summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* Some VMS and WIN32 cleanupgiovanni2014-04-171-28/+5
| | | | ok miod@ lteo@
* Get rid of MS Visual C compiler and Intel C compiler specific defines.miod2014-04-1713-238/+8
|
* There are no plans to ever build this with the Metrojerks compiler.miod2014-04-172-20/+2
|
* Remove support for big-endian i386 and amd64.miod2014-04-173-22/+1
| | | | | | | | | | | | | Before someone suggests the OpenSSL people are junkies, here is what they mention about this: /* Most will argue that x86_64 is always little-endian. Well, * yes, but then we have stratus.com who has modified gcc to * "emulate" big-endian on x86. Is there evidence that they * [or somebody else] won't do same for x86_64? Naturally no. * And this line is waiting ready for that brave soul:-) */ So, yes, they are on drugs. But they are not alone, the stratus.com people are, too.
* Mostly gut e_os.h:deraadt2014-04-177-14/+14
| | | | | | | | USE_SOCKETS is unrelated to using sockets, but just pulls in .h files. It makes every file buy a kitchen sink, because 11 files forgot to. EXIT() is really exit(), a gentle surprise but... OPENSSL_EXIT() is really just return(), because noone compiles the openssl command non-monolithic anymore
* malloc + memset 0 -> callocmiod2014-04-171-22/+2
| | | | | (not that it matters much as this is in disabled code, for we don't build with zlib support)
* -Walltedu2014-04-171-1/+3
|
* unused variabletedu2014-04-171-3/+1
|
* a little less obfuscationtedu2014-04-171-17/+2
|
* fold prototypes into o_str.c. miodtedu2014-04-172-69/+4
|
* Aren't you glad to have this file tell you that ``C2.pl works''? Bonus pointmiod2014-04-171-1/+0
| | | | if you can spot C2.pl.
* Nuke BN_DEBUG_LEVITTEmiod2014-04-171-10/+0
|
* No need to consider being compiled by NASM anymore.miod2014-04-171-4/+0
|
* Stop paying lip service to non-AT&T syntax assemblers in the x86 world.miod2014-04-173-386/+1
|
* todo: do not leave 15 year old todo lists in the tree.miod2014-04-171-3/+0
|
* fix BIO_snprintf usage in here.beck2014-04-171-8/+19
| | | | ok tedu@
* Use of OPENSSL_SYS_xxx defines in public header files considered harmful.miod2014-04-174-28/+1
|
* Bob O.D.'ed on the o_dir code so high he forgot to rm the `test' aftermiod2014-04-171-66/+0
| | | | rewriting the code.
* sprintf: bad.miod2014-04-171-1/+1
| | | | | | snprintf: good. snprintf with a correct size: better! (harmless in this case)
* Remove utils that we don't useafresh12014-04-173-165/+0
| | | | | | | opensslwrap.sh and shlib_wrap.sh are used by tests that are getting replaced, x86asm.sh is obsoleted by our Makefile machinery ok miod
* Remove unused ssl utilsafresh12014-04-1730-5719/+0
| | | | | | This code is the reason perl has a name as a write only language. ok deraadt miod
* Remove oh-so-important-from-a-security-pov OpenSSL_rtdsc() function.miod2014-04-1712-251/+2
|
* fix some more leaks, mostly suggestions from miodjsg2014-04-176-2/+14
| | | | ok miod@
* Remove the benchmark part of the selftest. It uses the undocumentedmiod2014-04-171-43/+0
| | | | | | | OPENSSL_rdtsc() routine to get a high-precision timestamp, and (although this is the only user of this routine in libcrypto) forces every platform willing to provide fast assembly versions of some routines, to also provide OPENSSL_rdtsc().
* Ok, there was a need for OPENSSL_cleanse() instead of bzero() to preventmiod2014-04-1710-373/+2
| | | | | | | | | | | supposedly smart compilers from optimizing memory cleanups away. Understood. Ok, in case of an hypothetically super smart compiler, OPENSSL_cleanse() had to be convoluted enough for the compiler not to recognize that this was actually bzero() in disguise. Understood. But then why there had been optimized assembler versions of OPENSSL_cleanse() is beyond me. Did someone not trust the C obfuscation?
