| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
|
| |
intrinsics. This is the easy ones, a few left to check one at
a time.
ok miod@ deraadt@
|
|
|
|
| |
OK from beck@ and miod@
|
| |
|
|
|
|
| |
ok jsing@
|
|
|
|
|
|
|
| |
into the hash; hoping the system has some ASLR or PIE. This replaces and
substantially improves upon &main which proved problematic with some picky
linkers.
Work with kettenis, testing by beck
|
|
|
|
| |
ok beck
|
|
|
|
| |
EVP_MD_CTX_cleanup() to be called.
|
| |
|
|
|
|
|
|
| |
appropriate function. Checking for privkey != NULL is not enough since
privkey points to a member of ndsa if ndsa != NULL.
dsa_priv_encode(): possible double free in error path.
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
to reinitialize all of it, especially if it is used with the same MD algorithm.
However, when the MD algorithm changes, it needs to perform more cleanups.
Make that code more closer to what EVP_MD_CTX_cleanup() does by:
- only freeing md_data if EVP_MD_CTX_FLAG_REUSE is not set
- performing an explicit_bzero of md_data before freeing it
- making sure we call EVP_PKEY_CTX_free on the pctx if the allocation for the
new md_data fails.
ok tedu@
|
| |
|
|
|
|
|
|
|
| |
while we can take it out in portable at compile time, it is still a problem
when we install this header file on a system that doesn't support __bounded__
if this is unguarded.
ok miod@ bcook@
|
| |
|
|
|
|
|
|
| |
distractions to people testing and seeing link errors in some setups.
This will come back in another form
ok deraadt@
|
| |
|
| |
|
|
|
|
|
|
|
| |
``The probability that a randomly generated key is weak is -1/2^52,
so it is not really worth checking for them.''
This kind of naively optimistic attitude is not compatible with security.
|
| |
|
|
|
|
| |
OK: beck@
|
|
|
|
|
|
| |
add a function to use function pointers that does not take sizeof(fptr).
OK beck@
|
|
|
|
|
|
| |
build on pre-EVP_CIPH_FLAG_DEFAULT_ASN1 codebases.
ok jsing@
|
|
|
|
| |
done for other symmetric algorithms recently.
|
|
|
|
| |
definitions using C99 field initializers. No functional change.
|
|
|
|
|
|
|
| |
instances. This one for OPENSSL_ALLOW_PROXY_CERTS gets turned off first,
especially since it had this special comment:
/* A hack to keep people who don't want to modify their software happy */
ok beck jsing
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- first, BN_free == BN_clear_free in our libcrypto, so we do not need to
treat CBIGNUM (crypto BN) separately from BIGNUM (regular BN).
- then, in bn_i2c(), since BN_bn2bin returns BN_num_bytes(input), take
advantage of this to avoid calling BN_num_bytes() a second time.
BN_num_bytes() is cheap, but this not a reason to perform redundant
work.
- finally, in bn_c2i, if bn_new() fails, return early. Otherwise
BN_bin2bn will try to create a BN too, and although this will probably
fail since we were already out of memory, if we are on a threaded
process and suddenly the allocation succeeds, we will leak it since it
will never be stored in *pval.
ok jsing@
|
|
|
|
|
| |
NULL.
ok deraadt@ guenther@ jsing@
|
|
|
|
|
|
|
| |
Improves readability, keeps the code smaller so that it is warmer in your
cache.
review & ok deraadt@
|
| |
|
|
|
|
|
| |
keep linux distros happy that don't have it.
ok bcook@
|
|
|
|
|
| |
X509_STORE_CTX_free() accept NULL pointers as input without dereferencing them,
like all the other well-behaved *_CTX_free() functions do.
|
| |
|
| |
|
|
|
|
|
| |
using O_NOFOLLOW - cope with it as best as possible by trying two
different paths. - written by deraadt@ and kettenis@
|
| |
|
|
|
|
| |
is
|
|
|
|
|
| |
detect versions distinct from OPENSSL_BLAH_WOOF..
ok jsing@ tedu@ deraadt@
|
|
|
|
| |
ok miod@
|
| |
|
|
|
|
|
|
| |
Jeff Trawick, Jean-Paul Calderone, Michal Bozon, Jeffrey Walton and Rich Salz,
via OpenSSL trunk (with some parts not applying to us, such as SSLv2 support,
at least partially removed).
|
|
|
|
| |
Coverity via OpenSSL trunk
|
|
|
|
| |
PR #3439 via OpenSSL trunk
|
|
|
|
| |
via OpenSSL trunk.
|
|
|
|
| |
but without a memory leak.
|
| |
|
|
|
|
| |
PR #3418 via OpenSSL trunk
|
|
|
|
|
| |
for apps that haven't had time to make the appropriate changes was added.
time's up.
|
|
|
|
| |
trunk
|
|
|
|
| |
constructed form. OpenSSL PR #2438 via OpenSSL trunk
|
|
|
|
|
|
|
|
| |
Internal pointers in CCM, GCM and XTS contexts should either be
NULL or set to point to the appropriate key schedule. This needs
to be adjusted when copying contexts.
OpenSSL PR #3272 with further fixes, from OpenSSL trunk
|