Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Make sure srp_Calc_k() digest operations are checked for error; from | miod | 2014-07-10 | 1 | -9/+17 | |
| | | | | Florian Zumbiehl (florz , florz . de) on tech@ | |||||
* | Make sure SRP_Calc_client_key() returns NULL instead of a pristine BN_new() | miod | 2014-07-10 | 1 | -4/+9 | |
| | | | | upon error; from Florian Zumbiehl (florz , florz . de) on tech@ | |||||
* | Nuke OPENSSL_NONPIC_relocated since nothing uses it. | jsing | 2014-07-10 | 2 | -4/+2 | |
| | | | | ok miod@ | |||||
* | Kill a blatantly outdated (and now wrong) comment | miod | 2014-07-10 | 1 | -4/+1 | |
| | ||||||
* | Try and fix the horrible coding style of the example code snippets. | miod | 2014-07-10 | 7 | -178/+201 | |
| | ||||||
* | Stop including standard headers via cryptlib.h - pull in the headers that | jsing | 2014-07-10 | 134 | -210/+453 | |
| | | | | | | are needed in the source files that actually require them. ok beck@ miod@ | |||||
* | Remove empty sections and references to des_modes(7) which we don't have. | miod | 2014-07-10 | 22 | -73/+4 | |
| | ||||||
* | Fewer lies, also do not document DES_3cbc_encrypt anymore. | miod | 2014-07-10 | 1 | -22/+6 | |
| | ||||||
* | Features introduce in OpenSSL 0.9.8 do not deserve their own section. | miod | 2014-07-10 | 1 | -21/+19 | |
| | | | | | Instead, fold their description in the main documentation, and update the history section to mention them as well. | |||||
* | Attempt to (incompletely) document EVP_aes_*(). | miod | 2014-07-10 | 3 | -10/+15 | |
| | | | | | | | | | When EVP_des_cbc() was suggested, suggest EVP_aes_256_cbc() instead. Remove mention of EVP_des_ede3_cbc() being the algorithm of choice for S/MIME. Don't mention US-export limited RC2 algorithms, you'd better not know about them. | |||||
* | RSA_setup_blinding() gets a BN with BN_CTX_get(), returns `out of memory' | miod | 2014-07-10 | 1 | -6/+1 | |
| | | | | | | | | if it fails, then never uses it anymore, and may invoke a function which needs more than one BN from the BN_CTX anyway, so this is pointless - remove the BN_CTX_get() call and the test. ok jsing | |||||
* | make asn1 free safe to call with null pointers of any type. | tedu | 2014-07-10 | 1 | -4/+3 | |
| | | | | ok jsing miod | |||||
* | One sure hopes that OPENSSL_cleanse will: | jsing | 2014-07-10 | 1 | -2/+2 | |
| | | | | /* Clear password from memory */ | |||||
* | Remove #if 0 code which dumps your data to stdout. | miod | 2014-07-10 | 1 | -9/+1 | |
| | ||||||
* | Tweak some comments. We do not really need to know that "New!" flags were | jsing | 2014-07-10 | 1 | -9/+8 | |
| | | | | added 10+ years ago (they're kinda somewhat stale by now...) | |||||
* | Stop playing with the RSA_FLAG_BLINDING flag. It does nothing. | jsing | 2014-07-10 | 1 | -3/+1 | |
| | | | | ok miod@ | |||||
* | delete some casts. ok miod | tedu | 2014-07-10 | 12 | -35/+35 | |
| | ||||||
* | Missing allocation checks and potential NULL pointer dereference in the | miod | 2014-07-10 | 1 | -7/+15 | |
| | | | | error path in PEM_X509_INFO_read_bio(); ok guenther@ jsing@ | |||||
* | Remove RSA_FLAG_NO_EXP_CONSTTIME, which was deprecated 12+ years ago. | jsing | 2014-07-10 | 1 | -13/+1 | |
| | | | | | | sthen@ confirmed that no ports are referencing it. ok miod@. | |||||
* | Remove DEBUG_KEYGEN and DEBUG_DECRYPT support. | miod | 2014-07-10 | 2 | -49/+2 | |
| | ||||||
* | replace getservbyname_r with getaddrinfo for portability | bcook | 2014-07-10 | 1 | -6/+11 | |
| | | | | ok jsing@ | |||||
* | Remove bogus preprocessor statements trying to pick the largest integer | miod | 2014-07-10 | 4 | -32/+4 | |
| | | | | | | | | type for BF_LONG, MD[45]_LONG and SHA_LONG. First, the preprocessor symbols they check for a 64-bit system is __ILP64__ which no sane system provides; second, on the platforms which have assembler code to speed things up, the assembler code assumes a 32-bit type will be used. | |||||
* | BN_free, BN_clear_free, BN_CTX_free, BN_BLINDING_free and BN_MONT_CTX_free | jsing | 2014-07-10 | 6 | -55/+32 | |
| | | | | | | all have implicit NULL checks, so we do not need them here. ok miod@ | |||||
* | Use a while loop instead of an ifdowhile loop. | jsing | 2014-07-10 | 2 | -12/+10 | |
| | | | | ok miod@ tedu@ | |||||
