summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/bio/bio.h (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Add const to the argument of the following callback getters:tb2018-06-021-9/+9
| | | | | | | | BIO_meth_get_callback_ctrl, BIO_meth_get_create, BIO_meth_get_ctrl, BIO_meth_get_destroy, BIO_meth_get_gets, BIO_meth_get_puts, BIO_meth_get_read, and BIO_meth_get_write. ok jsing
* Add a const qualifier to the return value of BIO_s_file().tb2018-05-301-2/+2
| | | | | tested in a bulk build by sthen ok bcook, jsing
* const qualifiers for BIO_new_mem_buf(), BIO_new_connect() andtb2018-05-121-4/+4
| | | | | | | | BIO_new_accept(). The one for BIO_new_mem_buf() is a bit ugly since it needs to cast away the newly added const qualifier, as in OpenSSL commit 8ab31975bac. ok jsing
* Add const qualifiers to the return values of BIO_s_mem() andtb2018-05-121-3/+3
| | | | | | BIO_s_datagram(). ok jsing
* const for BIO_{new,set}() and most of the BIO_{f,s}_*() family oftb2018-05-011-14/+14
| | | | | | functions. ok beck, jsing
* Make BIO_meth_get_write() public. Omission spotted by schwarze.tb2018-03-171-1/+2
| | | | ok jsing
* Provide BIO_up_ref().jsing2018-02-221-1/+2
|
* Provide BIO_meth_{g,s}et_callback_ctrl()tb2018-02-201-1/+5
| | | | with & ok jsing
* Provide BIO_meth_get_{create,ctrl,destroy,gets,puts,read}()tb2018-02-201-1/+7
| | | | ok jsing
* Zap an 'int' that snuck in.tb2018-02-201-3/+2
| | | | ok jsing
* Provide BIO_{g,s}et_shutdown().tb2018-02-201-1/+3
| | | | ok jsing
* Provide BIO_get_new_index().jsing2018-02-201-1/+8
| | | | Based on BoringSSL.
* Provide BIO_meth_set_gets().tb2018-02-181-1/+2
| | | | ok jsing
* Provide BIO_{g,s}et_data() and BIO_set_init().tb2018-02-181-1/+4
| | | | ok jsing
* Provide BIO_meth_{free,new}() and BIO_meth_set_{create,crtl,destroy}()tb2018-02-171-1/+12
| | | | | | and BIO_meth_set_{puts,read,write}(). ok jsing
* trailing ; on end of macro definition is wrong; ok guentherderaadt2017-04-061-4/+4
|
* Fix warning on vax due to old gcc.doug2015-06-201-4/+4
| | | | | | | Old gcc warns when parameters have the same names as functions. Noticed by deraadt@. ok deraadt@ jsing@
* Jettison SCTP support in BIO dgram.jsing2015-02-091-58/+1
| | | | | | | | OpenBSD does not have SCTP support and it sees little use in the wild. OPENSSL_NO_SCTP is already specified via opensslfeatures.h, hence this is a code removal only and symbols should remain unchanged. ok beck@ miod@ tedu@
* Mark the format string argument to BIO_*printf as not being allowed to be NULLguenther2014-07-201-5/+7
| | | | ok bcook@
* unbreak build this needed to be an and..beck2014-07-131-2/+2
| | | | ok jsing@
* Take out __bounded__ in the include files we use it in when not on OpenBSD.beck2014-07-131-2/+4
| | | | | | | while we can take it out in portable at compile time, it is still a problem when we install this header file on a system that doesn't support __bounded__ if this is unguarded. ok miod@ bcook@
* In BIO_get_port(), use strol() with appropriate range checks rather thanjsing2014-06-221-1/+2
| | | | | | | an atoi() followed by an unsigned short cast. This stops things like "-1" and "66536" from being considered to be "valid" port numbers. ok beck@ deraadt@
* tags as requested by miod and teduderaadt2014-06-121-1/+1
|
* Remove __bio_h__attr__ wrapper around __attribute__, since earlier statementsmiod2014-06-011-10/+4
| | | | | | in this file directly use __attribute__. ok deraadt@
* remove CONST_STRICT. ok beck deraadttedu2014-05-301-7/+0
|
* Everything sane has stdio, and FILE *. we don't need ifdefs for this.beck2014-05-291-6/+0
| | | | ok to firebomb from tedu@
* Almost nothing actually needs to include <openssl/e_os2.h>, however byjsing2014-05-241-1/+1
| | | | | | | including it they get <openssl/opensslconf.h>. So instead of pulling in <openssl/e_os2.h>, just pull in <openssl/opensslconf.h>. "go ahead" miod@
* mark BIO_snprintf as deprecated, so warnings will be generated for it'sbeck2014-05-221-2/+2
| | | | use. ok miod@ tedu@
* tag some functions with bounded. idea and ok djmtedu2014-04-171-3/+6
|
* - Why do we hide from the OpenSSL police, dad?miod2014-04-161-5/+0
| | | | | | | | - Because they're not like us, son. They use macros to wrap stdio routines, for an undocumented (OPENSSL_USE_APPLINK) use case, which only serves to obfuscate the code. ok tedu@
* > As I walk through the valley of the shadow of deathtedu2014-04-161-9/+0
| | | | | | | | | > I take a look at my life and realize there's nothin' left > Cause I've been blasting and laughing so long, > That even my mama thinks that my mind is gone Remove even more unspeakable evil being perpetuated in the name of VMS. (and lesser evils done in the name of others.) ok miod
* First pass at applying KNF to the OpenSSL code, which almost makes itjsing2014-04-151-78/+87
| | | | | readable. This pass is whitespace only and can readily be verified using tr and md5.
* resolve conflictsdjm2012-10-131-1/+69
|
* OpenSSL 1.0.0f: mergedjm2012-01-051-0/+9
|
* resolve conflicts, fix local changesdjm2010-10-011-35/+29
|
* resolve conflictsdjm2008-09-061-26/+107
|
* resolve conflictsdjm2005-04-291-0/+1
|
* merge 0.9.7b with local changes; crank majors for libssl/libcryptomarkus2003-05-121-3/+4
|
* merge openssl-0.9.7-beta3, tested on vax by miod@markus2002-09-101-0/+3
|
* OpenSSL 0.9.7 stable 2002 05 08 mergebeck2002-05-151-15/+18
|
* openssl-engine-0.9.6 mergebeck2000-12-151-23/+43
|
* OpenSSL 0.9.5a mergebeck2000-04-151-1/+1
|
* OpenSSL 0.9.5 mergebeck2000-03-191-15/+39
| | | | | | *warning* this bumps shared lib minors for libssl and libcrypto from 2.1 to 2.2 if you are using the ssl26 packages for ssh and other things to work you will need to get new ones (see ~beck/libsslsnap/<arch>) on cvs or ~beck/src-patent.tar.gz on cvs
* OpenSSL 0.9.4 mergebeck1999-09-291-194/+149
|
* Import of SSLeay-0.9.0b with RSA and IDEA stubbed + OpenBSD buildryker1998-10-051-0/+688
functionality for shared libs. Note that routines such as sslv2_init and friends that use RSA will not work due to lack of RSA in this library. Needs documentation and help from ports for easy upgrade to full functionality where legally possible.