.
2008-12-30Remove mprotecting of struct dir_info introduced in previous commitdjm2-46/+4
(MALLOC_OPTIONS=L). It was too slow to turn on by default, and we don't do optional security. requested by deraadt@ grumbling ok otto@
2008-12-29extra paranoia for malloc(3):djm2-165/+278
Move all runtime options into a structure that is made read-only (via mprotect) after initialisation to protect against attacks that overwrite options to turn off malloc protections (e.g. use-after-free) Allocate the main bookkeeping data (struct dir_info) using mmap(), thereby giving it an unpredictable address. Place a PROT_NONE guard page on either side to further frustrate attacks on it. Add a new 'L' option that maps struct dir_info PROT_NONE except when in the allocator code itself. Makes attacks on it basically impossible. feedback tedu deraadt otto canacar ok otto
2008-12-23repair the ARC4 story; ok jmc djm millertderaadt1-5/+7
2008-12-22The example for detecting malicious PTR records could be easily misinterpreted.jacekm1-5/+4
Make it less ambiguous; ok gilles@ claudio@
2008-12-15shave off more bytes than you expect by declaring a few const local arraysotto1-4/+4
as static const
2008-12-09fix inet_ntop(3) prototype; ok millert@ libc to be bumbed very soonotto2-7/+7
2008-12-07Document that ethers_aton returns NULL for invalid addresses.weerd1-2/+4
Suggested by and ok claudio@, ok jmc@
2008-11-26Fix typo, okay jmc@.pedro1-3/+3
2008-11-24Correctly jump over routing headers and calculate the size of the if_dataclaudio1-7/+14
struct in the if_msghdr instead of using sizeof() blindly. This allows us to grow if_data without causing issues for the getifaddrs() users. OK deraadt@ (who needs this for some cool upcomming stuff)
2008-11-20move allocations between half a page and a page as close to the end ofotto2-4/+5
the page as possible (i.e. make malloc option P a default). ok art@ millert@ krw@
2008-11-20Reduce the leeway malloc allows when moving allocations to the end ofotto1-2/+2
a page to 0. P default will be changed in a separate commit. ok millert@ art@ krw@
2008-11-13To allow for easier playing with more strict settings introduceotto1-5/+14
a separate symbolic constant for the leeway we allow when moving allocations towards the end of a page. No functional change.
2008-11-12avoid a few strlen calls for constant strings; prompted by tg; ok djm@otto1-10/+10
2008-11-06if the freeprot flag (F) is set, do not do delayed frees for chunksotto1-6/+10
(might catch errors closer to the trouble spot) and junk fill pages just before reuse instead of immediate (we can't access the page anyway) since we set PROT_NONE in the F case. ok djm@
2008-11-03sync to openssl-0.9.8i;jmc1-18/+22
i still haven't folded in x509v3_config.pod, since i'm not entirely sure what to do with it.
2008-11-02fix markup of example line and description of G flag; partly from andotto1-5/+4
ok jmc@
2008-11-02remove distinction between warnings and errors, ok deraadt@ djm@otto2-73/+38
2008-10-29if MALLOC_STATS is defined, record how many "cheap reallocs" wereotto1-1/+8
tried and how many actually succeeded.
2008-10-20oops, assign errno the right way. caught by david running regress testsotto1-2/+2