summaryrefslogtreecommitdiff
path: root/src/lib/libc/string/wcscpy.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2014-11-27Avoid a NULL dereference in the DTLS client that can be triggered by ajsing2-2/+18
crafted server response used in conjunction with an anonymous DH or anonymous ECDH ciphersuite. Fixes CVE-2014-3510, which is effectively a repeat of CVE-2014-3470 in copied code. Reported by Felix Groebert of the Google Security Team. ok beck@ miod@
2014-11-26prefer memcmp to bcmp.bcook1-2/+2
ok tedu@ miod@ deraadt@
2014-11-26remove superflous gettimeofday wrapper.bcook2-18/+4
ok beck@ tedu@ miod@ guenther@ doug@ deraadt@
2014-11-26memset like a normal human.bcook2-20/+20
ok beck@ tedu@ miod@
2014-11-26normalize set/getsockopt usage.bcook6-90/+54
Remove the remaining random casts on optval. Fixups for this can be handled by the portability layer all in once place. Remove remaining fake socklen_t unions, though beck@ points out that this also removes support for socklen_t changing its length at runtime. RIP. ok tedu@ beck@ miod@ deraadt@
2014-11-26Linux has had IP_MTU since 2005, don't force it.bcook2-16/+8
ok beck@ miod@ tedu@ deraadt@
2014-11-25rand() is a pseudo-random number generatormillert1-3/+3
2014-11-25Don't describe random() as "better".millert1-5/+5
Remove the bug about rand() being faster. Add a bug about historical implementations seeding very poorly.
2014-11-25Warn people to use arc4random() in DESCRIPTION so they see it usingmillert1-5/+8
the same text from random.3.
2014-11-25rand48(3) not drand48(3) to align with the actual man page and Xrmillert1-3/+3
entries.
2014-11-25no need for md5 xrtedu1-3/+2
2014-11-25revert the bludgeoning of DES. if we need a thread safe crypt, maybe it'stedu1-31/+33
better to find one instead of continuing to mangle this mess.
2014-11-25push some global data down into functions to make this threadlier.tedu1-33/+31
only doing what's needed for crypt_hashpass. sigh.
2014-11-24introduce a hashspace define and check that there's enough space totedu1-15/+10
write out a hash. also simplify writing out the hash.
2014-11-24check crypt() for null. noticed by Jonas Termansentedu1-2/+2
2014-11-23Mention the -no_tls1_[12] optionsguenther1-6/+10
2014-11-22mop up a barely started project... getting in the way of grepping the tree!deraadt2-8/+0
2014-11-22Fix incorrect escape.bentley2-4/+4
2014-11-21MPE support, begone. ok teduderaadt2-4/+4
2014-11-21space needed between macro args and punctuation;jmc1-2/+2
2014-11-21add ERRORS, HISTORY, AUTHORS, Copyright year, and some missing macros;schwarze1-6/+39
ok tedu@ on a previous version
2014-11-21Let crypt_checkpass() set EACCES after bcrypt_checkpass() failure;schwarze1-2/+4
ok tedu@
2014-11-21change prototype for crypt_newhash. the login_cap_t is a holdover from itstedu2-15/+10
pwd_gensalt origins, but a string argument works equally work and is more friendly to consumers beyond local user accounts. ok deraadt
2014-11-20Oops, make sure camellia is compiled on platforms without an arch-specificmiod1-1/+2
Makefile.inc (i.e. landisk and m88k)
2014-11-20split crypt_checkpass off into a new filetedu3-36/+73
2014-11-20Document behavior of atexit() when called in a DSO that is later unloaded.guenther1-2/+14
Would be nice to document when/where this originated (in glibc?) if anyone knows... tweaks by schwarze@ ok jmc@ espie@ kettenis@ schwarze@ dimitry(at)google.com
2014-11-19Nuke yet more obvious #include duplications.krw2-6/+2
ok deraadt@
2014-11-19include camellia.h using the public include pathbcook2-4/+4
2014-11-19Fix a memory leak with pkey in client key exchangedoug2-2/+4
Based on boringssl commit: 1df112448b41c3568477f3fcd3b8fc820ce80066 ok miod@ jsing@
2014-11-18add crypt_newhash to NAME and add an MLINK;jmc2-4/+6
2014-11-18GOST regression tests; from Dmitry Eremin-Solenikovmiod3-1/+18
2014-11-18Argh, another bug introduced in r1.3; Dmitry Eremin-Solenikovmiod2-4/+4
2014-11-18Nuke more obvious #include duplications.krw1-2/+1
ok deraadt@ millert@ tedu@
2014-11-18Update the GOST code in libssl, as contributed by Dmitry Eremin-Solenikov.miod26-146/+594
This causes a libssl major version bump as this affects the layout of some internal-but-unfortunately-made-visible structs.
