Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | No longer needed during build. Brings a smile on beck@'s face. | miod | 2014-04-23 | 1 | -6/+0 |
| | |||||
* | The usual idiom to cope with systems not defining socklen_t is to add a | miod | 2014-04-23 | 2 | -49/+8 |
| | | | | | | | | | | | | | | | | | | #define socklen_t int somewhere (or a typedef, whatever gives you an integer type of the size your system expects as the 3rd argument of accept(2), really). OpenSSL here is a bit more creative by using an union of an int and a size_t, and extra code if sizeof(int) != sizeof(size_t) in order to recover the proper size. With a comment mentioning that this has no chance to work on a platform with a stack growing up and accept() returning an int, fortunately this seems to work on HP-UX. Switch to the light side of the force and declare and use socklen_t variables, period. If your system does not define socklen_t, consider bringing it back to your vendor for a refund. ok matthew@ tedu@ | ||||
* | close socket in failure cases too | tedu | 2014-04-23 | 1 | -0/+3 |
| | |||||
* | if realloc failed, BIO_accept would leak memory and return NULL, causing | tedu | 2014-04-23 | 1 | -2/+11 |
| | | | | caller to crash. Fix leak and return an error instead. from Chad Loder | ||||
* | One last Dec C tentacle on alpha. | miod | 2014-04-23 | 1 | -4/+1 |
| | |||||
* | When I grow up, I want to write workaround for long long multiplications | miod | 2014-04-23 | 1 | -15/+0 |
| | | | | under __TANDEM systems and compilers, using hardcoded octal numbers. NOT. | ||||
* | Remove IRIX_CC_BUG workaround. | miod | 2014-04-23 | 1 | -6/+0 |
| | |||||
* | I'm glad to know that Ultrix CC has a bug optimizing switch() statements | miod | 2014-04-23 | 2 | -15/+0 |
| | | | | | lacking an explicit `case 0:' construct. But Ultrix has been dead for more than 15 years, really. Don't give it any reason to move out of its coffin. | ||||
* | Grr, the more you remove, the more there remain. | miod | 2014-04-23 | 2 | -618/+0 |
| | |||||
* | Forgotten during latest spring cleaning of unreferenced bits. | miod | 2014-04-23 | 1 | -276/+0 |
| | |||||
* | Unifdef -UPEDANTIC. ok beck@ tedu@ | miod | 2014-04-23 | 13 | -73/+35 |
| | |||||
* | Remove duplicate pointer assignment in ASN1_primitive_free(); Dirk Engling | miod | 2014-04-23 | 1 | -1/+0 |
| | |||||
* | Figure out endianness at compile-time, using _BYTE_ORDER from | miod | 2014-04-23 | 8 | -64/+50 |
| | | | | | | | <machine/endian.h>, rather than writing 1 to a 32-bit variable and checking whether the first byte is nonzero. tweaks and ok matthew@; ok beck@ tedu@ | ||||
* | Casting from a const unsigned char ** to a const unsigned char ** seems... | jsing | 2014-04-23 | 1 | -8/+4 |
| | | | | | | | unnecessary. Remove the temporary ugly casts - the comments even call them that! ok guenther@ | ||||
* | Make libssl and libcrypto compile with -Werror | beck | 2014-04-23 | 2 | -3/+3 |
| | | | | ok miod@ | ||||
* | Make sure ret->name is NULL'ed before return when freeing. | beck | 2014-04-23 | 1 | -0/+1 |
| | | | | from Dirk Engling <erdgeist@erdgeist.org> | ||||
* | Rather than sprinkling magical numbers everywhere, we can use sizeof() | beck | 2014-04-23 | 1 | -4/+4 |
| | | | | | for the size of a fixed size array. From Dirk Engling <erdgeist@erdgeist.org> | ||||
* | unifdef -UAES_LONG for we do not intend to run on platforms where int is smaller | miod | 2014-04-22 | 2 | -8/+0 |
| | | | | than 32 bits. | ||||
* | So it turns out that libcrypto on i386 platforms, unconditionaly compiles this | miod | 2014-04-22 | 1 | -39/+0 |
| | | | | | | | | | | | | | little gem called OPENSSL_indirect_call(), supposedly to be ``handy under Win32''. In my view, this is a free-win ROP entry point. Why try and return to libc when you can return to libcrypto with an easy to use interface? Better not give that much attack surface, and remove this undocumented entry point. ok beck@ tedu@ | ||||
