summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/stack/stack.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2014-04-27Use C99 initializers for the various FOO_METHOD structs. More readable, andmiod114-2246/+1672
avoid unreadable/unmaintainable constructs like that: const EVP_PKEY_ASN1_METHOD cmac_asn1_meth = { EVP_PKEY_CMAC, EVP_PKEY_CMAC, 0, "CMAC", "OpenSSL CMAC method", 0,0,0,0, 0,0,0, cmac_size, 0, 0,0,0,0,0,0,0, cmac_key_free, 0, 0,0 }; ok matthew@ deraadt@
2014-04-27static const char * = "" -> static const char[] = "", to produce shorter code.miod6-6/+6
No functional change.
2014-04-27Unifdef -U OPENSSL_BUILD_SHLIBCRYPTO, since all it causes under Unix is tomiod12-70/+2
redefine OPENSSL_EXTERN from `extern' to `extern'.
2014-04-27Put explicit (void) in function declarations and shuffle keywords in somemiod32-36/+36
declaration to pass -Wextra, should we want to add it to CFLAGS. No binary change.
2014-04-27We do not need a separate file for two compatibility wrapper functions.jsing5-140/+38
ok miod@
2014-04-27Fix leak last commit introduced. Spotted by Sebastian Kapfer.beck2-0/+2
2014-04-26Appease gcc3 -Wuninitialized.miod2-2/+2
2014-04-26Replace all use of ERR_add_error_data with ERR_asprintf_error_data.beck74-270/+222
This avoids a lot of ugly gymnastics to do snprintfs before sending the bag of strings to ERR, and eliminates at least one place in dso_dlfctn.c where it was being called with the incorrect number of arguments and using random things off the stack as addresses of strings. ok krw@, jsing@
2014-04-26More KNF.jsing4-12/+20
2014-04-26KNF.jsing10-848/+828
2014-04-26This is not FreeBSD.jsing2-36/+0
ok miod@
2014-04-26Do you really want to build OpenSSL for 16-bit Windows? Well, we don't.jsing2-12/+0
ok miod@
2014-04-25KNF.jsing4-510/+502
2014-04-25Fold in the zlib_cleanup macro.jsing2-7/+4
2014-04-25do_pipe_sig is now only used in openssl.c - just call signal() directlyjsing2-3/+1
from there instead and ditch the macro.
2014-04-25NON_MAIN no longer means anything so remove it, along with APP_INIT.jsing3-17/+0
ok miod@
2014-04-25The apps_{startup,shutdown} macro mess is now only used in openssl.c -jsing2-36/+42
reduce the macro to two functions and just call them instead. ok miod@
2014-04-25Clean up the remaining TTY related remnants.jsing2-82/+16
ok miod@
2014-04-25Remove defined varibles that no longer do anything.jsing1-3/+2
ok miod@
2014-04-25Use const char *.jsing2-2/+2
Suggested by miod@
2014-04-25KNF fixeslteo2-128/+138
2014-04-24Try to clean the maze of <openssl/bn.h> defines regarding the BN internals.miod21-455/+51
The intent of this change is to only keep support for two kind of architectures: - those with 32-bit int and long, and 64-bit long long, where ``long * long -> long long'' multiplication routines are available. - those with 64-bit int and long, and no 128-bit long long type. This gets rid of the SIXTY_FOUR_BIT_LONG, SIXTY_FOUR_BIT (not the same!), THIRTY_TWO_BIT, SIXTEEN_BIT and EIGHT_BIT defines. After this change, the types and defines are as follows: arch: 64bit 32bit rationale BN_LLONG undefined defined defined if l * l -> ll BN_ULLONG undefined u long long result of BN_LONG * BN_LONG BN_ULONG u long u int native register size BN_LONG long int the same, signed BN_BITS 128 64 size of 2*BN_ULONG in bits BN_BYTES 8 4 size of 2*BN_ULONG in bytes BN_BITS2 64 32 BN_BITS / 2 Tested on various 32-bit and 64-bit OpenBSD systems of various endianness.
