summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* We have shared global variables - unifdef OPENSSL_EXPORT_VAR_AS_FUNCTION.jsing2014-05-242-69/+0
| | | | ok miod@ beck@
* Expand the OPENSSL_.*GLOBAL.* macros and stop including e_os2.h.jsing2014-05-243-8/+7
| | | | ok miod@ beck@
* Another e_os2.h -> opensslconf.h.jsing2014-05-241-1/+3
|
* e_os2.h is not needed here.jsing2014-05-241-1/+1
|
* Explicitly include <openssl/openssl.conf>. des.h still needs e_os2.h (atjsing2014-05-241-2/+3
| | | | least for a little while longer...)
* Almost nothing actually needs to include <openssl/e_os2.h>, however byjsing2014-05-2426-28/+49
| | | | | | | including it they get <openssl/opensslconf.h>. So instead of pulling in <openssl/e_os2.h>, just pull in <openssl/opensslconf.h>. "go ahead" miod@
* Expand OPENSSL_{GLOBAL,EXTERN} macros that I missed last time around,jsing2014-05-242-2/+2
| | | | | | since they are hiding in the #define forest. ok miod@
* Spell ssize_t correctly (the incorrect spelling is ossl_ssize_t).jsing2014-05-244-15/+15
| | | | ok miod@
* No OPENSSL_SYS_WINDOWS wanted.jsing2014-05-241-3/+0
| | | | ok miod@
* Take an axe to rc5speed.c - strip out everything that is for otherjsing2014-05-231-84/+9
| | | | platforms.
* We have stdio and are not WIN16.jsing2014-05-231-2/+0
|
* Not OPENSSL_SYS_SUNOS.jsing2014-05-231-3/+0
|
* Replace (sometimes conditional) use of alloca with malloc, and clearingmiod2014-05-232-39/+16
| | | | | | through volatile pointers with explicit_bzero(). ok beck@ jsing@
* don't deprecate until at least the base src tree is clean.tedu2014-05-231-12/+8
|
* Mark the malloc wrapper functions as deprecated so warnings willbeck2014-05-221-8/+12
| | | | | happen on their use. ok miod@
* Convert OPENSSL_malloc stuff back to intrinsics, a few were missedbeck2014-05-223-6/+6
| | | | | as new stuff was brought in. ok miod@
* if (x) free(x) -> free(x); semantic patch generated with coccinelle, carefullymiod2014-05-2225-81/+42
| | | | eyeballed before applying. Contributed by Cyril Roelandt on tech@
* Expand the OPENSSL_{GLOBAL,EXPORT,IMPORT,EXTERN} macros - this rids thejsing2014-05-227-22/+20
| | | | | | libssl tree from all uses of these defines. ok miod@
* Hello? Yes, you're speaking with OPENSSL_SYS_UNIX.jsing2014-05-221-28/+0
| | | | ok beck@ miod@
* mark BIO_snprintf as deprecated, so warnings will be generated for it'sbeck2014-05-221-2/+2
| | | | use. ok miod@ tedu@
* KNF.jsing2014-05-223-171/+154
|
* No uses of UTF8_{getc,putc}() in ports, so remove them from the public header.guenther2014-05-222-9/+8
| | | | ok miod@
* Bring UTF8_{getc,putc} up-to-date: it's been a decade since 5- and 6-byteguenther2014-05-204-93/+88
| | | | | | | | encodings and encoding of surrogate pair code points were banned. Add checks for those, both to those functions and to the code decoding the BMP and UNIV encodings. ok miod@
* If you need to allocate `a + b' bytes of memory, then don't allocate `a + b*2',miod2014-05-183-6/+6
| | | | | | this is confusing and unnecessary. Help (coz I got confused) and ok guenther@ beck@
* Make sure UTF8_getc() is invoked with the proper buffer size.miod2014-05-181-2/+2
| | | | ok beck@ guenther@
* Plug memory leaks upon error in OCSP_url_svcloc_new().miod2014-05-181-6/+9
| | | | ok jsing@
* In OCSP_sendreq_bio(), cope with OCSP_sendreq_new() returning NULL.miod2014-05-181-4/+6
| | | | ok jsing@
* More KNF.jsing2014-05-1810-193/+208
|
