Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | RSA_NULL used to be a compile option allowing the RSA interfaces to be | miod | 2014-07-09 | 5 | -178/+6 | |
| | | | | | | | | compiled-in, with nonfunctional code, to be able to cope with the RSA patent. However, we don't use this option, and the RSA patent has expired more than 10 years ago, so just drop this piece. | |||||
* | KNF | miod | 2014-07-09 | 19 | -1967/+1959 | |
| | ||||||
* | replace malloc(strlen())/strlcpy with strdup | bcook | 2014-07-08 | 1 | -3/+2 | |
| | | | | ok beck@ jsing@ | |||||
* | Define SMALL_REGISTER_BANK on arm and vax, for it generates faster code for | miod | 2014-07-08 | 1 | -1/+5 | |
| | | | | | these systems (vax being 30% faster!). (surprisingly, the prime candidate for SMALL_REGISTER_BANK, SuperH, runs actually slower in that case) | |||||
* | Remove undocumented _des_crypt() interface and its companion header file, | miod | 2014-07-08 | 3 | -233/+2 | |
| | | | | | | | which had never been installed, so it's unlikely something ever used this in the last 15~20 years. ok deraadt@ jsing@ beck@ | |||||
* | add missing stdint. include for uint32_t, etc. | bcook | 2014-07-08 | 1 | -1/+4 | |
| | | | | ok beck@ jsing@ | |||||
* | We do not care about broken Borland C pre-processors. | jsing | 2014-07-08 | 1 | -5/+3 | |
| | | | | ok beck@ deraadt@ | |||||
* | Pretty much everything has SO_REUSEADDR - nuke the #ifdefs. | jsing | 2014-07-08 | 1 | -5/+1 | |
| | | | | ok beck@ | |||||
* | We have EAI_FAMILY - remove the #ifdefs. | jsing | 2014-07-08 | 1 | -5/+1 | |
| | | | | ok beck@ | |||||
* | getentropy for osx and solaris. will be needed for a portable release | beck | 2014-07-08 | 4 | -0/+1676 | |
| | ||||||
* | More KNF. | jsing | 2014-07-08 | 1 | -11/+21 | |
| | ||||||
* | Avoid locking in BIO_get_port() by using getservbyname_r() instead of | jsing | 2014-07-08 | 1 | -31/+31 | |
| | | | | | | getservbyname(). While here, provide a common/single return path. ok deraadt@ | |||||
* | fix oops, accidental delete.. darn copying of files between machines | beck | 2014-07-08 | 2 | -4/+4 | |
| | ||||||
* | j should be an int, like repeat | beck | 2014-07-08 | 2 | -6/+8 | |
| | ||||||
* | KNF. | jsing | 2014-07-08 | 16 | -656/+757 | |
| | ||||||
* | unbreak last commit - but same intent, make re-seed less expensive | beck | 2014-07-08 | 2 | -24/+32 | |
| | ||||||
* | More KNF. | jsing | 2014-07-08 | 1 | -16/+18 | |
| | ||||||
* | Simplify various BIO_sock_* fuctions - less code, better variable names, | jsing | 2014-07-08 | 1 | -27/+12 | |
| | | | | | | correct types and fewer casts. ok deraadt@ miod@ | |||||
* | repeat calls to getentrypy() with the same pid likely indicate reseeds. | deraadt | 2014-07-08 | 2 | -6/+20 | |
| | | | | | | Since we assume the PRNG above is doing "something old, something new" folding, shortcut and do fewer repeats through the timing loop. ok beck | |||||
* | Memory-leak-in-error-path of the day in X509_ATTRIBUTE_set1_data(). | miod | 2014-07-03 | 1 | -2/+3 | |
| | | | | ok logan@ beck@ | |||||
* | pk7_doit.c r1.20 introduced a NULL check that ensures that the signature | jsing | 2014-07-02 | 1 | -2/+2 | |
| | | | | | | | | | | contents are not NULL, however this breaks detached signature processing. Fix this by allowing the signature contents to be NULL when operating with a detached signature. Found the hard way by sthen@. ok sthen@ | |||||
* | Remove more unused cruft. | jsing | 2014-07-02 | 29 | -1633/+0 | |
| | | | | No objection from the usual suspects. | |||||
* | KNF. | jsing | 2014-07-02 | 1 | -61/+51 | |
| | ||||||
* | Avoid a NULL deref in i2d_ECPrivateKey() when an EC_KEY lacks the public key | miod | 2014-07-01 | 1 | -2/+2 | |
| | | | | | | member (which is perfectly acceptable). From BoringSSL (Adam Langley), commit f71a27920a903c9c36bcb31e68781b17674d3fd2 | |||||
* | simplify and unobfuscate a variable to fix a mem leak. | tedu | 2014-06-30 | 1 | -6/+9 | |
| | | | | original diff by logan | |||||
* | Remove yet another unused file... a backup copy (minus copyright and | jsing | 2014-06-29 | 1 | -66/+0 | |
| | | | | includes) follows this commit message: | |||||
* | KNF. | jsing | 2014-06-29 | 11 | -1606/+1563 | |
