Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Everything sane has stdio, and FILE *. we don't need ifdefs for this. | beck | 2014-05-29 | 7 | -20/+0 | |
| | | | | ok to firebomb from tedu@ | |||||
* | remove unused shit. from Alexander Schrijver | tedu | 2014-05-25 | 2 | -4/+2 | |
| | ||||||
* | We have shared global variables - unifdef OPENSSL_EXPORT_VAR_AS_FUNCTION. | jsing | 2014-05-24 | 2 | -69/+0 | |
| | | | | ok miod@ beck@ | |||||
* | Almost nothing actually needs to include <openssl/e_os2.h>, however by | jsing | 2014-05-24 | 2 | -2/+6 | |
| | | | | | | | including it they get <openssl/opensslconf.h>. So instead of pulling in <openssl/e_os2.h>, just pull in <openssl/opensslconf.h>. "go ahead" miod@ | |||||
* | Expand OPENSSL_{GLOBAL,EXTERN} macros that I missed last time around, | jsing | 2014-05-24 | 2 | -2/+2 | |
| | | | | | | since they are hiding in the #define forest. ok miod@ | |||||
* | if (x) free(x) -> free(x); semantic patch generated with coccinelle, carefully | miod | 2014-05-22 | 2 | -6/+3 | |
| | | | | eyeballed before applying. Contributed by Cyril Roelandt on tech@ | |||||
* | KNF. | jsing | 2014-05-22 | 3 | -171/+154 | |
| | ||||||
* | No uses of UTF8_{getc,putc}() in ports, so remove them from the public header. | guenther | 2014-05-22 | 2 | -9/+8 | |
| | | | | ok miod@ | |||||
* | Bring UTF8_{getc,putc} up-to-date: it's been a decade since 5- and 6-byte | guenther | 2014-05-20 | 4 | -93/+88 | |
| | | | | | | | | encodings and encoding of surrogate pair code points were banned. Add checks for those, both to those functions and to the code decoding the BMP and UNIV encodings. ok miod@ | |||||
* | If you need to allocate `a + b' bytes of memory, then don't allocate `a + b*2', | miod | 2014-05-18 | 3 | -6/+6 | |
| | | | | | | this is confusing and unnecessary. Help (coz I got confused) and ok guenther@ beck@ | |||||
* | Make sure UTF8_getc() is invoked with the proper buffer size. | miod | 2014-05-18 | 1 | -2/+2 | |
| | | | | ok beck@ guenther@ | |||||
* | Fix memory leaks upon failure. | miod | 2014-05-15 | 2 | -27/+39 | |
| | | | | ok beck@ | |||||
* | Replace ASN1_GENERALIZEDTIME_adj(), ASN1_UTCTIME_adj() and | miod | 2014-05-15 | 3 | -25/+73 | |
| | | | | | | | ASN1_TIME_to_generalizedtime() with wrappers around their former implementations, making sure memory allocated is freed in all failure cases. help and ok from beck@ and Brendan MacDonell. | |||||
* | Bring back ASN1_seq_pack(), ASN1_seq_unpack(), ASN1_pack_string() and | miod | 2014-05-12 | 2 | -0/+108 | |
| | | | | | | | | ASN1_unpack_string() from the NO_ASN1_OLD purge; turns out that some Ruby extensions still use them, unfortunately, so we need to give them some more time to catch up on ``recent'' interfaces. Riding on the libcrypto major bump. | |||||
* | i give up. reuse problem is unfixable. dlg says puppet crashes. | tedu | 2014-05-04 | 1 | -8/+4 | |
| | ||||||
* | Use C99 initializers for the various FOO_METHOD structs. More readable, and | miod | 2014-04-27 | 2 | -15/+12 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | avoid unreadable/unmaintainable constructs like that: const EVP_PKEY_ASN1_METHOD cmac_asn1_meth = { EVP_PKEY_CMAC, EVP_PKEY_CMAC, 0, "CMAC", "OpenSSL CMAC method", 0,0,0,0, 0,0,0, cmac_size, 0, 0,0,0,0,0,0,0, cmac_key_free, 0, 0,0 }; ok matthew@ deraadt@ | |||||
* | static const char * = "" -> static const char[] = "", to produce shorter code. | miod | 2014-04-27 | 3 | -3/+3 | |
| | | | | No functional change. | |||||
* | Unifdef -U OPENSSL_BUILD_SHLIBCRYPTO, since all it causes under Unix is to | miod | 2014-04-27 | 2 | -10/+0 | |
| | | | | redefine OPENSSL_EXTERN from `extern' to `extern'. | |||||
* | Replace all use of ERR_add_error_data with ERR_asprintf_error_data. | beck | 2014-04-26 | 5 | -21/+12 | |
| | | | | | | | | This avoids a lot of ugly gymnastics to do snprintfs before sending the bag of strings to ERR, and eliminates at least one place in dso_dlfctn.c where it was being called with the incorrect number of arguments and using random things off the stack as addresses of strings. ok krw@, jsing@ | |||||
* | Unifdef -UPEDANTIC. ok beck@ tedu@ | miod | 2014-04-23 | 1 | -6/+0 | |
| | ||||||
* | Remove duplicate pointer assignment in ASN1_primitive_free(); Dirk Engling | miod | 2014-04-23 | 1 | -1/+0 | |
| | ||||||
* | Casting from a const unsigned char ** to a const unsigned char ** seems... | jsing | 2014-04-23 | 1 | -8/+4 | |
