summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* There is no point in checking if a pointer is non-NULL before calling free,jsing2014-05-2826-320/+168
| | | | | | | | since free already does this for us. Also remove some pointless NULL assignments, where the result from malloc(3) is immediately assigned to the same variable. ok miod@
* More KNF.jsing2014-05-282-6/+4
|
* Fix a Y2038 problem, by conversion of long to time_t.deraadt2014-05-274-36/+16
| | | | | | | | | The TS_RESP_CTX_set_time_cb() API gets removed. Nothing in the greater ecosystem ever calls it. This API needs to be removed, because if anyone ever calls on a BE 32 system assuming long rather than time_t, it will be dangerously incompatible. ok miod guenther
* Remove unused defines.miod2014-05-272-18/+0
|
* Remove redundant test introduced in s3_pkt.c on 20001225, which got cargo-cultedmiod2014-05-274-10/+8
| | | | (with an XXX comment, though) in d1_pkt.c in 2005.
* Wrap some long lines.jsing2014-05-272-8/+16
|
* Remove MemCheck_{on,off} that escaped last time around.jsing2014-05-272-8/+0
|
* More KNF.jsing2014-05-273-5/+6
|
* Fix ia64 cross-gcc target.tobiasu2014-05-272-0/+6
| | | | | | opensslconf.h is just a dummy, we're lightyears away from working userspace. ok deraadt@
* Replace the following logic:miod2014-05-264-68/+98
| | | | | | | | | | | | | | | | | | | | | if (nothing to allocate) ptr = malloc(1) else { if ((ptr = malloc(size to allocate)) memcpy(ptr, data to copy, size to allocate) } if (ptr == NULL) OMG ERROR with a saner logic where the NULL pointer check if moved to the actual malloc branch, so that we do not need to malloc a single byte, just to avoid having a NULL pointer. Whoever thought allocating a single byte was a smart idea was obviously not taking his meds. ok beck@ guenther@
* Unchecked malloc() return value in SSL_COMP_add_compression_method(), in themiod2014-05-262-0/+8
| | | | | !OPENSSL_NO_COMP case. Does not affect OpenBSD as we compile the opposite code path.
* We don't really to keep history in constructs such as:miod2014-05-264-24/+2
| | | | | | | | #if 1 /* new with openssl 0.9.4 */ current code; #else obsolete code; #endif
* tls_decrypt_ticket(): memory leak and uncleaned EVP_CIPHER_CTX upon error.miod2014-05-262-2/+8
|
* Make sure all error paths in dtls1_buffer_record() invoke SSLErr bymiod2014-05-262-40/+24
| | | | | | factoring error handling. ok jsing@
* There is no need to include <openssl/e_os2.h> here, except for the factjsing2014-05-265-5/+2
| | | | | that it brings in <openssl/opensslconf.h>, so just do that instead (currently via apps.h).
* Update the aead regress to work with the improved EVP AEAD API.jsing2014-05-261-22/+14
|
* Implement an improved version of the EVP AEAD API. Thejsing2014-05-2610-212/+218
| | | | | | | | | | | | | | | | EVP_AEAD_CTX_{open,seal} functions previously returned an ssize_t that was overloaded to indicate success/failure, along with the number of bytes written as output. This change adds an explicit *out_len argument which is used to return the number of output bytes and the return value is now an int that is purely used to identify success or failure. This change effectively rides the last libcrypto crank (although I do not expect there to be many users of the EVP AEAD API currently). Thanks to Adam Langley for providing the improved code that this diff is based on. ok miod@
* Use C99 initialisers for BIO_METHOD.jsing2014-05-262-18/+18
|
* KNF.jsing2014-05-266-720/+958
|
* repair some KNF missed by the script; ok jsingderaadt2014-05-262-12/+20
|
* KNF.jsing2014-05-2614-1076/+1312
