summaryrefslogtreecommitdiff
path: root/src/lib/libc/string/index.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2013-04-17the tiniest of style tweakstedu1-7/+7
2013-04-17add some prototypes, casts, includes, parenthesis, and whatnot totedu3-7/+10
silence some warnings.
2013-04-17use CLOCK_MONOTONIC, and repair future time_t overflowderaadt1-8/+8
ok millert guenther
2013-04-05- Add comments regarding copies of these files also in libexec/ld.sokurt1-1/+3
okay guenther@
2013-04-03Update a comment about standards requirementsguenther1-4/+4
2013-04-03Set the stream orientation in open_{,w}memstream().guenther1-1/+15
Check it in the regress test ok mpi@
2013-04-01tweak makefile now that asr is built by default.eric1-10/+10
2013-04-01add hostnames which triggered some bugs.eric1-2/+2
2013-03-31getaddrinfo is now thread-safe.brad1-6/+2
ok eric@
2013-03-28Switch libc and libm to use strong aliases rather than weak aliasesmartynas2-22/+4
where appropriate. Among other things makes the symbols consistent across all architectures (notably where ldbl mantissa is 53 bits). While at it, kill unused LINTLIBRARY/PROTOLIB1 cruft which was there to trick lint into recording the right prototypes for aliased functions. Most of the work done at the awesome n2k13 hackathon. Agreed by kettenis@, guenther@, matthew@.
2013-03-28add a test case for the icmpv6 issue spotted by naddyeric4-10/+26
2013-03-28More tests for negative seeks, prodded by matthew@mpi2-2/+63
2013-03-27More test cases, especially when opening the stream in append an writempi1-8/+113
modes.
2013-03-26protect the PRG state with a mutex in res_randomid().eric1-2/+13
ok deraadt@ guenther@ djm@
2013-03-25Add some more tests; prodded by mpi@guenther1-12/+58
2013-03-20Use a realloc() loop around the sysctl() for NET_RT_IFLIST, in case anderaadt1-9/+21
interface is added at just the right... wrong moment. ok millert dlg
2013-03-20Don't shutdown nc(1)'s network socket when stdin closes. Matches *Hobbit*'ssthen2-7/+17
original netcat and GNU netcat; revert to old behaviour with the new -N flag if needed. After much discussion with otto deraadt tedu and Martin Pelikan. ok deraadt@
2013-03-15threadsafe random().tedu1-8/+43
reported by ajacoutot and (much earlier, sorry) by Alexey Suslikov
2013-03-12Add check that mkstemp() fails with EINVAL if the string has fewer thanguenther1-4/+13
6 Xs
2013-03-12All accept() errors are considered fatal, until someone gives a differentderaadt1-4/+5
reason. No code changed, just documenting it...
2013-02-14cherry pick bugfixes for http://www.openssl.org/news/secadv_20130205.txtmarkus30-557/+2564
from the openssl git (changes between openssl 1.0.1c and 1.0.1d). ok djm@
2013-01-26remove ACSS, crank libcrypto major; ok markus@ deraadt@djm14-882/+4
2013-01-15Don't pull <math.h> just because it can return HUGE_VAL in themartynas1-3/+2
corner cases. OK millert@.
2013-01-01Simple tests for fmemopen(3) and open_memstream(3)mpi4-0/+175
2012-12-22Fix bug in random offset introduced in rev 1.143; random range wasotto1-3/+3
expanded, but not enough due to precedence error. Spotted by Thorsten Glaser.
