summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* Remove the _shadow_ indirection, which is unnecessary in a world withoutjsing2014-05-243-7/+4
| | | | | | OPENSSL_EXPORT_VAR_AS_FUNCTION. ok miod@
* KNF.jsing2014-05-2415-2218/+1913
|
* More KNF.jsing2014-05-241-2/+2
|
* KNF.jsing2014-05-244-91/+91
|
* We have shared global variables - unifdef OPENSSL_EXPORT_VAR_AS_FUNCTION.jsing2014-05-242-69/+0
| | | | ok miod@ beck@
* Expand the OPENSSL_.*GLOBAL.* macros and stop including e_os2.h.jsing2014-05-243-8/+7
| | | | ok miod@ beck@
* Another e_os2.h -> opensslconf.h.jsing2014-05-241-1/+3
|
* e_os2.h is not needed here.jsing2014-05-241-1/+1
|
* Explicitly include <openssl/openssl.conf>. des.h still needs e_os2.h (atjsing2014-05-241-2/+3
| | | | least for a little while longer...)
* Almost nothing actually needs to include <openssl/e_os2.h>, however byjsing2014-05-2426-28/+49
| | | | | | | including it they get <openssl/opensslconf.h>. So instead of pulling in <openssl/e_os2.h>, just pull in <openssl/opensslconf.h>. "go ahead" miod@
* Expand OPENSSL_{GLOBAL,EXTERN} macros that I missed last time around,jsing2014-05-242-2/+2
| | | | | | since they are hiding in the #define forest. ok miod@
* Spell ssize_t correctly (the incorrect spelling is ossl_ssize_t).jsing2014-05-244-15/+15
| | | | ok miod@
* No OPENSSL_SYS_WINDOWS wanted.jsing2014-05-241-3/+0
| | | | ok miod@
* Take an axe to rc5speed.c - strip out everything that is for otherjsing2014-05-231-84/+9
| | | | platforms.
* We have stdio and are not WIN16.jsing2014-05-231-2/+0
|
* Not OPENSSL_SYS_SUNOS.jsing2014-05-231-3/+0
|
* Replace (sometimes conditional) use of alloca with malloc, and clearingmiod2014-05-232-39/+16
| | | | | | through volatile pointers with explicit_bzero(). ok beck@ jsing@
* don't deprecate until at least the base src tree is clean.tedu2014-05-231-12/+8
|
* Mark the malloc wrapper functions as deprecated so warnings willbeck2014-05-221-8/+12
| | | | | happen on their use. ok miod@
* Convert OPENSSL_malloc stuff back to intrinsics, a few were missedbeck2014-05-223-6/+6
| | | | | as new stuff was brought in. ok miod@
* if (x) free(x) -> free(x); semantic patch generated with coccinelle, carefullymiod2014-05-2225-81/+42
| | | | eyeballed before applying. Contributed by Cyril Roelandt on tech@
* Expand the OPENSSL_{GLOBAL,EXPORT,IMPORT,EXTERN} macros - this rids thejsing2014-05-227-22/+20
| | | | | | libssl tree from all uses of these defines. ok miod@
* Hello? Yes, you're speaking with OPENSSL_SYS_UNIX.jsing2014-05-221-28/+0
| | | | ok beck@ miod@
* mark BIO_snprintf as deprecated, so warnings will be generated for it'sbeck2014-05-221-2/+2
| | | | use. ok miod@ tedu@
* KNF.jsing2014-05-223-171/+154
|
* No uses of UTF8_{getc,putc}() in ports, so remove them from the public header.guenther2014-05-222-9/+8
| | | | ok miod@
* Bring UTF8_{getc,putc} up-to-date: it's been a decade since 5- and 6-byteguenther2014-05-204-93/+88
| | | | | | | | encodings and encoding of surrogate pair code points were banned. Add checks for those, both to those functions and to the code decoding the BMP and UNIV encodings. ok miod@
* If you need to allocate `a + b' bytes of memory, then don't allocate `a + b*2',miod2014-05-183-6/+6
| | | | | | this is confusing and unnecessary. Help (coz I got confused) and ok guenther@ beck@
* Make sure UTF8_getc() is invoked with the proper buffer size.miod2014-05-181-2/+2
| | | | ok beck@ guenther@
* Plug memory leaks upon error in OCSP_url_svcloc_new().miod2014-05-181-6/+9
| | | | ok jsing@
* In OCSP_sendreq_bio(), cope with OCSP_sendreq_new() returning NULL.miod2014-05-181-4/+6
| | | | ok jsing@
* More KNF.jsing2014-05-1810-193/+208
|
* does sunos not have memmove? sorry, i guess sunos will not have libressl.tedu2014-05-171-21/+3
| | | | ok guenther miod
* unchecked malloc() return value in OCSP_sendreq_new().miod2014-05-171-0/+2
|
* KNFmiod2014-05-178-1274/+1332
|
* simple reallocarray to check multiplies. ok guenthertedu2014-05-171-6/+4
|
* no no md2tedu2014-05-173-9/+0
|
* no no seedtedu2014-05-172-17/+0
|
* switch RSA key generation default to 2048 bits (matching ssh); ok miod@sthen2014-05-171-1/+1
|
* When OPENSSL_LOAD_CONF was added it ended up with more #if 0 code,jsing2014-05-164-96/+16
| | | | | | | | | | | more #ifdefs and a new source file that contains a single function. Nuke the #if 0 code that is now a macro and move the single function in evp_acnf.c to c_all.c, which is where the other code lives. While here, tidy evp.h slightly, remove an unnecessary #ifdef __OpenBSD__ and nuke a comment that is now a lie. ok miod@
* Fix memory leaks upon failure.miod2014-05-152-27/+39
| | | | ok beck@
* Replace ASN1_GENERALIZEDTIME_adj(), ASN1_UTCTIME_adj() andmiod2014-05-153-25/+73
| | | | | | | ASN1_TIME_to_generalizedtime() with wrappers around their former implementations, making sure memory allocated is freed in all failure cases. help and ok from beck@ and Brendan MacDonell.
* More KNF.jsing2014-05-154-7/+7
|
* Use C99 initialisers for the AEAD struct.jsing2014-05-151-9/+9
|
* KNF.jsing2014-05-151-70/+67
|
* Add a ChaCha20-Poly1305 AEAD EVP implementation to libcrypto, from Adamjsing2014-05-154-2/+274
| | | | | | Langley's Chromium OpenSSL patches. ok miod@
* KNF.jsing2014-05-155-283/+343
|
* Add an AEAD EVP interface to libcrypto, along with AES-GCM AEADjsing2014-05-156-35/+551
| | | | | | | implementations. This largely pulls in Adam Langley's AEAD patches from Chromium's OpenSSL. ok miod@
* Stop being a dummy... presumably these are left overs from pedantic modejsing2014-05-159-22/+2
| | | | | | that were not wrapped with #if PEDANTIC. ok miod@
* Add poly1305 to libcrypto utilising Andrew Moon's public domainjsing2014-05-144-1/+354
| | | | | | implementation. ok miod@