* Move the machine-specific parts of the libcrypto Makefile to per-arch makefilemiod2014-04-175-104/+242
| | | | | | fragments, to ease maintainance, and see through the fog of bugs. "looks good" deraadt@
* some KNF cleanup following the scriptderaadt2014-04-1722-169/+166
|
* fix some of the leaksjsg2014-04-174-7/+23
| | | | ok miod@ looks good deraadt@
* remove OPENSSL_realloc_clean usage here - replace with intrinsics to makebeck2014-04-171-4/+7
| | | | | it obvious what should happen. ok tedu@
* Fully kill FIPS API. Forcible certification conflicts with the goals of atedu2014-04-173-80/+2
| | | | | | free software project. ok beck deraadt Ports calling FIPS_mode_set(1): mongodb
* Initial KNF.jsing2014-04-174-508/+505
|
* I've replaced everything in this file. ISC liscense it with my copyrightbeck2014-04-171-54/+13
|
* KNF.jsing2014-04-171-3/+3
|
* Initial KNF.jsing2014-04-173-139/+122
|
* simply wrap around intrinsics, and knf cleanup.beck2014-04-171-57/+54
| | | | ok miod@ deraadt@
* Change library to use intrinsic memory allocation functions instead ofbeck2014-04-17200-1004/+1004
| | | | | | | | OPENSSL_foo wrappers. This changes: OPENSSL_malloc->malloc OPENSSL_free->free OPENSSL_relloc->realloc OPENSSL_freeFunc->free
* Revert unintended whitespace changes.jsing2014-04-172-6/+6
|
* OPENSSL_gmtime() is not a gmtime() wrapper. It is a gmtime_r().deraadt2014-04-171-18/+4
| | | | | Always trying to confuse people... ok guenther
* OPENSSL_DECLARE_EXIT serves no purpose.deraadt2014-04-179-9/+0
|
* 1. RAND_seed is now DEPRECATEDderaadt2014-04-172-2/+0
| | | | | | | | | | 2. Even passing a digest in as entropy is sloppy. But apparently the OpenSSL guys could find no objects of lesser value to pass to the pluggable random subsystem, and had to resort to private keys and digests. Classy. ok djm
* RAND_seed now does nothing, so skip the operationderaadt2014-04-171-6/+0
|
* Do not feed RSA private key information to the random subsystem asderaadt2014-04-173-11/+0
| | | | | | | | entropy. It might be fed to a pluggable random subsystem.... What were they thinking?! ok guenther
* remove duplicated tests in if statementsjsg2014-04-171-4/+4
| | | | ok krw@ sthen@ deraadt@
* unistd.h is always in the same place; no need to #include the result ofderaadt2014-04-1712-22/+11
| | | | a maze of conditional #define's
* OpenSSL PR#3309: when looking for an extension, set the last found positionsthen2014-04-171-3/+3
| | | | | | to -1 to properly search all extensions. ok tedu@ From http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=300b9f0b70
* move enginetest to regress as was done with the other testsjsg2014-04-171-283/+0
|
* call the correct decrypt function in aes_cbc_cipher()jsg2014-04-171-1/+1
| | | | | | | | | | | | | | | | From: commit e9c80e04c1a3b5a0de8e666155ab4ecb2697a77d Author: Andy Polyakov <appro@openssl.org> Date: Wed Dec 18 21:42:46 2013 +0100 evp/e_[aes|camellia].c: fix typo in CBC subroutine. It worked because it was never called. Our e_camellia.c does not have this problem. ok miod@ deraadt@
* tag some functions with bounded. idea and ok djmtedu2014-04-171-3/+6
|
* Clean up dangerous strncpy use. This included a use where the resultingbeck2014-04-168-27/+17
| | | | | | | string was potentially not nul terminated and a place where malloc return was unchecked. while we're at it remove dummytest.c ok miod@
* - Why do we hide from the OpenSSL police, dad?miod2014-04-166-114/+23
| | | | | | | | - Because they're not like us, son. They use macros to wrap stdio routines, for an undocumented (OPENSSL_USE_APPLINK) use case, which only serves to obfuscate the code. ok tedu@