summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* stab at indentationtedu2014-04-175-737/+725
|
* don't fake up SSIZE_MAXtedu2014-04-171-8/+0
|
* more windows/netware leftoverstedu2014-04-172-22/+3
|
* delete if 0 codetedu2014-04-174-77/+14
|
* more spring VMS cleanupgiovanni2014-04-173-14/+0
| | | | ok miod@ lteo@
* no need for a variable which is hardcoded and only used in an snprintf,sthen2014-04-171-13/+9
| | | | ok giovanni@. tidy comments nearby while there.
* Use !defined() rather than empty().miod2014-04-171-2/+2
|
* kill REF_PRINT/REF_CHECK debugging framework noone would usederaadt2014-04-1715-209/+4
| | | | ok miod
* Some VMS and WIN32 cleanupgiovanni2014-04-171-28/+5
| | | | ok miod@ lteo@
* Get rid of MS Visual C compiler and Intel C compiler specific defines.miod2014-04-1713-238/+8
|
* There are no plans to ever build this with the Metrojerks compiler.miod2014-04-172-20/+2
|
* Remove support for big-endian i386 and amd64.miod2014-04-173-22/+1
| | | | | | | | | | | | | Before someone suggests the OpenSSL people are junkies, here is what they mention about this: /* Most will argue that x86_64 is always little-endian. Well, * yes, but then we have stratus.com who has modified gcc to * "emulate" big-endian on x86. Is there evidence that they * [or somebody else] won't do same for x86_64? Naturally no. * And this line is waiting ready for that brave soul:-) */ So, yes, they are on drugs. But they are not alone, the stratus.com people are, too.
* Mostly gut e_os.h:deraadt2014-04-177-14/+14
| | | | | | | | USE_SOCKETS is unrelated to using sockets, but just pulls in .h files. It makes every file buy a kitchen sink, because 11 files forgot to. EXIT() is really exit(), a gentle surprise but... OPENSSL_EXIT() is really just return(), because noone compiles the openssl command non-monolithic anymore
* malloc + memset 0 -> callocmiod2014-04-171-22/+2
| | | | | (not that it matters much as this is in disabled code, for we don't build with zlib support)
* -Walltedu2014-04-171-1/+3
|
* unused variabletedu2014-04-171-3/+1
|
* a little less obfuscationtedu2014-04-171-17/+2
|
* fold prototypes into o_str.c. miodtedu2014-04-172-69/+4
|
* Aren't you glad to have this file tell you that ``C2.pl works''? Bonus pointmiod2014-04-171-1/+0
| | | | if you can spot C2.pl.
* Nuke BN_DEBUG_LEVITTEmiod2014-04-171-10/+0
|
* No need to consider being compiled by NASM anymore.miod2014-04-171-4/+0
|
* Stop paying lip service to non-AT&T syntax assemblers in the x86 world.miod2014-04-173-386/+1
|
* todo: do not leave 15 year old todo lists in the tree.miod2014-04-171-3/+0
|
* fix BIO_snprintf usage in here.beck2014-04-171-8/+19
| | | | ok tedu@
* Use of OPENSSL_SYS_xxx defines in public header files considered harmful.miod2014-04-174-28/+1
|
* Bob O.D.'ed on the o_dir code so high he forgot to rm the `test' aftermiod2014-04-171-66/+0
| | | | rewriting the code.
* sprintf: bad.miod2014-04-171-1/+1
| | | | | | snprintf: good. snprintf with a correct size: better! (harmless in this case)
* Remove utils that we don't useafresh12014-04-173-165/+0
| | | | | | | opensslwrap.sh and shlib_wrap.sh are used by tests that are getting replaced, x86asm.sh is obsoleted by our Makefile machinery ok miod
* Remove unused ssl utilsafresh12014-04-1730-5719/+0
| | | | | | This code is the reason perl has a name as a write only language. ok deraadt miod
* Remove oh-so-important-from-a-security-pov OpenSSL_rtdsc() function.miod2014-04-1712-251/+2
|
* fix some more leaks, mostly suggestions from miodjsg2014-04-176-2/+14
| | | | ok miod@
* Remove the benchmark part of the selftest. It uses the undocumentedmiod2014-04-171-43/+0
| | | | | | | OPENSSL_rdtsc() routine to get a high-precision timestamp, and (although this is the only user of this routine in libcrypto) forces every platform willing to provide fast assembly versions of some routines, to also provide OPENSSL_rdtsc().
* Ok, there was a need for OPENSSL_cleanse() instead of bzero() to preventmiod2014-04-1710-373/+2
| | | | | | | | | | | supposedly smart compilers from optimizing memory cleanups away. Understood. Ok, in case of an hypothetically super smart compiler, OPENSSL_cleanse() had to be convoluted enough for the compiler not to recognize that this was actually bzero() in disguise. Understood. But then why there had been optimized assembler versions of OPENSSL_cleanse() is beyond me. Did someone not trust the C obfuscation?
* Move the machine-specific parts of the libcrypto Makefile to per-arch makefilemiod2014-04-175-104/+242
| | | | | | fragments, to ease maintainance, and see through the fog of bugs. "looks good" deraadt@
* some KNF cleanup following the scriptderaadt2014-04-1722-169/+166
|
* fix some of the leaksjsg2014-04-174-7/+23
| | | | ok miod@ looks good deraadt@
* remove OPENSSL_realloc_clean usage here - replace with intrinsics to makebeck2014-04-171-4/+7
| | | | | it obvious what should happen. ok tedu@
* Fully kill FIPS API. Forcible certification conflicts with the goals of atedu2014-04-173-80/+2
| | | | | | free software project. ok beck deraadt Ports calling FIPS_mode_set(1): mongodb
* Initial KNF.jsing2014-04-174-508/+505
|
* I've replaced everything in this file. ISC liscense it with my copyrightbeck2014-04-171-54/+13
|
* KNF.jsing2014-04-171-3/+3
|
* Initial KNF.jsing2014-04-173-139/+122
|
* simply wrap around intrinsics, and knf cleanup.beck2014-04-171-57/+54
| | | | ok miod@ deraadt@
* Change library to use intrinsic memory allocation functions instead ofbeck2014-04-17200-1004/+1004
| | | | | | | | OPENSSL_foo wrappers. This changes: OPENSSL_malloc->malloc OPENSSL_free->free OPENSSL_relloc->realloc OPENSSL_freeFunc->free
* Revert unintended whitespace changes.jsing2014-04-172-6/+6
|
* OPENSSL_gmtime() is not a gmtime() wrapper. It is a gmtime_r().deraadt2014-04-171-18/+4
| | | | | Always trying to confuse people... ok guenther
* OPENSSL_DECLARE_EXIT serves no purpose.deraadt2014-04-179-9/+0
|
* 1. RAND_seed is now DEPRECATEDderaadt2014-04-172-2/+0
| | | | | | | | | | 2. Even passing a digest in as entropy is sloppy. But apparently the OpenSSL guys could find no objects of lesser value to pass to the pluggable random subsystem, and had to resort to private keys and digests. Classy. ok djm
* RAND_seed now does nothing, so skip the operationderaadt2014-04-171-6/+0
|
* Do not feed RSA private key information to the random subsystem asderaadt2014-04-173-11/+0
| | | | | | | | entropy. It might be fed to a pluggable random subsystem.... What were they thinking?! ok guenther