summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* Unifdef -UPKCS1_CHECK and remove SSL_OP_PKCS1_CHECK_[12], this is leftovermiod2014-04-231-3/+0
| | | | | | | | ``debug'' code from a 15+ years old bugfix and the SSL_OP_PKCS1_CHECK_* constants have had a value of zero since ages. No production code should use them. ok beck@
* ain't nobody got time for hpuxtedu2014-04-231-22/+0
|
* fix some variablestedu2014-04-231-2/+1
|
* replace a bunch of hand duped strings with strduptedu2014-04-232-10/+4
|
* Don't bother generating win64 assembly prologue.miod2014-04-231-26/+2
|
* malloc/memset -> calloc. from peter malonetedu2014-04-231-2/+1
|
* No longer needed during build. Brings a smile on beck@'s face.miod2014-04-231-6/+0
|
* The usual idiom to cope with systems not defining socklen_t is to add amiod2014-04-232-49/+8
| | | | | | | | | | | | | | | | | | #define socklen_t int somewhere (or a typedef, whatever gives you an integer type of the size your system expects as the 3rd argument of accept(2), really). OpenSSL here is a bit more creative by using an union of an int and a size_t, and extra code if sizeof(int) != sizeof(size_t) in order to recover the proper size. With a comment mentioning that this has no chance to work on a platform with a stack growing up and accept() returning an int, fortunately this seems to work on HP-UX. Switch to the light side of the force and declare and use socklen_t variables, period. If your system does not define socklen_t, consider bringing it back to your vendor for a refund. ok matthew@ tedu@
* close socket in failure cases tootedu2014-04-231-0/+3
|
* if realloc failed, BIO_accept would leak memory and return NULL, causingtedu2014-04-231-2/+11
| | | | caller to crash. Fix leak and return an error instead. from Chad Loder
* One last Dec C tentacle on alpha.miod2014-04-231-4/+1
|
* When I grow up, I want to write workaround for long long multiplicationsmiod2014-04-231-15/+0
| | | | under __TANDEM systems and compilers, using hardcoded octal numbers. NOT.
* Remove IRIX_CC_BUG workaround.miod2014-04-231-6/+0
|
* I'm glad to know that Ultrix CC has a bug optimizing switch() statementsmiod2014-04-232-15/+0
| | | | | lacking an explicit `case 0:' construct. But Ultrix has been dead for more than 15 years, really. Don't give it any reason to move out of its coffin.
* Grr, the more you remove, the more there remain.miod2014-04-232-618/+0
|
* Forgotten during latest spring cleaning of unreferenced bits.miod2014-04-231-276/+0
|
* Unifdef -UPEDANTIC. ok beck@ tedu@miod2014-04-2313-73/+35
|
* Remove duplicate pointer assignment in ASN1_primitive_free(); Dirk Englingmiod2014-04-231-1/+0
|
* Figure out endianness at compile-time, using _BYTE_ORDER frommiod2014-04-238-64/+50
| | | | | | | <machine/endian.h>, rather than writing 1 to a 32-bit variable and checking whether the first byte is nonzero. tweaks and ok matthew@; ok beck@ tedu@
* Casting from a const unsigned char ** to a const unsigned char ** seems...jsing2014-04-231-8/+4
| | | | | | | unnecessary. Remove the temporary ugly casts - the comments even call them that! ok guenther@
* Make libssl and libcrypto compile with -Werrorbeck2014-04-232-3/+3
| | | | ok miod@
* Make sure ret->name is NULL'ed before return when freeing.beck2014-04-231-0/+1
| | | | from Dirk Engling <erdgeist@erdgeist.org>
* Rather than sprinkling magical numbers everywhere, we can use sizeof()beck2014-04-231-4/+4
| | | | | for the size of a fixed size array. From Dirk Engling <erdgeist@erdgeist.org>
* unifdef -UAES_LONG for we do not intend to run on platforms where int is smallermiod2014-04-222-8/+0
| | | | than 32 bits.
* So it turns out that libcrypto on i386 platforms, unconditionaly compiles thismiod2014-04-221-39/+0
| | | | | | | | | | | | | little gem called OPENSSL_indirect_call(), supposedly to be ``handy under Win32''. In my view, this is a free-win ROP entry point. Why try and return to libc when you can return to libcrypto with an easy to use interface? Better not give that much attack surface, and remove this undocumented entry point. ok beck@ tedu@
* When compiling with AES_WRAP_TEST, make main() return a meaningful valuemiod2014-04-221-1/+15
| | | | | instead of garbage, and add this to the libcrypto regress. Note these tests are incomplete, as they always use the default IV.
* null a pointer to prevent double free. from Dirk Englingtedu2014-04-221-0/+1
|
* Remove files which look like actual code compiled in libcrypto, but isn't.miod2014-04-222-170/+0
| | | | One even says (in comments): HAS BUGS! DON'T USE
* fix memory leaks. from Dirk Englingtedu2014-04-223-21/+12
|
* Remove meat which either duplicates code found in apps/, or is only of valuemiod2014-04-2219-3531/+0
| | | | for 20th century historians, and can be put in the Attic.
* KNF.jsing2014-04-212-239/+249
|
* KNF.jsing2014-04-217-343/+409
|
* KNF.jsing2014-04-214-102/+119
|
* KNF.jsing2014-04-2112-1467/+1618
|
* no need for malloc castsderaadt2014-04-212-2/+2
|
* KNF.jsing2014-04-213-83/+77
|
* More KNF.jsing2014-04-214-8/+8
|
* KNF.jsing2014-04-2114-1570/+1612
|
* KNF.jsing2014-04-214-558/+591
|
* KNF.jsing2014-04-215-659/+722
|
* wrong calloc, see people do carederaadt2014-04-211-1/+2
|
* KNF.jsing2014-04-215-1971/+2092
|
* improve realloc/calloc/malloc patterns; ok guentherderaadt2014-04-2116-48/+23
|
* Delete #if 0'd time related functions which are totally expired.deraadt2014-04-212-74/+0
| | | | No point even seeing these when we do the 2038 audit later on...
* modernize malloc callderaadt2014-04-211-1/+1
|
* Replace entire printf-like guts with calls to libc snprintf.deraadt2014-04-211-769/+46
| | | | | funopen(3) is used to interface to BIO descriptors. ok guenther
* Bring malloc/calloc/realloc sequences to modern standardderaadt2014-04-218-27/+19
| | | | ok guenther
* KNF.jsing2014-04-218-548/+456
|
* clean up files we don't needtedu2014-04-2119-1352/+0
|
* fix accidentally deleted deref.beck2014-04-211-1/+1
|