summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/asn1 (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* Bring back ASN1_seq_pack(), ASN1_seq_unpack(), ASN1_pack_string() andmiod2014-05-122-0/+108
| | | | | | | | ASN1_unpack_string() from the NO_ASN1_OLD purge; turns out that some Ruby extensions still use them, unfortunately, so we need to give them some more time to catch up on ``recent'' interfaces. Riding on the libcrypto major bump.
* i give up. reuse problem is unfixable. dlg says puppet crashes.tedu2014-05-041-8/+4
|
* Use C99 initializers for the various FOO_METHOD structs. More readable, andmiod2014-04-272-15/+12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | avoid unreadable/unmaintainable constructs like that: const EVP_PKEY_ASN1_METHOD cmac_asn1_meth = { EVP_PKEY_CMAC, EVP_PKEY_CMAC, 0, "CMAC", "OpenSSL CMAC method", 0,0,0,0, 0,0,0, cmac_size, 0, 0,0,0,0,0,0,0, cmac_key_free, 0, 0,0 }; ok matthew@ deraadt@
* static const char * = "" -> static const char[] = "", to produce shorter code.miod2014-04-273-3/+3
| | | | No functional change.
* Unifdef -U OPENSSL_BUILD_SHLIBCRYPTO, since all it causes under Unix is tomiod2014-04-272-10/+0
| | | | redefine OPENSSL_EXTERN from `extern' to `extern'.
* Replace all use of ERR_add_error_data with ERR_asprintf_error_data.beck2014-04-265-21/+12
| | | | | | | | This avoids a lot of ugly gymnastics to do snprintfs before sending the bag of strings to ERR, and eliminates at least one place in dso_dlfctn.c where it was being called with the incorrect number of arguments and using random things off the stack as addresses of strings. ok krw@, jsing@
* Unifdef -UPEDANTIC. ok beck@ tedu@miod2014-04-231-6/+0
|
* Remove duplicate pointer assignment in ASN1_primitive_free(); Dirk Englingmiod2014-04-231-1/+0
|
* Casting from a const unsigned char ** to a const unsigned char ** seems...jsing2014-04-231-8/+4
| | | | | | | unnecessary. Remove the temporary ugly casts - the comments even call them that! ok guenther@
* Make sure ret->name is NULL'ed before return when freeing.beck2014-04-231-0/+1
| | | | from Dirk Engling <erdgeist@erdgeist.org>
* Rather than sprinkling magical numbers everywhere, we can use sizeof()beck2014-04-231-4/+4
| | | | | for the size of a fixed size array. From Dirk Engling <erdgeist@erdgeist.org>
* null a pointer to prevent double free. from Dirk Englingtedu2014-04-221-0/+1
|
* fix memory leaks. from Dirk Englingtedu2014-04-223-21/+12
|
* improve realloc/calloc/malloc patterns; ok guentherderaadt2014-04-2116-48/+23
|
* Delete #if 0'd time related functions which are totally expired.deraadt2014-04-212-74/+0
| | | | No point even seeing these when we do the 2038 audit later on...
* fix accidentally deleted deref.beck2014-04-211-1/+1
|
* ASN1_STRING cleanup - realloc has handled NULL since I had a mulletbeck2014-04-201-17/+10
| | | | | | | | | and parachute pants - and since it's obvious there is no guarantee the caller doesn't pass in the data area in the argument, use memmove instead of memcpy so overlapping areas are handled correctly. Also, pointers can be usefully printed in hex with %p, in error messaeges rather than the bizzaro stuff that was there using mystical buffer lengths and abuse of strlcpy-converted-blindly-from-strcpy
* replace a bunch of pointer-arithmatic-strcpy-converted-blindly-to-strlcpybeck2014-04-201-7/+7
| | | | | cruft with an snprintf. "better than what was there" ok guenther@
* another attempt at fixing stale x509 data. since we don't know where thetedu2014-04-191-10/+8
| | | | | initial storage came from, we can't free it. just memset in the sequence case. probably ok beck
* can't actually do this. cause unknown.tedu2014-04-191-1/+1
|
* More KNF.jsing2014-04-195-238/+296
|
* More KNF.jsing2014-04-194-261/+379
|
* More KNF.jsing2014-04-193-10/+14
|
* We'll interpret a (void) cast on snprintf() to mean it's been verified thatguenther2014-04-196-13/+13
| | | | | | truncation is either desirable, not an issue, or is detected and handled later ok deraadt@
* More KNF.jsing2014-04-194-685/+761
|
* More KNF.jsing2014-04-196-380/+471
|
* More KNF.jsing2014-04-196-363/+434
|
* More KNF.jsing2014-04-197-203/+207
|
* use intrinsic strlcpy and strlcat everywhere so we only have one set ofbeck2014-04-191-3/+3
| | | | | | funcitons to check for incorrect use. keep BUF_strlcpy and BUF_strlcat for API comptibility only. ok tedu@
* OPENSSL_gmtime() is really just gmtime_r(); ok guentherderaadt2014-04-183-4/+4
|
* tone down some XXXXX to not appear in greptedu2014-04-181-1/+1
|
* Put back i2d_ASN1_SET() and d2i_ASN1_SET() from the NO_ASN1_OLD prune, as theremiod2014-04-182-0/+245
| | | | | | | are still some 3rd-party code using it, and fixing them is not trivial. As an excuse gift, the memory leaks on failure in resurrected a_set.c have been fixed.
* guenther would prefer more separationtedu2014-04-181-0/+2
|
* Some dude named Tavis Ormandy reported a bug which has gone unfixed.tedu2014-04-181-0/+5
| | | | | | | | | | | http://marc.info/?l=openssl-users&m=138014120223264&w=2 Arguably a doc bug, but we argue not. If you parse a new cert into memory occupied by a previously verified cert, the new cert will inherit that state, bypassing future verification checks. To avoid this, we will always start fresh with a new object. grudging ok from guenther, after i threatened to make him read the code yet again. "that ok was way more painful and tiring then it should have been"
* blank lines between decls and codetedu2014-04-181-0/+5
|
* More KNF.jsing2014-04-181-76/+80
|
* More KNF.jsing2014-04-187-425/+535
|
* More KNF.jsing2014-04-187-464/+514
|
* More KNF.jsing2014-04-1817-515/+662
|
* add braces missed when fixing leaksjsg2014-04-181-1/+2
|
* More KNF.jsing2014-04-1811-664/+813
|
* lob a few more knf grenades in here to soften things up.tedu2014-04-1854-1796/+999
|
* putting most of the braces in the right column is the very least we can do.tedu2014-04-1854-2030/+2034
|
* kill REF_PRINT/REF_CHECK debugging framework noone would usederaadt2014-04-173-27/+0
| | | | ok miod
* sprintf: bad.miod2014-04-171-1/+1
| | | | | | snprintf: good. snprintf with a correct size: better! (harmless in this case)
* fix some more leaks, mostly suggestions from miodjsg2014-04-173-2/+8
| | | | ok miod@
* fix some of the leaksjsg2014-04-171-2/+6
| | | | ok miod@ looks good deraadt@
* Initial KNF.jsing2014-04-174-508/+505
|
* Change library to use intrinsic memory allocation functions instead ofbeck2014-04-1743-146/+146
| | | | | | | | OPENSSL_foo wrappers. This changes: OPENSSL_malloc->malloc OPENSSL_free->free OPENSSL_relloc->realloc OPENSSL_freeFunc->free
* fix a few bugs observed on http://www.viva64.com/en/b/0250/tedu2014-04-162-2/+2
| | | | ok krw miod