Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | ASN1_STRING cleanup - realloc has handled NULL since I had a mullet | beck | 2014-04-20 | 1 | -17/+10 | |
| | | | | | | | | | and parachute pants - and since it's obvious there is no guarantee the caller doesn't pass in the data area in the argument, use memmove instead of memcpy so overlapping areas are handled correctly. Also, pointers can be usefully printed in hex with %p, in error messaeges rather than the bizzaro stuff that was there using mystical buffer lengths and abuse of strlcpy-converted-blindly-from-strcpy | |||||
* | replace a bunch of pointer-arithmatic-strcpy-converted-blindly-to-strlcpy | beck | 2014-04-20 | 1 | -7/+7 | |
| | | | | | cruft with an snprintf. "better than what was there" ok guenther@ | |||||
* | Eliminate duplicated logic by switching from malloc+snprintf to asprintf | guenther | 2014-04-20 | 1 | -20/+14 | |
| | | | | ok beck@ | |||||
* | Chop off more SSLv2 tentacles and start fixing and noting y2038 issues. | guenther | 2014-04-20 | 1 | -11/+18 | |
| | | | | | | | APIs that pass times as longs will have to change at some point... Bump major on both libcrypto and libssl. ok tedu@ | |||||
* | Restore beck's (void)snprintf(): they were reviewed. | guenther | 2014-04-20 | 3 | -5/+5 | |
| | ||||||
* | Restore beck's rev 1.8: snprintf() was reviewed. | guenther | 2014-04-20 | 1 | -2/+2 | |
| | ||||||
* | Restore tedu's rev 1.4: snprintf() was reviewed. | guenther | 2014-04-20 | 1 | -1/+1 | |
| | ||||||
* | Restore beck's rev 1.7: snprintf() was reviewed. | guenther | 2014-04-20 | 1 | -2/+4 | |
| | | | | Also, use sizeof() for snprintf()'s size argument | |||||
* | Restore beck's rev 1.21: snprintf() was reviewed | guenther | 2014-04-20 | 1 | -1/+1 | |
| | ||||||
* | theo found a file we don't seem to need, but just in case, i will paste | tedu | 2014-04-20 | 1 | -3/+0 | |
| | | | | | | the contents below: #!/usr/local/bin/perl # x86 assember | |||||
* | Restore beck's rev 1.9: snprintf() was reviewed | guenther | 2014-04-20 | 1 | -1/+1 | |
| | ||||||
* | KNF. | jsing | 2014-04-20 | 5 | -238/+305 | |
| | ||||||
* | Restore beck's rev 1.3: snprintf() was reviewed | guenther | 2014-04-20 | 1 | -1/+1 | |
| | ||||||
* | More KNF. | jsing | 2014-04-20 | 2 | -3/+3 | |
| | ||||||
* | KNF. | jsing | 2014-04-20 | 6 | -714/+951 | |
| | ||||||
* | KNF. | jsing | 2014-04-20 | 6 | -470/+592 | |
| | ||||||
* | KNF. | jsing | 2014-04-20 | 4 | -264/+359 | |
| | ||||||
* | More KNF. | jsing | 2014-04-20 | 13 | -80/+88 | |
| | ||||||
* | More KNF. | jsing | 2014-04-20 | 1 | -50/+62 | |
| | ||||||
* | KNF. | jsing | 2014-04-20 | 2 | -181/+219 | |
| | ||||||
* | KNF. | jsing | 2014-04-20 | 4 | -398/+393 | |
| | ||||||
* | Chop off more SSLv2 tentacles and start fixing and noting y2038 issues. | guenther | 2014-04-20 | 2 | -2/+2 | |
| | | | | | | | APIs that pass times as longs will have to change at some point... Bump major on both libcrypto and libssl. ok tedu@ | |||||
* | return after error instead of plowing ahead. noticed by mancha1 at zoho | tedu | 2014-04-20 | 1 | -0/+1 | |
| | ||||||
* | KNF. | jsing | 2014-04-20 | 12 | -1154/+1134 | |
| | ||||||
* | reset imprint to NULL to avoid double free. from mancha1 at zoho | tedu | 2014-04-20 | 1 | -0/+1 | |
| | ||||||