| | | | | | | | unnecessary. Remove the temporary ugly casts - the comments even call them that! ok guenther@ | |||||
* | Make sure ret->name is NULL'ed before return when freeing. | beck | 2014-04-23 | 1 | -0/+1 | |
| | | | | from Dirk Engling <erdgeist@erdgeist.org> | |||||
* | Rather than sprinkling magical numbers everywhere, we can use sizeof() | beck | 2014-04-23 | 1 | -4/+4 | |
| | | | | | for the size of a fixed size array. From Dirk Engling <erdgeist@erdgeist.org> | |||||
* | null a pointer to prevent double free. from Dirk Engling | tedu | 2014-04-22 | 1 | -0/+1 | |
| | ||||||
* | fix memory leaks. from Dirk Engling | tedu | 2014-04-22 | 3 | -21/+12 | |
| | ||||||
* | improve realloc/calloc/malloc patterns; ok guenther | deraadt | 2014-04-21 | 16 | -48/+23 | |
| | ||||||
* | Delete #if 0'd time related functions which are totally expired. | deraadt | 2014-04-21 | 2 | -74/+0 | |
| | | | | No point even seeing these when we do the 2038 audit later on... | |||||
* | fix accidentally deleted deref. | beck | 2014-04-21 | 1 | -1/+1 | |
| | ||||||
* | ASN1_STRING cleanup - realloc has handled NULL since I had a mullet | beck | 2014-04-20 | 1 | -17/+10 | |
| | | | | | | | | | and parachute pants - and since it's obvious there is no guarantee the caller doesn't pass in the data area in the argument, use memmove instead of memcpy so overlapping areas are handled correctly. Also, pointers can be usefully printed in hex with %p, in error messaeges rather than the bizzaro stuff that was there using mystical buffer lengths and abuse of strlcpy-converted-blindly-from-strcpy | |||||
* | replace a bunch of pointer-arithmatic-strcpy-converted-blindly-to-strlcpy | beck | 2014-04-20 | 1 | -7/+7 | |
| | | | | | cruft with an snprintf. "better than what was there" ok guenther@ | |||||
* | another attempt at fixing stale x509 data. since we don't know where the | tedu | 2014-04-19 | 1 | -10/+8 | |
| | | | | | initial storage came from, we can't free it. just memset in the sequence case. probably ok beck | |||||
* | can't actually do this. cause unknown. | tedu | 2014-04-19 | 1 | -1/+1 | |
| | ||||||
* | More KNF. | jsing | 2014-04-19 | 5 | -238/+296 | |
| | ||||||
* | More KNF. | jsing | 2014-04-19 | 4 | -261/+379 | |
| | ||||||
* | More KNF. | jsing | 2014-04-19 | 3 | -10/+14 | |
| | ||||||
* | We'll interpret a (void) cast on snprintf() to mean it's been verified that | guenther | 2014-04-19 | 6 | -13/+13 | |
| | | | | | | truncation is either desirable, not an issue, or is detected and handled later ok deraadt@ | |||||
* | More KNF. | jsing | 2014-04-19 | 4 | -685/+761 | |
| | ||||||
* | More KNF. | jsing | 2014-04-19 | 6 | -380/+471 | |
| | ||||||
* | More KNF. | jsing | 2014-04-19 | 6 | -363/+434 | |
| | ||||||
* | More KNF. | jsing | 2014-04-19 | 7 | -203/+207 | |
| | ||||||
* | use intrinsic strlcpy and strlcat everywhere so we only have one set of | beck | 2014-04-19 | 1 | -3/+3 | |
| | | | | | | funcitons to check for incorrect use. keep BUF_strlcpy and BUF_strlcat for API comptibility only. ok tedu@ | |||||
* | OPENSSL_gmtime() is really just gmtime_r(); ok guenther | deraadt | 2014-04-18 | 3 | -4/+4 | |
| | ||||||
* | tone down some XXXXX to not appear in grep | tedu | 2014-04-18 | 1 | -1/+1 | |
| | ||||||
* | Put back i2d_ASN1_SET() and d2i_ASN1_SET() from the NO_ASN1_OLD prune, as there | miod | 2014-04-18 | 2 | -0/+245 | |
| | | | | | | | are still some 3rd-party code using it, and fixing them is not trivial. As an excuse gift, the memory leaks on failure in resurrected a_set.c have been fixed. | |||||
* | guenther would prefer more separation | tedu | 2014-04-18 | 1 | -0/+2 | |
| | ||||||
* | Some dude named Tavis Ormandy reported a bug which has gone unfixed. | tedu | 2014-04-18 | 1 | -0/+5 | |
| | | | | | | | | | | | http://marc.info/?l=openssl-users&m=138014120223264&w=2 Arguably a doc bug, but we argue not. If you parse a new cert into memory occupied by a previously verified cert, the new cert will inherit that state, bypassing future verification checks. To avoid this, we will always start fresh with a new object. grudging ok from guenther, after i threatened to make him read the code yet again. "that ok was way more painful and tiring then it should have been" | |||||
* | blank lines between decls and code | tedu | 2014-04-18 | 1 | -0/+5 | |
| | ||||||
* | More KNF. | jsing | 2014-04-18 | 1 | -76/+80 | |
| | ||||||
* | More KNF. | jsing | 2014-04-18 | 7 | -425/+535 | |
| |