summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/buffer/buffer.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2014-04-17Initial KNF.jsing8-1016/+1010
2014-04-17Initial KNF.jsing4-502/+459
2014-04-17Initial KNF.jsing2-173/+133
2014-04-17More KNF.jsing2-11/+16
2014-04-17More KNF.jsing1-11/+17
2014-04-17Initial KNF.jsing1-329/+289
2014-04-17I've replaced everything in this file. ISC liscense it with my copyrightbeck2-108/+26
2014-04-17Initial KNF.jsing1-212/+214
2014-04-17Remove defines for unwanted OS support...jsing1-54/+0
ok miod@
2014-04-17remove some code that is now unused after guenther's changes in 1.20.jsg2-32/+2
2014-04-17KNF.jsing2-6/+6
2014-04-17Initial KNF.jsing6-278/+244
2014-04-17simply wrap around intrinsics, and knf cleanup.beck2-114/+108
ok miod@ deraadt@
2014-04-17Change library to use intrinsic memory allocation functions instead ofbeck477-2618/+2618
OPENSSL_foo wrappers. This changes: OPENSSL_malloc->malloc OPENSSL_free->free OPENSSL_relloc->realloc OPENSSL_freeFunc->free
2014-04-17Revert unintended whitespace changes.jsing5-19/+19
2014-04-17OPENSSL_gmtime() is not a gmtime() wrapper. It is a gmtime_r().deraadt2-36/+8
Always trying to confuse people... ok guenther
2014-04-17OPENSSL_DECLARE_EXIT serves no purpose.deraadt19-19/+0
2014-04-171. RAND_seed is now DEPRECATEDderaadt4-4/+0
2. Even passing a digest in as entropy is sloppy. But apparently the OpenSSL guys could find no objects of lesser value to pass to the pluggable random subsystem, and had to resort to private keys and digests. Classy. ok djm
2014-04-17RAND_seed now does nothing, so skip the operationderaadt2-12/+0
2014-04-17Do not feed RSA private key information to the random subsystem asderaadt6-22/+0
entropy. It might be fed to a pluggable random subsystem.... What were they thinking?! ok guenther
2014-04-17remove duplicated tests in if statementsjsg2-8/+8
ok krw@ sthen@ deraadt@
2014-04-17Fix for ", " issue in jsing's knf scriptguenther1-2/+2
2014-04-17Do not need to map to another silly name for unistd.h here eitherderaadt1-1/+0
2014-04-17unistd.h is always in the same place; no need to #include the result ofderaadt27-52/+29
a maze of conditional #define's
2014-04-17minimal fix for ', ' issue in jsing's indent scriptderaadt1-8/+9
2014-04-17OpenSSL PR#3309: when looking for an extension, set the last found positionsthen2-6/+6
to -1 to properly search all extensions. ok tedu@ From http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=300b9f0b70
2014-04-17Remove the ossltests target, these are now all in libcrypto regressjsg1-208/+2
except sha256t/sha512t which are likely to be removed for license reasons.
2014-04-17move enginetest to regress as was done with the other testsjsg4-284/+9
2014-04-17call the correct decrypt function in aes_cbc_cipher()jsg2-2/+2
From: commit e9c80e04c1a3b5a0de8e666155ab4ecb2697a77d Author: Andy Polyakov <appro@openssl.org> Date: Wed Dec 18 21:42:46 2013 +0100 evp/e_[aes|camellia].c: fix typo in CBC subroutine. It worked because it was never called. Our e_camellia.c does not have this problem. ok miod@ deraadt@
2014-04-17tag some functions with bounded. idea and ok djmtedu2-6/+12
2014-04-16TANSTAAFL - delete the buf freelist code. if you need a better malloc, gettedu9-260/+9
a better malloc. ok beck deraadt
2014-04-16add back SRP. i was being too greedy.tedu23-2/+1804
2014-04-16Clean up dangerous strncpy use. This included a use where the resultingbeck18-150/+34
string was potentially not nul terminated and a place where malloc return was unchecked. while we're at it remove dummytest.c ok miod@
2014-04-16- Why do we hide from the OpenSSL police, dad?miod12-228/+46
- Because they're not like us, son. They use macros to wrap stdio routines, for an undocumented (OPENSSL_USE_APPLINK) use case, which only serves to obfuscate the code. ok tedu@
2014-04-16> As I walk through the valley of the shadow of deathtedu20-1212/+8
> I take a look at my life and realize there's nothin' left > Cause I've been blasting and laughing so long, > That even my mama thinks that my mind is gone Remove even more unspeakable evil being perpetuated in the name of VMS. (and lesser evils done in the name of others.) ok miod
2014-04-16lots of ifdef cleanuptedu3-400/+1
2014-04-16repair knftedu1-1/+1
2014-04-16No need to define ANSI_SOURCE and NO_ERR. TERMIOS kept until ui/ui_openssl.cmiod1-2/+2
gets a second trim.
2014-04-16No need to build with -DOPENSSL_NO_CAPIENG and -DOPENSSL_NO_HW_xxx for allmiod1-10/+1
now removed engines.
2014-04-16quoth the readme:tedu128-16802/+0
NOTE: Don't expect any of these programs to work with current OpenSSL releases, or even with later SSLeay releases. ok miod
2014-04-16delete a few leftoverstedu2-10/+2
2014-04-16fix a few bugs observed on http://www.viva64.com/en/b/0250/tedu7-7/+5
ok krw miod
2014-04-16Thanks to the knobs in http://tools.ietf.org/html/rfc5746, we have a knobbeck4-14/+6
to say "allow this connection to negotiate insecurely". de-fang the code that respects this option to ignore it. ok miod@
2014-04-16disentangle SRP code from TLStedu23-1804/+2
2014-04-16whack the ifdef pinata:tedu2-520/+10
OPENSSL_SYSNAME_VXWORKS OPENSSL_SYS_VMS OPENSSL_SYS_MSDOS OPENSSL_UNISTD OPENSSL_SYS_WIN16 WIN_CONSOLE_BUG OPENSSL_SYS_WINCE SGTTY OPENSSL_SYS_MACINTOSH_CLASSIC MAC_OS_GUSI_SOURCE OPENSSL_SYS_NETWARE OPENSSL_SYS_SUNOS __DJGPP__ OPENSSL_SYS_BEOS OPENSSL_SYS_WIN32
2014-04-16SSLv3_client_method() doesn't support TLSv1.*; use SSLv23_client_method()guenther2-4/+4
the for anything where version negotiation would be useful. Also, constipate a couple formatting strings to make compilers and linkers happier. ok tedu@
2014-04-16Zero-pad usec format to handle values less than 100,000 correctlyguenther2-2/+2
ok matthew@ tedu@
2014-04-16Initial KNF.jsing5-1143/+1006
2014-04-16Initial KNF.jsing4-1035/+825
2014-04-16Mandatory Surgeon Guenther's Warning: This code could not possibly betedu2-48/+48
correct because it doesn't zerofill the front of usecs, but that's the way I found it. a more thorough emulation of the old code, but with fewer whacky snprintf pointer arithmetic antics. ok beck guenther