2014-11-18Enable the build of GOST routines in libcrypto. Riding upon the Cammeliamiod3-8/+6
libcrypto minor bump.
2014-11-18More missing error checks I forgot to commit last week, part of the largemiod2-24/+46
cleanup diff.
2014-11-18Return success in param_copy_gost01() if there is no private key to copy;miod2-4/+4
broken in r1.3. Spotted by Dmitry Eremin-Solenikov
2014-11-18further BUF_strdup conversion: these places should be safe to rely ontedu6-12/+12
the function argument not being NULL
2014-11-17Add the Cammelia cipher to libcrypto.miod27-30/+70
There used to be a strong reluctance to provide this cipher in LibreSSL in the past, because the licence terms under which Cammelia was released by NTT were free-but-not-in-the-corners, by restricting the right to modify the source code, as well retaining the right to enforce their patents against anyone in the future. However, as stated in http://www.ntt.co.jp/news/news06e/0604/060413a.html , NTT changed its mind and made this code truly free. We only wish there had been more visibility of this, for we could have had enabled Cammelia earlier (-: Licence change noticed by deraadt@. General agreement from the usual LibreSSL suspects. Crank libcrypto.so minor version due to the added symbols.
2014-11-17Make the ECDSA_SIG bowels public. This matches RSA_SIG and DSA_SIG, and wemiod4-60/+60
expect a good use for this knowledge in the tree in the near future. Contributed by Vincent Gross, thanks!
2014-11-17add new function crypt_newhash to simplify creating new hashes.tedu2-3/+46
does most of the work pwd_gensalt did, but also creates the hash. (unused yet)
2014-11-16Sort and group includes.jsing71-183/+317
2014-11-15Reduce instances of `` '' in manuals.bentley1-5/+5
troff displays these as typographic quotes, but nroff implementations almost always print them literally, which rarely has the intended effect with modern fonts, even in stock xterm. These uses of `` '' can be replaced either with more semantic alternatives or with Dq, which prints typographic quotes in a UTF-8 locale (but will automatically fall back to `` '' in an ASCII locale). improvements and ok schwarze@
2014-11-13Add many missing error checks (probably not exhaustive, but a good start):miod12-574/+976
- make VKO_compute_key() no longer void so that it can return failure. - fix unchecked allocations in too many routines to mention /-: - fix unchecked BN operations in gost2001_do_sign(), gost2001_do_verify(), VKO_compute_key(). - fix the gost2001_do_sign() interface violation by having its sole caller free the BIGNUM it passes to that function by itself, instead of having the callee do this. Reviewed (except for the last item) by Dmitry Eremin-Solenikov.
2014-11-13Sacrifice this code to the KNF deities.miod18-804/+802
2014-11-12Fix GOST TC26-B curve description.miod2-4/+4
2014-11-11f{read,write} take a number of items and an item size as arguments, andmiod4-28/+14
return the number of items read of written. When you intend to return the number of bytes actually processed, it is wise to pass 1 as the item size and the size as the number of items. But in *some* places, the OpenSSL does the opposite, and has extra logic to change a successful return of 1 (item processed) into the real size. And, guess why it does that? Because of old VMS, for they (used to) have a substandard stdio implementation. Note that this change causes the return values of BIO_dump_fp() and BIO_dump_indent_fp() to no longer be useless (actual number of callback calls), but actual bytes output. Given the irrelevance of the return value before, it is unlikely that anything depends upon it (and if something does, it probably has other problems in need for a fix...) ok tedu@ beck@ jsing@
2014-11-11correct the failure case for getentropy on win32bcook2-6/+6
CryptAcquireContext and CryptGenRandom returns zero (FALSE) if fails. From: Dongsheng Song <dongsheng.song@gmail.com>
2014-11-11Don't free garbage in ec_wNAF_mul() if wNAF could be allocated butguenther2-10/+22
other allocations in the same block couldn't. problem pointed out by David Ramos on the openssl-dev list ok miod@ doug@
2014-11-11delete extra word in Ndderaadt1-3/+3