summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/buffer/buffer.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2014-07-13Use a single ressl.h header file.jsing5-45/+18
Discussed with beck@ and tedu@.
2014-07-13Explicitly initialise slen - this was not previously done due to a missingjsing2-2/+4
M_ASN1_D2I_begin macro.
2014-07-13Convert error handling to SSLerr and ERR_asprintf_error_data.jsing2-118/+108
2014-07-13tweak previous;jmc1-2/+2
2014-07-13missing bracket in previous;jmc1-2/+2
2014-07-13Convert d2i_SSL_SESSION to ASN1 primitives, instead of the horrificjsing2-52/+594
asn1_mac.h macros. This still needs a lot of improvement, but immediately becomes readable. ok miod@ (sight unseen!)
2014-07-13Remove license introduced with the PSK code, which has since been removed.jsing2-54/+2
ok deraadt@
2014-07-13Another compression remnant.jsing2-4/+2
2014-07-13Expand the tlsext_sigalg macros. The end result is about the same numberjsing2-32/+38
of lines and much more readable. ok miod@
2014-07-13Rewrite i2d_SSL_SESSION to use the ASN1 primitives, rather than using thejsing2-150/+196
horrific macros from asn1_mac.h. This is a classic example of using macros to obfuscate code, in an attempt to reduce the line count. The end result is so ridiculously convoluted that it is completely unreadable and it takes hours to deconstruct the macros and figure out what is actually going on behind the scenes. ok miod@
2014-07-13Add a regress test for the ASN1 handling of SSL session tickets.jsing3-1/+389
2014-07-13The bell tolls for BUF_strdup - Start the migration to usingbeck40-145/+155
intrinsics. This is the easy ones, a few left to check one at a time. ok miod@ deraadt@
2014-07-13Fix memory leak.logan2-2/+4
OK from beck@ and miod@
2014-07-13OPENSSL_{malloc,free} -> {malloc,free}miod19-27/+27
2014-07-13Warn about the use of BUF_strdup.miod1-2/+4
2014-07-13Update BUGS section.miod1-4/+6
2014-07-13oops, i deleted the wrong wordtedu1-2/+2
2014-07-13remove a lie spotted by guenthertedu1-5/+4
2014-07-13once srandomdev() is called, switch to using arc4random() but mask off thetedu1-12/+10
high bit as required by posix. wouldn't want to break any standards. idea and ok deraadt
2014-07-13unbreak build this needed to be an and..beck8-16/+16
ok jsing@
2014-07-13Use dl_iterate_phdr() to iterate over the segments and throw the addressesderaadt4-4/+56
into the hash; hoping the system has some ASLR or PIE. This replaces and substantially improves upon &main which proved problematic with some picky linkers. Work with kettenis, testing by beck
2014-07-13Split out ntoh[ls] and hton[ls] into their own manpage.guenther3-136/+199
Update byteorder(3) to cover the new functions in <endian.h> ok deraadt@ millert@
2014-07-13Provide a link to the canonical API specification.deraadt8-8/+32
ok beck
2014-07-13Make sure all error conditions in RSA_padding_add_PKCS1_PSS_mgf1() causemiod2-6/+8
EVP_MD_CTX_cleanup() to be called.
2014-07-13Possible PBEPARAM leak in the error path.miod2-12/+16
2014-07-13dsa_priv_decode(): only destroy the object we've created, and with themiod2-6/+10
appropriate function. Checking for privkey != NULL is not enough since privkey points to a member of ndsa if ndsa != NULL. dsa_priv_encode(): possible double free in error path.
2014-07-13Check X509_NAME_oneline() return value when it will have to allocate memory.miod2-2/+6
2014-07-13EVP_DigestInit_ex() may be used to recycle an existing EVP_MD_CTX without havingmiod2-6/+18
to reinitialize all of it, especially if it is used with the same MD algorithm. However, when the MD algorithm changes, it needs to perform more cleanups. Make that code more closer to what EVP_MD_CTX_cleanup() does by: - only freeing md_data if EVP_MD_CTX_FLAG_REUSE is not set - performing an explicit_bzero of md_data before freeing it - making sure we call EVP_PKEY_CTX_free on the pctx if the allocation for the new md_data fails. ok tedu@
2014-07-13Don't include asn1_mac.h if all you need is asn1.h.miod2-4/+4
2014-07-13Take out __bounded__ in the include files we use it in when not on OpenBSD.beck8-10/+32
while we can take it out in portable at compile time, it is still a problem when we install this header file on a system that doesn't support __bounded__ if this is unguarded. ok miod@ bcook@
2014-07-13While we thought this would make portable life easier it actuallybeck1-3/+1
makes it much harder. ok bcook@ kettenis@
2014-07-13No need to include evp_locl.h in there.miod12-36/+12
2014-07-13Take away the use of the address of main as a source of entropy. Causesbeck6-6/+30
distractions to people testing and seeing link errors in some setups. This will come back in another form ok deraadt@
2014-07-13KNF and some code cleaning.jsing2-72/+92
2014-07-13remove silly castderaadt2-4/+4
2014-07-13Another large dose of KNF.jsing2-472/+814
2014-07-12Apply a large dose of KNF.jsing2-252/+404
2014-07-12duplicate function names in head1miod2-2/+2
2014-07-12The correct name for EDH is DHE, likewise EECDH should be ECDHE.jsing18-236/+236
Based on changes to OpenSSL trunk. ok beck@ miod@
2014-07-12No need to include asn1_mac.h here.miod4-8/+4
2014-07-12remove double brackets. fixes build with clang.jsg2-4/+4
ok jsing@
2014-07-12Remove this sentence:miod2-6/+4
``The probability that a randomly generated key is weak is -1/2^52, so it is not really worth checking for them.'' This kind of naively optimistic attitude is not compatible with security.
2014-07-12more MLINKSmiod1-1/+56
2014-07-12getentropy on Windows. It compiles but has not been thoroughly tested yet.wouter2-0/+112
OK: beck@
2014-07-12Remove signed/unsigned warning, statement before declaration andwouter6-58/+64
add a function to use function pointers that does not take sizeof(fptr). OK beck@
2014-07-12We have EVP_CIPH_FLAG_DEFAULT_ASN1 in evp.h; no need to keep constructs tomiod2-68/+56
build on pre-EVP_CIPH_FLAG_DEFAULT_ASN1 codebases. ok jsing@
2014-07-12Remove private_{Camellia,RC4}_set_key FIPS indirection tentacles, as has beenmiod19-314/+73
done for other symmetric algorithms recently.
2014-07-12Provide ssl_version_string() function, which uses one of those modern Cjsing8-56/+62
constructs (a switch statement) and returns the appropriate string defined by SSL_TXT_* for the given version, including support for DTLSv1 and DTLSv1-bad. Use this function in SSL_get_version() and SSL_SESSION_print(). ok beck@
2014-07-12In openssl_startup(), call SSL_library_init() and SSL_load_error_strings().jsing8-28/+10
This allows us to remove the ERR_load_crypto_strings() call, along with the various SSL_load_error_strings() and OpenSSL_add_ssl_algorithms() calls scattered around the place. ok beck@
2014-07-12Make the BLOCK_CIPHER_{generic,custom} macros expand to more readable structmiod2-134/+204
definitions using C99 field initializers. No functional change.