* | When compiling with AES_WRAP_TEST, make main() return a meaningful value | miod | 2014-04-22 | 1 | -1/+15 |
| | | | | | instead of garbage, and add this to the libcrypto regress. Note these tests are incomplete, as they always use the default IV. | ||||
* | null a pointer to prevent double free. from Dirk Engling | tedu | 2014-04-22 | 1 | -0/+1 |
| | |||||
* | Remove files which look like actual code compiled in libcrypto, but isn't. | miod | 2014-04-22 | 2 | -170/+0 |
| | | | | One even says (in comments): HAS BUGS! DON'T USE | ||||
* | fix memory leaks. from Dirk Engling | tedu | 2014-04-22 | 3 | -21/+12 |
| | |||||
* | Remove meat which either duplicates code found in apps/, or is only of value | miod | 2014-04-22 | 19 | -3531/+0 |
| | | | | for 20th century historians, and can be put in the Attic. | ||||
* | KNF. | jsing | 2014-04-21 | 2 | -239/+249 |
| | |||||
* | KNF. | jsing | 2014-04-21 | 7 | -343/+409 |
| | |||||
* | KNF. | jsing | 2014-04-21 | 4 | -102/+119 |
| | |||||
* | KNF. | jsing | 2014-04-21 | 12 | -1467/+1618 |
| | |||||
* | no need for malloc casts | deraadt | 2014-04-21 | 2 | -2/+2 |
| | |||||
* | KNF. | jsing | 2014-04-21 | 3 | -83/+77 |
| | |||||
* | More KNF. | jsing | 2014-04-21 | 4 | -8/+8 |
| | |||||
* | KNF. | jsing | 2014-04-21 | 14 | -1570/+1612 |
| | |||||
* | KNF. | jsing | 2014-04-21 | 4 | -558/+591 |
| | |||||
* | KNF. | jsing | 2014-04-21 | 5 | -659/+722 |
| | |||||
* | wrong calloc, see people do care | deraadt | 2014-04-21 | 1 | -1/+2 |
| | |||||
* | KNF. | jsing | 2014-04-21 | 5 | -1971/+2092 |
| | |||||
* | improve realloc/calloc/malloc patterns; ok guenther | deraadt | 2014-04-21 | 16 | -48/+23 |
| | |||||
* | Delete #if 0'd time related functions which are totally expired. | deraadt | 2014-04-21 | 2 | -74/+0 |
| | | | | No point even seeing these when we do the 2038 audit later on... | ||||
* | modernize malloc call | deraadt | 2014-04-21 | 1 | -1/+1 |
| | |||||
* | Replace entire printf-like guts with calls to libc snprintf. | deraadt | 2014-04-21 | 1 | -769/+46 |
| | | | | | funopen(3) is used to interface to BIO descriptors. ok guenther | ||||
* | Bring malloc/calloc/realloc sequences to modern standard | deraadt | 2014-04-21 | 8 | -27/+19 |
| | | | | ok guenther | ||||
* | KNF. | jsing | 2014-04-21 | 8 | -548/+456 |
| | |||||
* | clean up files we don't need | tedu | 2014-04-21 | 19 | -1352/+0 |
| | |||||
* | fix accidentally deleted deref. | beck | 2014-04-21 | 1 | -1/+1 |
| | |||||
* | ASN1_STRING cleanup - realloc has handled NULL since I had a mullet | beck | 2014-04-20 | 1 | -17/+10 |
| | | | | | | | | | and parachute pants - and since it's obvious there is no guarantee the caller doesn't pass in the data area in the argument, use memmove instead of memcpy so overlapping areas are handled correctly. Also, pointers can be usefully printed in hex with %p, in error messaeges rather than the bizzaro stuff that was there using mystical buffer lengths and abuse of strlcpy-converted-blindly-from-strcpy | ||||
* | replace a bunch of pointer-arithmatic-strcpy-converted-blindly-to-strlcpy | beck | 2014-04-20 | 1 | -7/+7 |
| | | | | | cruft with an snprintf. "better than what was there" ok guenther@ | ||||
* | Eliminate duplicated logic by switching from malloc+snprintf to asprintf | guenther | 2014-04-20 | 1 | -20/+14 |
| | | | | ok beck@ | ||||
* | Chop off more SSLv2 tentacles and start fixing and noting y2038 issues. | guenther | 2014-04-20 | 1 | -11/+18 |
| | | | | | | | APIs that pass times as longs will have to change at some point... Bump major on both libcrypto and libssl. ok tedu@ | ||||
* | Restore beck's (void)snprintf(): they were reviewed. | guenther | 2014-04-20 | 3 | -5/+5 |
| | |||||
* | Restore beck's rev 1.8: snprintf() was reviewed. | guenther | 2014-04-20 | 1 | -2/+2 |
| |