summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* Do not feed RSA private key information to the random subsystem asderaadt2014-04-176-22/+0
| | | | | | | | entropy. It might be fed to a pluggable random subsystem.... What were they thinking?! ok guenther
* remove duplicated tests in if statementsjsg2014-04-172-8/+8
| | | | ok krw@ sthen@ deraadt@
* Fix for ", " issue in jsing's knf scriptguenther2014-04-171-2/+2
|
* Do not need to map to another silly name for unistd.h here eitherderaadt2014-04-171-1/+0
|
* unistd.h is always in the same place; no need to #include the result ofderaadt2014-04-1727-52/+29
| | | | a maze of conditional #define's
* minimal fix for ', ' issue in jsing's indent scriptderaadt2014-04-171-8/+9
|
* OpenSSL PR#3309: when looking for an extension, set the last found positionsthen2014-04-172-6/+6
| | | | | | to -1 to properly search all extensions. ok tedu@ From http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=300b9f0b70
* Remove the ossltests target, these are now all in libcrypto regressjsg2014-04-171-208/+2
| | | | except sha256t/sha512t which are likely to be removed for license reasons.
* move enginetest to regress as was done with the other testsjsg2014-04-174-284/+9
|
* call the correct decrypt function in aes_cbc_cipher()jsg2014-04-172-2/+2
| | | | | | | | | | | | | | | | From: commit e9c80e04c1a3b5a0de8e666155ab4ecb2697a77d Author: Andy Polyakov <appro@openssl.org> Date: Wed Dec 18 21:42:46 2013 +0100 evp/e_[aes|camellia].c: fix typo in CBC subroutine. It worked because it was never called. Our e_camellia.c does not have this problem. ok miod@ deraadt@
* tag some functions with bounded. idea and ok djmtedu2014-04-172-6/+12
|
* TANSTAAFL - delete the buf freelist code. if you need a better malloc, gettedu2014-04-169-260/+9
| | | | a better malloc. ok beck deraadt
* add back SRP. i was being too greedy.tedu2014-04-1623-2/+1804
|
* Clean up dangerous strncpy use. This included a use where the resultingbeck2014-04-1618-150/+34
| | | | | | | string was potentially not nul terminated and a place where malloc return was unchecked. while we're at it remove dummytest.c ok miod@
* - Why do we hide from the OpenSSL police, dad?miod2014-04-1612-228/+46
| | | | | | | | - Because they're not like us, son. They use macros to wrap stdio routines, for an undocumented (OPENSSL_USE_APPLINK) use case, which only serves to obfuscate the code. ok tedu@
* > As I walk through the valley of the shadow of deathtedu2014-04-1620-1212/+8
| | | | | | | | | > I take a look at my life and realize there's nothin' left > Cause I've been blasting and laughing so long, > That even my mama thinks that my mind is gone Remove even more unspeakable evil being perpetuated in the name of VMS. (and lesser evils done in the name of others.) ok miod
* lots of ifdef cleanuptedu2014-04-163-400/+1
|
* repair knftedu2014-04-161-1/+1
|
* No need to define ANSI_SOURCE and NO_ERR. TERMIOS kept until ui/ui_openssl.cmiod2014-04-161-2/+2
| | | | gets a second trim.
* No need to build with -DOPENSSL_NO_CAPIENG and -DOPENSSL_NO_HW_xxx for allmiod2014-04-161-10/+1
| | | | now removed engines.
