summaryrefslogtreecommitdiffstats
path: root/lib/libc/net
Commit message (Collapse)AuthorAgeFilesLines
* MFC r310984,r311102:ngie2017-01-091-8/+4
| | | | | | | | | | r310984: Use calloc instead of malloc + memset(.., 0, ..) r311102 (by pfg): Cleanup inelegant calloc(3) introduced in r310984.
* Merge rr309688: address regressions in SA-16:37.libc.glebius2016-12-071-6/+5
| | | | | PR: 215105 Submitted by: <jtd2004a sbcglobal.net>
* Merge r309639 from head:glebius2016-12-061-17/+34
| | | | | | | | | | | Fix possible buffer overflow(s) in link_ntoa(3). A specially crafted sockaddr_dl argument can trigger a static buffer overflow in the libc library, with possibility to rewrite with arbitrary data following static buffers that belong to other library functions. Reviewed by: kib Security: FreeBSD-SA-16:37.libc
* MFC r297790:ngie2016-12-034-5/+6
| | | | | | | | | | | r297790 (by pfg): libc: replace 0 with NULL for pointers. While here also cleanup some surrounding code; particularly drop some malloc() casts. Found with devel/coccinelle.
* MFC r305144ache2016-09-052-2/+2
| | | | | | | | 'addrlen' does not matter when we need to find the first non-zero bit in the byte from the left and 'addrlen' already counted in 'lim'. PR: 212121 Submitted by: Herbie.Robinson@stratus.com
* MFC r305133ache2016-09-031-0/+19
| | | | | Apply the same qsort() usage fix as in r304911 getaddrinfo.c qsort() can't be stabilized with just return(-1) alone.
* MFC r304911ache2016-08-301-0/+19
| | | | | | | | | | | | | The formal behavior of qsort is unstable with regard to objects that are equal. Unfortunately, RFC 3484 requires that otherwise equal objects remain in the order supplied by the DNS server. The present code attempts to deal with this by returning -1 for objects that are equal (i.e., returns that the first parameter is less then the second parameter). Unfortunately, the qsort API does not state that the first parameter passed in is in any particular position in the list. PR: 212122 Submitted by: Herbie.Robinson@stratus.com
* MFstable/11 r304945:ngie2016-08-291-3/+5
| | | | | | | | | | | | | MFC r304034: Initialize `ai` to NULL and test for `ai` with type-appropriate values Depending on the address family and ai_flags containing AI_V4MAPPED, it might not do a proper DNS lookup on the provided DNS address Convert some `ai` boolean true/false checks to NULL/non-NULL while here. PR: 211790
* MFC r301708:ngie2016-07-081-2/+2
| | | | | | | | | Revert r301707 getnetent_p doesn't return NULL like getnetent does. coccinelle got confused and I didn't verify that it worked before committing the change Pointyhat to: ngie
* MFC r301707:ngie2016-07-081-2/+2
| | | | | | | Use NULL instead of `0` in _ht_getnetbyname(..) - getnetent returns NULL on completion/error. - .h_aliases is NULL terminated.
* MFC r299922truckman2016-05-231-1/+0
| | | | | | | | Don't call free_addrselectpolicy(&policyhead) before policyhead has been initialized. Reported by: Coverity CID: 1018727
* MFC r268620,r294876,r294877:bdrewery2016-03-121-6/+3
| | | | | | | | | r268620: Make generation of nslexer.c more robust. r294876: nslexer.c does not depend on nsparser.h. r294877: Replace nslexer.l->nslexer.c custom rule with a -D CFLAG.
* MFC r294694:tuexen2016-01-271-2/+7
| | | | sctp_sendx() needs to provide the assoc_id back.
* MFC r294688:tuexen2016-01-271-0/+7
| | | | sctp_sendv() needs to fill in the association id on return.
