summaryrefslogtreecommitdiff
path: root/src/lib/libc/string/wcsdup.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2014-05-19More KNF.jsing1-60/+60
2014-05-19More whack-a-mole^Wfips.jsing2-18/+1
ok miod@
2014-05-19It is perfectly valid to call free(NULL), so stop checking for non-NULLjsing29-128/+80
before calling free - of some course parts of the code already did this.
2014-05-19Enable the 3- and 4-byte sequence tests for UTF8_getc()guenther1-9/+18
Add surrogate and out-of-range tests for UTF8_putc() on the assumption we'll make it return -2. Maybe.
2014-05-18Add regression test for UTF8_{getc,putc}()guenther3-2/+317
2014-05-18If you need to allocate `a + b' bytes of memory, then don't allocate `a + b*2',miod6-12/+12
this is confusing and unnecessary. Help (coz I got confused) and ok guenther@ beck@
2014-05-18Make sure UTF8_getc() is invoked with the proper buffer size.miod2-4/+4
ok beck@ guenther@
2014-05-18factor out a bit of the chunk index code and use it to make sure that atedu1-14/+33
freed chunk is actually freeable immediately. catch more errors. hints/ok otto
2014-05-18Out of all the openssl apps, just one of them has code to mess around withjsing1-12/+0
electric fence externs. Nuke from orbit. ok miod@
2014-05-18W_OK comes via unistd.h - nuke several #ifndef W_OK that attempt to handlejsing1-13/+2
missing defines.
2014-05-18Remove unused include.jsing3-3/+0
2014-05-18Group and sort includes.jsing50-214/+308
Currently "apps.h" needs to be included before any of the openssl headers and there are several cases where the code depends on headers that are included by something included by apps.h... More untangling saved for later on.
2014-05-18Plug memory leaks upon error in OCSP_url_svcloc_new().miod2-12/+18
ok jsing@
2014-05-18In OCSP_sendreq_bio(), cope with OCSP_sendreq_new() returning NULL.miod2-8/+12
ok jsing@
2014-05-18In dtls1_reassemble_fragment() and dtls1_process_out_of_seq_message(), in casemiod2-14/+6
of error, make sure we do not free pitem which is still linked into the pqueue. In the same vain, only free `frag' if we allocated it in this function. Help and ok beck@
2014-05-18In ssl3_send_certificate_request(), when adding the extra payload ifmiod2-2/+12
NETSCAPE_HANG_BUG is defined, make sure we BUF_MEM_grow() the buffer to accomodate for the payload size. Issue reported by David Ramos; ok beck@
2014-05-18Make sure ssl3_setup_buffers() does not return upon error with a freedmiod2-14/+14
pqueue still chained, by inserting it into the list only after all possible failure conditions have been avoided. Reported and fix proposed by David Ramos; ok beck@
2014-05-18bio_err is initialised in main, hence there is no need to initialise itjsing46-168/+16
in each application (since there is no longer a non-monolithic mode). In typical OpenSSL fashion, the code is inconsistent and there are multiple ways that bio_err was initialised - none of them actually checked to see if the initialisation actually succeeded. Additionally, it is worth noting that in at least two cases bio_err was also being used before it would have been initialised. ok miod@
2014-05-18More KNF.jsing20-386/+416
2014-05-18Omit -Werror if building with gcc3, for it triggers "redefinition of `pqueue'"miod1-2/+6
warnings now that pqueue.h has been removed from public scope.
2014-05-18No need to check for NULL before invoking free(); use calloc() whenmiod2-60/+14
applicable; further simplify pqueue_find(). From Dimitris Papastamos on tech@
2014-05-18sync openssl(1) with changes already made in src/lib/libssl/doc, reminded bysthen1-5/+5
jmc: move from 1024 to 2048 bit key defaults; see genrsa.c 1.26 et al.
2014-05-17does sunos not have memmove? sorry, i guess sunos will not have libressl.tedu2-42/+6
ok guenther miod
2014-05-17unchecked malloc() return value in OCSP_sendreq_new().miod2-0/+4
2014-05-17KNFmiod16-2548/+2664
2014-05-17add missing header needed for mem{cpy,cmp}()chl1-0/+1
ok tedu@
2014-05-17correctly match size and buffer. from enh at googletedu1-3/+3
2014-05-17simple reallocarray to check multiplies. ok guenthertedu2-12/+8
2014-05-17no no md2tedu9-57/+0
2014-05-17no no seedtedu4-34/+0
2014-05-17deleted seed some time agotedu13-295/+0
2014-05-17Add missing header needed by isdigit().chl1-4/+5
While there, sort headers. ok tedu@
2014-05-17refactor some of the des crypt code to use fewer globals.tedu2-42/+45
ok miod
2014-05-17switch RSA key generation default to 2048 bits (matching ssh); ok miod@sthen5-5/+5
2014-05-16update NAME and MLINKS for previous;jmc2-5/+7
2014-05-16document crypt_checkpasstedu1-1/+14
2014-05-16Include openssl/evp.h for OPENSSL_add_all_algorithms_noconf().jsing1-0/+1
From Brent Cook.
2014-05-16Fix various issues that result in compiler warnings.jsing1-13/+14
Prompted by a diff from Brent Cook.
2014-05-16When OPENSSL_LOAD_CONF was added it ended up with more #if 0 code,jsing7-190/+30
more #ifdefs and a new source file that contains a single function. Nuke the #if 0 code that is now a macro and move the single function in evp_acnf.c to c_all.c, which is where the other code lives. While here, tidy evp.h slightly, remove an unnecessary #ifdef __OpenBSD__ and nuke a comment that is now a lie. ok miod@
2014-05-16use $2b in the bcrypt example, ok tedusthen1-3/+3
2014-05-15Fix memory leaks upon failure.miod4-54/+78
ok beck@
2014-05-15Replace ASN1_GENERALIZEDTIME_adj(), ASN1_UTCTIME_adj() andmiod6-50/+146
ASN1_TIME_to_generalizedtime() with wrappers around their former implementations, making sure memory allocated is freed in all failure cases. help and ok from beck@ and Brendan MacDonell.
2014-05-15No longer make pqueue.h a public (and installed) header file. Replace itsmiod7-6/+12
inclusion in <ssl/dtls1.h> by the benign `struct _pqueue; typedef struct _pqueue *pqueue;'. Note that said dtls1.h should probably be considered a private header as well... ok beck@
2014-05-15Get pqueue.h from the libssl sources rather than relying upon it beingmiod2-2/+4
installed.
2014-05-15More KNF.jsing8-14/+14
2014-05-15Add additional chacha20-poly1305 test vectors.jsing2-10/+620
Thanks to Piotr Sikora for providing a reference to the source.
2014-05-15Use C99 initialisers for the AEAD struct.jsing2-18/+18
2014-05-15Add chacha20-poly1305 test vector to regress.jsing2-5/+24
2014-05-15KNF.jsing2-140/+134
2014-05-15Add a ChaCha20-Poly1305 AEAD EVP implementation to libcrypto, from Adamjsing7-2/+546
Langley's Chromium OpenSSL patches. ok miod@