* quoth the readme:tedu2014-04-16128-16802/+0
| | | | | | NOTE: Don't expect any of these programs to work with current OpenSSL releases, or even with later SSLeay releases. ok miod
* delete a few leftoverstedu2014-04-162-10/+2
|
* fix a few bugs observed on http://www.viva64.com/en/b/0250/tedu2014-04-167-7/+5
| | | | ok krw miod
* Thanks to the knobs in http://tools.ietf.org/html/rfc5746, we have a knobbeck2014-04-164-14/+6
| | | | | | to say "allow this connection to negotiate insecurely". de-fang the code that respects this option to ignore it. ok miod@
* disentangle SRP code from TLStedu2014-04-1623-1804/+2
|
* whack the ifdef pinata:tedu2014-04-162-520/+10
| | | | | | | | | | | | | | | | | | OPENSSL_SYSNAME_VXWORKS OPENSSL_SYS_VMS OPENSSL_SYS_MSDOS OPENSSL_UNISTD OPENSSL_SYS_WIN16 WIN_CONSOLE_BUG OPENSSL_SYS_WINCE SGTTY OPENSSL_SYS_MACINTOSH_CLASSIC MAC_OS_GUSI_SOURCE OPENSSL_SYS_NETWARE OPENSSL_SYS_SUNOS __DJGPP__ OPENSSL_SYS_BEOS OPENSSL_SYS_WIN32
* SSLv3_client_method() doesn't support TLSv1.*; use SSLv23_client_method()guenther2014-04-162-4/+4
| | | | | | | | the for anything where version negotiation would be useful. Also, constipate a couple formatting strings to make compilers and linkers happier. ok tedu@
* Zero-pad usec format to handle values less than 100,000 correctlyguenther2014-04-162-2/+2
| | | | ok matthew@ tedu@
* Initial KNF.jsing2014-04-165-1143/+1006
|
* Initial KNF.jsing2014-04-164-1035/+825
|
* Mandatory Surgeon Guenther's Warning: This code could not possibly betedu2014-04-162-48/+48
| | | | | | | correct because it doesn't zerofill the front of usecs, but that's the way I found it. a more thorough emulation of the old code, but with fewer whacky snprintf pointer arithmetic antics. ok beck guenther
* Initial KNF.jsing2014-04-162-1903/+1662
|
* More KNF.jsing2014-04-162-100/+119
|
* First pass for KNF.jsing2014-04-162-1294/+1235
|
* revert. the full horror has only now revealed itself.tedu2014-04-162-52/+42
|
* replace some bio_snprintf crazy with regular snprintf.tedu2014-04-162-42/+52
| | | | | beck had a diff to convert to strftime, but it's easier to verify this is functionally the same. ok beck.
* Kill the bogus "send an SSLv3/TLS hello in SSLv2 format" crap fromguenther2014-04-1614-650/+346
| | | | | | | | | the SSLv23_* client code. The server continues to accept it. It also kills the bits for SSL2 SESSIONs; even when the server gets an SSLv2-style compat handshake, the session that it creates has the correct version internally. ok tedu@ beck@
* More KNF.jsing2014-04-1620-208/+218
|
* Make this byzantine horror a shell of it's former self by stubbing thebeck2014-04-162-1320/+34
| | | | | | | functions. The ability to set the debug mem functions died with mem.c, but some of the rest of this is still exposed API so we can't delete it.. yet... ok tedu@
* Some software expects RAND_status() to return 1 for success, so alwaysreyk2014-04-162-4/+20
| | | | | | | return 1 in the arc4random backend because there is no possible error condition. Unbreaks lynx, git and friends. ok miod@ dcoppa@
* Clean up non-fatal error handling - we know which error numbers we havejsing2014-04-166-210/+0
| | | | | | defined. ok miod@ beck@
* unbreak install; /usr/share/man/man3/EVP_PKEY_print_private.3 should link tosthen2014-04-161-2/+2
| | | | /usr/share/man/man3/EVP_PKEY_print_public.3 not itself, from deraadt
* Sync the list of man pages for libcrypto, explicity rename conflictingmpi2014-04-1625-179/+1662
| | | | | | | pages instead of doing it in the Makefiles and move a libssl page where it belongs. ok miod@
* Remove pointless man pages that were not installed.mpi2014-04-164-383/+0
| | | | ok miod@
* adapt to test file movesjsg2014-04-161-63/+50
| | | | md2test and rsatest targets removed as the files have been removed
* adapt to the less old des apijsg2014-04-161-49/+49
|
* Remove _CRAY references. Note that this pleads for the use of <stdint.h>miod2014-04-1612-80/+10
| | | | | fixed-width types instead of choosing int or long depending upon what we think the architecture support.
* Remove DES_read_password and DES_read_2passwords which are `modern' flavoursmiod2014-04-165-290/+1
| | | | | | of des_old.h routines, acting as wrappers about the OpenSSL UI API. Nothing should use these functions directly. Riding the recent libcrypto major bump (in a `des' car).
* Your operating system memory allocation functions are your friend. If theybeck2014-04-165-884/+400
| | | | | | | | are not please fix your operating system. Replace mem.c with an API-compatible wrapper that just calls the system functions and does not allow a one word modification of a variable in a running shared library to turn on memory debug functions that expose things that should not be seen. ok tedu@
* dead filetedu2014-04-162-1042/+0
|