* | include <limits.h> for LONG_MIN/LONG_MAX. | bcook | 2014-07-09 | 1 | -2/+2 | |
| | | | | | | | Also remove <sys/filio.h> added from previous commit. This was the wrong way to get FIONBIO. ok jsing@ | |||||
* | ASN1_STRING_free can handle NULL, so callers don't need to check. ok miod | tedu | 2014-07-09 | 5 | -27/+17 | |
| | ||||||
* | reset host, port, path to null after freeing so the caller doesn't | tedu | 2014-07-09 | 1 | -1/+4 | |
| | | | | | accidentally free them again. actually a bug in the caller and (hey hey) apps/ocsp.c has exactly that bug, but it's easier/safer to fix here. | |||||
* | stale prototype | tedu | 2014-07-09 | 1 | -2/+1 | |
| | ||||||
* | Make comments readable. | jsing | 2014-07-09 | 1 | -27/+33 | |
| | ||||||
* | More KNF. | jsing | 2014-07-09 | 19 | -322/+331 | |
| | ||||||
* | KNF. | jsing | 2014-07-09 | 2 | -123/+108 | |
| | ||||||
* | ocsp_check_ids says "If algoritm mismatch let caller deal with it" before | tedu | 2014-07-09 | 1 | -6/+1 | |
| | | | | | | returning 2. The one and only caller doesn't check for that, so... Stop returning it. ok miod | |||||
* | Update to match the current state of crypto/rand, and remove MLINKS for | miod | 2014-07-09 | 5 | -101/+16 | |
| | | | | RAND_event and RAND_screen. | |||||
* | Remove mention that the PRNG needs to be seeded before invoking some | miod | 2014-07-09 | 13 | -35/+4 | |
| | | | | functions. | |||||
* | Unifdef -UPKCS_TESTVECT - we don't want the random data used in OAEP padding | miod | 2014-07-09 | 1 | -6/+1 | |
| | | | | to get overwritten by a known value, ever. | |||||
* | {malloc,reallocarray} + memset(,0,) -> calloc | miod | 2014-07-09 | 2 | -7/+5 | |
| | | | | ok tedu@ | |||||
* | Replace memset(a, 0, ...); free(a); by explicit_bzero(a, ...); free(a); in | miod | 2014-07-09 | 1 | -2/+2 | |
| | | | | | | | fear a smartass-optimizing compiler decides memset is useless immediately before free(). ok jsing@ deraadt@ tedu@ | |||||
* | Remove leading underscore from _BYTE_ORDER and _{LITTLE,BIG}_ENDIAN, to be | miod | 2014-07-09 | 10 | -58/+58 | |
| | | | | | more friendly to systems where the underscore flavours may be defined as empty. Found the hard way be bcook@; joint brainstrom with bcook beck and guenther | |||||
* | miod@ fixed the "bug" so remove reference to it in the man pod^Wpage. | jsing | 2014-07-09 | 1 | -5/+0 | |
| | ||||||
* | add <sys/filio.h> header for FIONBIO | bcook | 2014-07-09 | 1 | -1/+2 | |
| | | | | ok beck@ | |||||
* | Simplify error path of DH_check_pub_key() | miod | 2014-07-09 | 1 | -8/+4 | |
| | ||||||
* | KNF | miod | 2014-07-09 | 9 | -567/+599 | |
| | ||||||
* | remove unused variables getentropy for OS X | bcook | 2014-07-09 | 2 | -6/+6 | |
| | | | | ok beck@ | |||||
* | cast ASN1_STRING (unsigned char *) to match strlcat's argument (char *) | bcook | 2014-07-09 | 1 | -2/+2 | |
| | | | | ok beck@ | |||||
* | remove unused, private version strings except SSL_version_str | bcook | 2014-07-09 | 33 | -162/+32 | |
| | | | | | | Also remove unused des_ver.h, which exports some of these strings, but is not installed. ok miod@ tedu@ | |||||
* | Make use of this wonderful modern C construct known as a `switch', instead of | miod | 2014-07-09 | 1 | -11/+17 | |
| | | | | 8-line if() tests. | |||||
* | KNF | miod | 2014-07-09 | 11 | -906/+939 | |
| | ||||||
* | Kill more FIPS tentacles by removing the private_AES_set_{enc,dec}rypt_key() | miod | 2014-07-09 | 8 | -84/+60 | |
| | | | | | | | | internal interfaces, and promoting them to being the public AES_set_{enc,dec}rypt_key() interfaces. In non-FIPS mode, these public interfaces were directly calling the private ones. ok guenther@ jsing@ | |||||
* | Be more strict in RSA_padding_check_X931(), and thus avoid a possible | miod | 2014-07-09 | 1 | -2/+2 | |
| | | | | | memcpy() with a negative size. ok tedu@ | |||||
* | In the old days (not in this century), SSLeay 0.4.5 would create X.509 RSA | miod | 2014-07-09 | 1 | -14/+3 | |
| | | | | | | | | | signatures using the wrong oid for the signature type. The signature verification code has thus been modified to allow these signatures to be accepted, with a printf to stderr to notify the user something was fishy. Remove this chunk; these signatures will no longer get accepted. ok deraadt@ guenther@ jsing@ tedu@ |