2012-12-17add test case for gethostbyname() called with numeric hostnameeric1-1/+2
2012-12-16- use diff -u like most anywhere to make the output readable.jasper1-2/+2
ok phessler@
2012-12-12document RES_USE_DNSSEC; text tweaked by sthenjmc1-2/+6
ok jakob
2012-12-05Remove excessive sys/cdefs.h inclusionderaadt2-5/+2
ok guenther millert kettenis
2012-12-05no need for .Pp before lists;jmc1-3/+2
2012-12-04Rewritten posix_openpt manual that doesn't include any of the POSIXmillert1-74/+49
text. OK deraadt@
2012-12-04Use "path name" not "pathname".millert1-3/+3
2012-12-04remove some unnecessary sys/param.h inclusionsderaadt1-3/+1
2012-12-03Simple emulation of POSIX pty APIs posix_openpt(), ptsname(),millert4-6/+414
grantpt() and unlockpt() using /dev/ptm. Man pages from FreeBSD. OK kettenis@ deraadt@ beck@ ajacoutot@ naddy@
2012-12-03New CA root certificates, ok beck@.sthen1-99/+1705
- additional cert's from GlobalSign. - additional cert's from VeriSign and replace existing ones with 'Signature Algorithm: md2WithRSAEncryption' with their currently distributed sha1WithRSAEncryption versions. - new CAs: AddTrust (root for most Comodo certificates also heavily used in academic networks), Comodo (most of their certs are rooted in AddTrust but TERENA use the Comodo AAA Certificate Services root for some things so add that separately), UserTrust Network/UTN (part of Comodo) and Starfield (part of Go Daddy).
2012-12-01Additional CA root certificates: GeoTrust/Equifax, Go Daddy, StartCom, thawte.sthen1-0/+1187
ok beck@ william@ todd@
2012-11-30Regenerate the text information for all certificates with recent opensslsthen1-439/+465
and include sha1 signatures for all certs (some were missing). No certificate changes, this is just for consistency. ok beck@
2012-11-30Remove retired Thawte/Verisign certificates.sthen1-499/+0
Remove intermediate GoDaddy certificate, this file should just contain roots. ok beck@ phessler@
2012-11-30Document a known bug in the DES crypt cipher implementation which we'restsp1-2/+6
not going to fix in order to stay compatible with legacy password data. Nobody should use DES crypt anyway these days. See http://www.freebsd.org/security/advisories/FreeBSD-SA-12:02.crypt.asc for details about this bug. Discussed with deraadt and beck about half a year ago (I'm pruning Ms from my tree).
2012-11-29- put the various options into the same order as those in resolv.hjmc1-17/+38
- sync RES_DEBUG with resolv.conf.5 - document RES_PRIMARY, but mark it unsupported (like we already do for RES_AAAONLY) - use the exact same text (about being enabled by default) for RES_RECURSE as for the other two defaults - document RES_INSECURE{1,2} - description lifted from resolv.conf.5 - document RES_NOALIASES - mostly sync the RES_USE_EDNS0 text with resolv.conf.5 - RES_USE_DNSSEC not documented for now. something to come... ok sthen
2012-11-19remove some useless Tn and double punctuation;jmc1-16/+7
2012-11-19RES_IGNTC is no longer ignored; ok sthenjmc1-4/+4
2012-11-18Ensure that the base provided to strtol(3) is between 2 and 36 inclusive,jsing1-1/+12
or the special value of 0. ok deraadt@ otto@
2012-11-18Add a regress test for strtol, which currently fails.jsing3-2/+86
ok otto@
2012-11-10Per POSIX, fix raise() and abort() to send the signal to the current thread.guenther1-3/+5
Should make coredumps from abort() easier to debug too. ok kurt@
2012-11-02Add a new malloc option 'U' => "Free unmap" that does the guarding/djm2-18/+36
unmapping of freed allocations without disabling chunk randomisation like the "Freeguard" ('F') option does. Make security 'S' option use 'U' and not 'F'. Rationale: guarding with no chunk randomisation is great for debugging use-after-free, but chunk randomisation offers better defence against "heap feng shui" style attacks that depend on carefully constructing a particular heap layout so we should leave this enabled when requesting security options.
2012-10-31On amd64 OPENSSL_cpuid_setup and OPENSSL_ia32cap_P are now hidden so we don'tkettenis8-18/+10
have to go through the PLT/GOT to get at them anymore. In fact going through the GOT now fails since we no longer have a GOT entry for OPENSSL_ia32cap_P. Fixes the problem spotted by jasper@ and sthen@. Based on a diff from mikeb@ who did most of the actual work of tracking down the issue. ok millert@, mikeb@
2012-10-22Restore r1.10, lost during last update:miod2-2/+2
Disable use of dladdr() on a.out arches, they do not provide it (yet);
2012-10-13Makefile and header changes for OpenSSL-1.0.1cdjm20-139/+361
major cranks
2012-10-13import files that CVS missed; sighdjm10-0/+1498