2014-04-24Fix indentation.mcbride2-422/+416
2014-04-24Bring back the SSL_OP_PKCS1_CHECK_* defines (defined to zero, as they alreadymiod2-0/+8
were), after stumbling upon code (mis)using them in the wild.
2014-04-24rearrange a bit of code/commentstedu2-134/+178
2014-04-24uses ssh these days, not rsh; ok tedujmc1-2/+2
2014-04-24unifdef MSDOSgiovanni2-24/+2
ok miod@
2014-04-24obvious use after free was less obviously not a use after free.tedu1-1/+1
who uses '\0' as a null pointer constant? fix my mistake and restore original semantics.
2014-04-24More KNF.jsing2-184/+244
2014-04-24Make it compile again.jsing2-2/+2
2014-04-24Remove some malloc/strlcpy/strlcat horror. Just use asprintf and avoid anjsing2-50/+24
unchecked malloc at the same time. ok beck@
2014-04-24add ERR_asprintf_error_data, A tool to be used to get rid of the far toobeck4-50/+52
frequent construct of 30 lines of pointer and strlcat insanity followed by an ERR_add_error_data. I will sweep through here like a chubby mongol horde in the next few days pillaging crappy ERR_add_error_data's. Oh and while we're at it fix the nasty vdata function to use something less hard on the eyes. ok jsing@
2014-04-24You want signals?!? I'll give you signals!!! Oh, and we have termios asjsing2-72/+0
well... ok beck@
2014-04-24More KNF.jsing4-74/+74
2014-04-24More KNF, things that couldn't be verified with md5(1), and some whitespacemcbride8-468/+508
I missed on the first go around.
2014-04-24unifdef -U LINTjsing6-18/+0
2014-04-24When OPENSSL_C is not defined, apps_startup becomes ajsing38-72/+72
signal(SIGPIPE, SIG_IGN) and apps_shutdown is a no-op. So just do that instead. ok beck@
2014-04-24KNFmcbride6-2052/+2974
2014-04-24Remove more FIPS tenticles.jsing1-12/+1
ok beck@
2014-04-24Rip a bunch of ifdefs from speed. We know we can fork, have SIGALRM andjsing1-267/+2
do not use lint. ok miod@
2014-04-24A fantastic way to make a large unsigned number is to assignbeck2-0/+4
a small signed one to it.. Some people on OpenSSL's list noticed - http://marc.info/?l=openssl-dev&m=139809485525663&w=2 This should fix that, and make sure we don't try to write out insane amounts of stuff. ok miod@ tedu@
2014-04-24remove redundant asign. from David Hilltedu2-2/+0
2014-04-24Support for the -ssl2 option has been removed, so remove it from usagelteo1-1/+0
as well ("openssl ciphers -h"). "sure" miod@
2014-04-24on today's episode of things you didn't want to learn:tedu2-0/+8
do_ssl3_write() is recursive. and not in the simple, obvious way, but in the sneaky called through ssl3_dispatch_alert way. (alert level: fuchsia) this then has a decent chance of releasing the buffer that we thought we were going to use. check for this happening, and if the buffer has gone missing, put another one back in place. the direct recursive call is safe because it won't call ssl3_write_pending which is the function that actually does do the writing and releasing. as reported by David Ramos to openssl-dev: http://marc.info/?l=openssl-dev&m=139809493725682&w=2 ok beck
2014-04-24repair missing semicolon. from Ian Mcwilliamtedu2-2/+2
2014-04-23Unifdef -UPKCS1_CHECK and remove SSL_OP_PKCS1_CHECK_[12], this is leftovermiod11-58/+0
``debug'' code from a 15+ years old bugfix and the SSL_OP_PKCS1_CHECK_* constants have had a value of zero since ages. No production code should use them. ok beck@
2014-04-23ain't nobody got time for hpuxtedu2-44/+0
2014-04-23fix some variablestedu2-4/+2
2014-04-23replace a bunch of hand duped strings with strduptedu4-20/+8
2014-04-23Don't bother generating win64 assembly prologue.miod2-52/+4