summaryrefslogtreecommitdiffstats
path: root/lib/libc (follow)
Commit message (Collapse)AuthorAgeFilesLines
* - don't use the function enclosure macros.wcobb2002-10-161-32/+38
| | | | | - replace `POSIX 1003.2' instances with St -p1003.2. ok mpech@, millert@
* Replace "if (value != NULL && value == as->FOO)" with justmillert2002-10-161-6/+6
| | | | | "if (value == as->FOO)" -- NULL needs no special handling. Pointed out by Paul Borman.
* Implement isfdtype(3) as per the POSIX.1g draft; requested by David Hillmillert2002-10-164-12/+131
|
* Fix typo introduce in last commitmillert2002-10-151-2/+2
|
* cast NULL varargs sentinel to char * so it is 64 bit on alpha & sparc64millert2002-10-151-5/+5
|
* Document the fact that calling auth_setitem() with a NULL valuemillert2002-10-151-4/+13
| | | | clears (frees) the corresponding value in the auth session.
* If auth_setitem() is called with the current value (ie: the pointermillert2002-10-151-9/+11
| | | | | | | | | | | | is the same as the private value) then just return 0 as there is nothing to do. This fixes a potentially nasty problem where the caller could grab the username or style from the auth session via auth_getitem() and then call auth_verify() with those values. auth_setitem() would eventually get called which would make a private copy and free the old values in the auth session. After all this, the stashed username and/or style pointers would point to freed memory.
* Note that when calling auth_verify() with a style and/or username,millert2002-10-151-1/+6
| | | | | the old values in the auth session will get freed and the new values added.
* Cast NULL sentinel in auth_call() to a pointermillert2002-10-151-2/+2
|
* Move the clearing of as->state in auth_challenge() to after the sanitymillert2002-10-131-7/+6
| | | | | checks. The check for "as != NULL" is useless if you have already dereferenced "as". Also fix some comment typos. From Moritz Jodeit.
* Use strtoll() and strtoull() instead of strtoq() and strtouq() nowmillert2002-10-091-4/+4
| | | | that we have them as per the original BSDi code.
* .Xr ipcs 1henning2002-10-072-2/+6
| | | | | | | | .Xr ipcrm 1 grendel at zeitbombe dot org some input millert ok millert ian theo
* name space pollution; after art@mickey2002-10-072-18/+18
|
* kick, kick. Fix these files which did not come from NetBSD, but thedrahn2002-10-0714-6/+375
| | | | powerpc port by Dale Rahn.
* clean up ifdefs for PIC, resulting code unchanged.drahn2002-10-071-6/+3
|
* s/curbrk/__curbrk/ as suggested by art, a few _ASM_LABEL added as appropriate.drahn2002-10-072-14/+14
|
* Simpler, smaller, more efficient and equivalent.drahn2002-10-071-13/+2
|
* cerror -> __cerror as suggested by art, with a couple of missing _ASM_LABEL()drahn2002-10-076-10/+10
| | | | added as appropriate.
* curbrk -> __curbrk on sparc to avoid name space pollution.art2002-10-062-12/+12
|
* Rename curbrk to __curbrk on i386 to avoid namespace pollution.art2002-10-062-12/+12
|
* Rename curbrk to __curbrk on alpha to avoid namespace pollution.art2002-10-062-9/+9
|
* Rename cerror to __cerror on i386 to avoid namespace pollution.art2002-10-068-23/+23
|
* Rename cerror to __cerror on alpha to avoid namespace pollution.art2002-10-062-6/+6
|
* missing arg; peterw@ifost.org.auderaadt2002-09-251-2/+2
|
* Document FD_CLOEXEC; from FreeBSD (Peter Jeremy)millert2002-09-191-7/+14
|
* fix Xr refs; frisco@blackant.netderaadt2002-09-183-6/+6
|
* Fix license and conformance with man page.smurph2002-09-184-53/+369
|
* uncommit, since it breaks macppc libc. millert and miod have now said theyderaadt2002-09-178-24/+37
| | | | | | did NOT approve those for commit. why did mickey feel he was ok to go commiting a set of diffs which had not been passed around and tested by people? we don't know. mickey, have you got something to say for yourself?
* move __syscall prototype into unistd.h (like everybody else) and avoid private protos for it everywhere; millert@ okmickey2002-09-178-37/+24
|
* mickey, did you not look at the output?deraadt2002-09-171-1/+2
|
* typoitojun2002-09-171-3/+3
|
* correct possible buffer overrun in setlocale(x, y) where y is supplied fromitojun2002-09-171-59/+97
| | | | outside. see NetBSD SA2002-012.
* Move __cleanup into mprotect'ed page to prevent unintentional modificationsdhartmei2002-09-147-28/+82
| | | | similar to the atexit handlers. Idea and help deraadt@, ok deraadt@
* bye bye.fgsch2002-09-111-5/+0
|
* remove extra output of \n in clnt_perror()deraadt2002-09-101-2/+2
|
* better, faster scooter; fix cerror in mi somedaymickey2002-09-101-9/+3
|
* mi versions are good enoughmickey2002-09-103-348/+4
|
* ansi pedantic. ok deraadt@jakob2002-09-071-11/+12
|
* missing include, ok theohenning2002-09-061-1/+2
|
* use socklen_t where needed; henning pvalchev okderaadt2002-09-067-17/+18
|
* spellingderaadt2002-09-041-2/+2
|
* re-enable function pointer table protection, this time make sure thatdhartmei2002-08-303-71/+92
| | | | | malloc.c gets the first mmap() call (since it depends on that, for its sbrk(0) use). ok deraadt@
* clean; gwyllion@ace.ulyssis.orgderaadt2002-08-291-2/+1
|
* Limit UDP payload size for EDNS0 to 0xffff, not use lower 16bit value.itojun2002-08-281-2/+4
| | | | from onoe@sm.sony.co.jp
* sync from libkern (where the major fix was done or the kernel piece of this)mickey2002-08-271-18/+22
|
* allocate 64K recieve buffer for DNS responses.itojun2002-08-273-48/+78
|
* deal with negative return value from snprintf.itojun2002-08-231-3/+5
|
* do not lose errnoderaadt2002-08-221-1/+6
|
* tweakderaadt2002-08-222-8/+8
|
* drop AAAA reply with IPv4 mapped address. sync w/kameitojun2002-08-222-2/+18
| | | | draft-itojun-v6ops-v4mapped-harmful-00.txt