| | | | | | | | | I just spent too long chasing a bug in here and really should have done this first. Gem of the day... is it an if test or a for loop? No, it is a super ifloop! if (!(flags & PKCS7_NOVERIFY)) for (k = 0; k < sk_X509_num(signers); k++) { | |||||
* | Remove another unused source file - I got suspicious when I found a | jsing | 2014-06-29 | 1 | -460/+0 | |
| | | | | | | | | function that ended with: if (ret & 0x01) if (ret & V_ASN1_CONSTRUCTED) } | |||||
* | correct issetugid sense as spotted by Stijn van Drongelen. | deraadt | 2014-06-29 | 1 | -3/+7 | |
| | | | | Substantially expand the conditional to reduce potential for error. | |||||
* | Add a missing word. | jca | 2014-06-28 | 1 | -1/+1 | |
| | ||||||
* | Fix a memory leak and another one that occurs in the error paths. | logan | 2014-06-28 | 1 | -2/+6 | |
| | | | | | | | (Thanks to Brent Cook) OK from tedu@ | |||||
* | Fix 9 memory leaks. | logan | 2014-06-28 | 1 | -1/+10 | |
| | | | | | | | | (Thanks to Brent Cook) With help from tedu@ OK from tedu@ | |||||
* | When building a BN on the stack in BN_div(), make sure to initialize all its | miod | 2014-06-27 | 1 | -1/+2 | |
| | | | | | | fields (i.e. the flags field) before using it. This is currently harmless, but might not be if we end up invoking other BN functions checking for constant-time processing requirement in the future. | |||||
* | save_errno botch; spotted by miod | deraadt | 2014-06-27 | 1 | -2/+2 | |
| | ||||||
* | hand-KNF macro the do { } while loops | deraadt | 2014-06-27 | 4 | -40/+49 | |
| | ||||||
* | hand-KNF the remaining bits | deraadt | 2014-06-27 | 1 | -98/+106 | |
| | ||||||
* | Remove M_ASN1_New* macros which are only used in X509_PKEY_new() are obfuscate | miod | 2014-06-27 | 2 | -22/+16 | |
| | | | | | | it to hide memory leaks in the error paths, and fix aforementioned memory leaks. ok jsing@ logan@ deraadt@ | |||||
* | save errno in ERR_put_error(), so that SYSerr doesn't have any accidental | deraadt | 2014-06-26 | 1 | -1/+3 | |
| | | | | | cases where errno can be trashed. ok jsing | |||||
* | fix HD() misuse; from brent cook | deraadt | 2014-06-26 | 2 | -4/+4 | |
| | ||||||
* | AT_BASE returns us the *address* of the start of ld.so, so | beck | 2014-06-25 | 2 | -4/+4 | |
| | | | | | use the address, not what it points to (which is always the same) ok deraadt@ | |||||
* | get the page of data at AT_SYSINFO_EHDR | beck | 2014-06-25 | 2 | -4/+4 | |
| | | | | ok deraadt@ | |||||
* | comment fixes from theo | beck | 2014-06-25 | 2 | -10/+12 | |
| | ||||||
* | Possibly obtain a little bit of entropy from addresses returned | beck | 2014-06-25 | 2 | -4/+46 | |
| | | | | | by getauxval if we have it. ok deraadt@ | |||||
* | O_NOFOLLOW would be very nice to have here if the version of linux | beck | 2014-06-25 | 2 | -20/+22 | |
| | | | | | we are running supports it. from enh@google.com | |||||
* | Unifdef -UNO_SYS_TYPES_H | miod | 2014-06-24 | 5 | -20/+9 | |
| | ||||||
* | Remove previously commented out wrong code, as well as the comment saying this | miod | 2014-06-24 | 1 | -3/+1 | |
| | | | | is incorrect code. | |||||
* | Remove ancient workaround for previous century's compilers in the declaration | miod | 2014-06-24 | 1 | -2/+1 | |
| | | | | of CRYPTO_EX_DATA; riding upon the libcrypto major bump. | |||||
* | Remove BIO_f_reliable(), guilty of playing with EVP_MD_CTX internals it | miod | 2014-06-24 | 3 | -629/+3 | |
| | | | | | should not know anything about. Verified not to be used in ports; riding upon the recent libcrypto major bump. | |||||
* | Crank libcrypto major since my previous commit changed the size of the | jsing | 2014-06-24 | 2 | -2/+2 | |
| | | | | ChaCha context. Other changes will also ride this crank. | |||||
* | If a chacha operation does not consume all of the generated key stream, | jsing | 2014-06-24 | 3 | -7/+46 | |
| | | | | | | | | | | | | | | | | ensure that we save it and consume it on subsequent writes. Otherwise we end up discarding part of the key stream and instead generate a new block at the start of the next write. This was only an issue for callers that did multiple writes that are not multiples of 64 bytes - in particular, the ChaCha20Poly1305 usage does not hit this problem since it performs encryption in a single-shot. For the same reason, this is also a non-issue when openssl(1) is used to encrypt with ChaCha. Issue identified by insane coder; reported to bugs@ by Joseph M. Schwartz. ok beck@ |