* MFC r287619:tuexen2016-01-161-2/+0
| | | | | | | | | Zero out a local variable also when PURIFY is not defined. This silence a warning brought up by valgrind whenever if_nametoindex is used. This was already discussed in PR 166483, but the code committed in r234329 guards the initilization with #ifdef PURIFY. Therefore, valgrind still complains. Since this code is not performance critical, always zero out the local variable to silence valgrind.
* MFC r292719:ume2016-01-012-57/+0
| | | | | Remove _gethostbynisname() and _gethostbynisaddr(). These functions used to be called from getipnodebyname().
* MFC r292550, r292595:ume2015-12-291-12/+4
| | | | | Simplify _map_v4v6_address(). We don't need to use a temporary buffer, here.
* MFC r292445, r292554:ume2015-12-282-8/+6
| | | | Use _map_v4v6_address().
* MFC r292539:ume2015-12-281-1/+6
| | | | | | | If we end up following a CNAME chain that does not find any data return that instead of internal error. PR: 156684
* MFC r292514:ume2015-12-271-8/+8
| | | | | | addrinfo.ai_family is an address family, not a protocol family. PR: 162434
* Add AI_V4MAPPED and AI_ALL support for getaddrinfo(3).ume2015-12-252-28/+176
| | | | PR: 198092
* MFC r292129:ume2015-12-191-1/+1
| | | | | | | | | RFC 3493 requires ignoring the loopback address for AI_ADDRCONFIG. Since it breaks certain jail setup, we ignore just 127.0.0.1 instead of whole loopback address range. PR: 192014 Reviewed by: hrs
* MFC r292059:ume2015-12-171-1/+2
| | | | | | | | The calls to RES_SET_H_ERRNO() macro on error paths wind up dereferencing an uninitialized res. PR: 202142 Submitted by: Sean Boudreau
* MFC 288833:jgh2015-10-141-7/+6
| | | | | | | | | PR: 203440 (based on) Submitted by: ceratv@rpi.edu Approved by: wblock@ (mentor) Differential Revision: https://reviews.freebsd.org/D3813 - address grammar
* MFC 287349,287404:hrs2015-09-131-7/+15
| | | | | | | | | - Print sdl->sdl_data when sdl->sdl_nlen > 0 && sdl->sdl_alen == 0 as link_ntoa(3) does. - snprintf() returns at most size-1 of the chars printed into the buffer. (n == hostlen) also means the buffer length was too short.
* MFC 287595:hrs2015-09-131-12/+8
| | | | | | | - Fix SIGSEGV when sa == NULL. NULL check in getnameinfo_inet() did not work as expected. - Simplify afdl table lookup.
* MFC r287292:kib2015-09-051-5/+6
| | | | | | | | | | Switch libc from using _sig{procmask,action,suspend} symbols, which are aliases for the syscall stubs and are plt-interposed, to the libc-private aliases of internally interposed sigprocmask() etc. MFC r287300: Use libthr interposed functions instead of syscalls, in posix_spawn()' child.
* MFC r286910:delphij2015-09-011-10/+5
| | | | | | | | - ANSIfy - Remove the redundant _PATH_RSH definition (paths.h at r96194); - Use pid_t for PIDs - Note that we are at the same level of OpenBSD's counterpart of revision 1.7 (r94757).
* MFH (r275020): partial fix for getgrouplist() in group_compat casedes2015-07-091-9/+16
| | | | | PR: 190055 Approved by: re (marius)
* MFC r284386:tuexen2015-06-171-2/+2
| | | | Fix name of a constant.
* MFC r281884:tuexen2015-05-291-3/+3
| | | | | | A complete user message is signalled with the MSG_EOR flag, not the MSG_EOF flag. Thanks to Valentin Nechayev for reporting the issue.
* MFC r280782:tuexen2015-05-291-0/+1
| | | | | | | | Add an SCTP symbol which was missed in https://svnweb.freebsd.org/base?view=revision&revision=169622 This fixes https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=197783 Thanks to Jukka Ukkonen for reporting the bug and providing a fix.
* MFC r279859:tuexen2015-05-291-0/+3
| | | | Add a SCTP socket option to limit the cwnd for each path.