* | another attempt at fixing stale x509 data. since we don't know where the | tedu | 2014-04-19 | 1 | -10/+8 | |
| | | | | | initial storage came from, we can't free it. just memset in the sequence case. probably ok beck | |||||
* | KNF. | jsing | 2014-04-19 | 6 | -813/+814 | |
| | ||||||
* | can't actually do this. cause unknown. | tedu | 2014-04-19 | 1 | -1/+1 | |
| | ||||||
* | KNF. | jsing | 2014-04-19 | 6 | -564/+530 | |
| | ||||||
* | More KNF. | jsing | 2014-04-19 | 3 | -33/+34 | |
| | ||||||
* | Lacking a proof that--for this implementation--exposure of Montgomery | guenther | 2014-04-19 | 2 | -7/+7 | |
| | | | | | | | | multiplication or RSA blinding parameters doesn't permit retroactive timing analysis of the secrets, we'll do the stupidly cheap thing and cleanse them before freeing them. ok deraadt@ | |||||
* | More KNF. | jsing | 2014-04-19 | 5 | -238/+296 | |
| | ||||||
* | More KNF. | jsing | 2014-04-19 | 4 | -261/+379 | |
| | ||||||
* | More KNF. | jsing | 2014-04-19 | 3 | -10/+14 | |
| | ||||||
* | We'll interpret a (void) cast on snprintf() to mean it's been verified that | guenther | 2014-04-19 | 25 | -62/+62 | |
| | | | | | | truncation is either desirable, not an issue, or is detected and handled later ok deraadt@ | |||||
* | egd is gone | deraadt | 2014-04-19 | 2 | -6/+2 | |
| | ||||||
* | More KNF. | jsing | 2014-04-19 | 4 | -685/+761 | |
| | ||||||
* | More KNF. | jsing | 2014-04-19 | 6 | -380/+471 | |
| | ||||||
* | More KNF. | jsing | 2014-04-19 | 6 | -363/+434 | |
| | ||||||
* | More KNF. | jsing | 2014-04-19 | 7 | -203/+207 | |
| | ||||||
* | use intrinsic strlcpy and strlcat everywhere so we only have one set of | beck | 2014-04-19 | 12 | -40/+40 | |
| | | | | | | funcitons to check for incorrect use. keep BUF_strlcpy and BUF_strlcat for API comptibility only. ok tedu@ | |||||
* | OPENSSL_gmtime() is really just gmtime_r(); ok guenther | deraadt | 2014-04-18 | 5 | -13/+6 | |
| | ||||||
* | tone down some XXXXX to not appear in grep | tedu | 2014-04-18 | 2 | -2/+2 | |
| | ||||||
* | XXXXXXXXXXXXXXXX -> XXX | tedu | 2014-04-18 | 1 | -3/+3 | |
| | | | | XXXXXXXXXXXXXXXXXXXXXXX -> XXXX | |||||
* | unifdef NO_SOCK | tedu | 2014-04-18 | 4 | -8/+0 | |
| | ||||||
* | Unsurprisingly, since <unistd.h> was so darn hard to find for OpenSSL developers | beck | 2014-04-18 | 5 | -31/+4 | |
| | | | | | | | | they had resorted to manually protyping read(2) instead of incredible amount of preprocessor wizardry needed to find the ever illusive <unistd.h>. Let's just include <unistd.h> and we don't need to do this.. While we're at it flense out _OSD_POSIX and __DGJPP__ cruft. ok krw@ | |||||
* | Do not ask the user to pass either -DB_ENDIAN or -DL_ENDIAN to the compiler, | miod | 2014-04-18 | 5 | -24/+19 | |
| | | | | | | | but rather figure out the endianness from <machine/endian.h> automagically; help from guenther@ ok jca@ guenther@ beck@ and the rest of the `Buena SSL rampage club' | |||||
* | Shrink a local buffer to the size it really needs to be; this is the only | miod | 2014-04-18 | 1 | -1/+1 | |
| | | | | | | discrepancy found while checking proper {HEX,DECIMAL}_SIZE macro usage, which is confusing enough. tweaks and ok jca@, ok guenther@ | |||||
* | eroMgib dne- nai 68xtnetelca .s | miod | 2014-04-18 | 1 | -7/+2 | |
| | ||||||
* | Not welcome | miod | 2014-04-18 | 1 | -151/+0 | |
| |