|
* KNF.jsing2014-05-2612-2886/+3110
|
* move all stats collecting under MALLOC_STATS; ok krw@otto2014-05-261-28/+33
|
* Fix resource descriptor leaks.logan2014-05-251-0/+4
| | | | | | CID: 966576 & 966577 OK from guenther@ and "Yup. looks good." from tedu@
* -noout mentions a CRL, which is incorrect. Use "no output of encoded sessionlogan2014-05-251-1/+1
| | | | | | | | info." instead. From Martin Kaiser. OK from tedu@
* heartbearts->heartbeats fixlogan2014-05-252-2/+2
| | | | | | From Marcos Marado: OK from tedu@
* calloc instead of malloc/memset. from Benjamin Baiertedu2014-05-2526-80/+42
|
* "for every change..."tedu2014-05-252-2/+2
|
* remove OPENSSL_memcmp before somebody tries to use it. ok beck miodtedu2014-05-252-12/+0
|
* remove OPENSSL_isservice. not used internally, no sane posix software willtedu2014-05-252-12/+0
| | | | | call it, and windows service software can figure this out on its own. ok beck miod
* remove unused shit. from Alexander Schrijvertedu2014-05-258-42/+4
|
* define LIBRESSL_INTERNAL, and use it to hide the bad stuff from ourselvestedu2014-05-254-4/+8
| | | | ok beck
* Remove TLS_DEBUG, SSL_DEBUG, CIPHER_DEBUG and OPENSSL_RI_DEBUG. Much ofjsing2014-05-2518-296/+0
| | | | | | | this is sporadic, hacked up and can easily be put back in an improved form should we ever need it. ok miod@
* There is little interest in supporting Watt-32 TCP/IP debugging. Forderaadt2014-05-251-7/+0
| | | | | reference, check out http://www.watt-32.net/ ok jsing
* Turn off MemCheck_on and MemCheck_off. These calls are pointless since thejsing2014-05-254-30/+6
| | | | | | crypto memory debugging code has been castrated. ok miod@ "kill it" beck@
* The ssl_ciper_get_evp() function is currently overloaded to also return thejsing2014-05-2513-62/+107
| | | | | | | | | | | compression associated with the SSL session. Based on one of Adam Langley's chromium diffs, factor out the compression handling code into a separate ssl_cipher_get_comp() function. Rewrite the compression handling code to avoid pointless duplication and so that failures are actually returned to and detectable by the caller. ok miod@
* Whitespace fixes to align define values.jsing2014-05-252-170/+172
|
* In ssl_cipher_get_evp(), fix off-by-one in index validation before accessingmiod2014-05-242-4/+4
| | | | | | arrays. "kind of scary" deraadt@, ok guenther@
* I'm so sorry to learn that the Diab compiler can't (or used not to) parse Cmiod2014-05-242-10/+2
| | | | code. Remove workaround.
* Use C99 initialisers for SSL3_ENC_METHOD structs.jsing2014-05-248-108/+126
| | | | ok miod@
* Remove the _shadow_ indirection, which is unnecessary in a world withoutjsing2014-05-246-14/+8
| | | | | | OPENSSL_EXPORT_VAR_AS_FUNCTION. ok miod@
* KNF.jsing2014-05-2430-4436/+3826
|
* More KNF.jsing2014-05-242-4/+4
|
* Add the RFC 7027 test vectors; from OpenSSL HEADmiod2014-05-241-0/+171
|
* KNF.jsing2014-05-248-182/+182
|
* Enable three brainpool elliptic curves for TLS, as specified in RFC 7027;miod2014-05-242-2/+26
| | | | | | from OpenSSL HEAD. ok beck@ deraadt@ jsing@
* Code using malloc() in ssl23_get_client_hello() got removed 12 years ago,miod2014-05-242-64/+54
| | | | | it's time to remove the test for a possible need to free(). ok jsing@
* Use sizeof(cryptopro_ext) instead of 36 when applicable.miod2014-05-242-8/+8
| | | | ok jsing@
* Invoke OPENSSL_cleanse() with the size of the variable you are cleaning.miod2014-05-242-2/+2
| | | | ok jsing@
* We have shared global variables - unifdef OPENSSL_EXPORT_VAR_AS_FUNCTION.jsing2014-05-245-146/+0
| | | | ok miod@ beck@