* MFC r275857:tuexen2015-05-291-1/+4
| | | | | | | Initilize the msg_flags field consistently in all code paths. Reported by: Coverity CID: 1018726
* MFC r275682:tuexen2015-05-291-1/+1
| | | | Fix a typo reported by Lennart Grahl.
* MFC r275163: ANSIfy b64_ptonemaste2015-03-231-4/+1
|
* MFC r275060: Fix b64_pton output buffer overrun test for exact-sized bufferemaste2015-03-231-7/+15
| | | | | b64_pton would sometimes erroneously fail to decode a base64 string into a precisely sized buffer. The overflow check was a little too greedy.
* MFC r269945:tuexen2014-08-221-0/+6
| | | | | | | | Add support for the SCTP_PR_STREAM_STATUS and SCTP_PR_ASSOC_STATUS socket options. This includes managing the correspoing stat counters. Add the SCTP_DETAILED_STR_STATS kernel option to control per policy counters on every stream. The default is off and only an aggregated counter is available. This is sufficient for the RTCWeb usecase.
* MFC r269858:tuexen2014-08-221-0/+7
| | | | | Add support for the SCTP_AUTH_SUPPORTED and SCTP_ASCONF_SUPPORTED socket options. Add also a sysctl to control the support of ASCONF.
* MFC r269527:tuexen2014-08-221-0/+3
| | | | | Add support for the SCTP_RECONFIG_SUPPORTED and the corresponding sysctl controlling the negotiation of the RE-CONFIG extension.
* MFC r269481:tuexen2014-08-221-0/+3
| | | | | | Add support for the SCTP_PKTDROP_SUPPORTED socket option and the corresponding sysctl variable. The default is off, since the specification is not an RFC yet.
* MFC r269475:tuexen2014-08-221-0/+3
| | | | | | | Add SCTP socket option SCTP_NRSACK_SUPPORTED to control the NRSACK extension. The default will still be off, since it it not an RFC (yet). Changing the sysctl name will be in a separate commit.
* MFC r269448:tuexen2014-08-221-0/+3
| | | | | | Add support for the SCTP_PR_SUPPORTED socket option as specified in http://tools.ietf.org/html/draft-ietf-tsvwg-sctp-prpolicies Add also a sysctl controlling the default of the end-points.
* MFC r269436, r269445:tuexen2014-08-221-0/+3
| | | | | | | | Cleanup the ECN configuration handling and provide an SCTP socket option for controlling ECN on future associations and get the status on current associations. A simialar pattern will be used for controlling SCTP extensions in upcoming commits.
* MFC r269695:pfg2014-08-161-1/+1
| | | | | | | Const-ify character string Obtained from: Apple Inc. (Libc 997.90.3) MFC after: 3 days
* MFC r268867, r268878:pfg2014-08-031-1/+2
| | | | | | Use more consistent type for optlen in getsourcefilter() Proposed by: bde
* MFC 264162: Accept RFC 2292 option values so that RFC 2292 compliantmarcel2014-08-031-6/+18
| | | | | | programs that are unaware of RFC 3542 can construct control messages. Obtained from: Juniper Networks, Inc.
* MFC r267912, r267915:ume2014-07-031-13/+29
| | | | | | | - Exclude loopback address rather than loopback interface. - style(9) Spotted by: melifaro
* MFC r267800:ume2014-06-301-1/+2
| | | | | Exclude IPv4 address from doing longest match. It prevented DNS based load balancing.
* MFC r267616, 267640:ume2014-06-251-29/+62
| | | | | | | | | | | | | | | Retooling addrconfig() to exclude addresses on loopback interfaces when looking for configured addresses. This change is based upon the code from the submitter, and made following changes: - Exclude addresses assigned on interfaces which are down, like NetBSD does. - Exclude addresses assigned on interfaces which are ifdisabled. Use SOCK_CLOEXEC. PR: 190824 Submitted by: Justin McOmie
OpenPOWER on IntegriCloud