* does sunos not have memmove? sorry, i guess sunos will not have libressl.tedu2014-05-171-21/+3
| | | | ok guenther miod
* unchecked malloc() return value in OCSP_sendreq_new().miod2014-05-171-0/+2
|
* KNFmiod2014-05-178-1274/+1332
|
* simple reallocarray to check multiplies. ok guenthertedu2014-05-171-6/+4
|
* no no md2tedu2014-05-173-9/+0
|
* no no seedtedu2014-05-172-17/+0
|
* switch RSA key generation default to 2048 bits (matching ssh); ok miod@sthen2014-05-171-1/+1
|
* When OPENSSL_LOAD_CONF was added it ended up with more #if 0 code,jsing2014-05-164-96/+16
| | | | | | | | | | | more #ifdefs and a new source file that contains a single function. Nuke the #if 0 code that is now a macro and move the single function in evp_acnf.c to c_all.c, which is where the other code lives. While here, tidy evp.h slightly, remove an unnecessary #ifdef __OpenBSD__ and nuke a comment that is now a lie. ok miod@
* Fix memory leaks upon failure.miod2014-05-152-27/+39
| | | | ok beck@
* Replace ASN1_GENERALIZEDTIME_adj(), ASN1_UTCTIME_adj() andmiod2014-05-153-25/+73
| | | | | | | ASN1_TIME_to_generalizedtime() with wrappers around their former implementations, making sure memory allocated is freed in all failure cases. help and ok from beck@ and Brendan MacDonell.
* More KNF.jsing2014-05-154-7/+7
|
* Use C99 initialisers for the AEAD struct.jsing2014-05-151-9/+9
|
* KNF.jsing2014-05-151-70/+67
|
* Add a ChaCha20-Poly1305 AEAD EVP implementation to libcrypto, from Adamjsing2014-05-154-2/+274
| | | | | | Langley's Chromium OpenSSL patches. ok miod@
* KNF.jsing2014-05-155-283/+343
|
* Add an AEAD EVP interface to libcrypto, along with AES-GCM AEADjsing2014-05-156-35/+551
| | | | | | | implementations. This largely pulls in Adam Langley's AEAD patches from Chromium's OpenSSL. ok miod@
* Stop being a dummy... presumably these are left overs from pedantic modejsing2014-05-159-22/+2
| | | | | | that were not wrapped with #if PEDANTIC. ok miod@
* Add poly1305 to libcrypto utilising Andrew Moon's public domainjsing2014-05-144-1/+354
| | | | | | implementation. ok miod@
* Remove AES_bi_ige_encrypt() from libcrypto. This routine is supposed to usemiod2014-05-122-116/+0
| | | | | | | | | | | | | two keys and four IVs to do much magic, is specified as such with test vectors, but the implementation actually always uses the first key, and the test vectors were computed with it, so they are wrong. Fixing the code to match the intended specification would break interoperability with existing code (assuming such code would exist), so it is better to remove this interface, which is obviously too complex for mere mortals if even its author can not implement it correctly. Riding on the libcrypto major bump.
* Bring back ASN1_seq_pack(), ASN1_seq_unpack(), ASN1_pack_string() andmiod2014-05-123-0/+215
| | | | | | | | ASN1_unpack_string() from the NO_ASN1_OLD purge; turns out that some Ruby extensions still use them, unfortunately, so we need to give them some more time to catch up on ``recent'' interfaces. Riding on the libcrypto major bump.
* Move the `pqueue' part of libcrypto, which is a glorified sorted linked listmiod2014-05-125-340/+5
| | | | | | | | | | | | | of 64-bit data, and only used by DTLS, to libssl where it belongs. Remove pqueue_print() which is a debugging interface and serves no useful purpose, except for the regress test, which grows its own pqueue_print() routine. Bump libcrypto major and libssl minor. WARNING: do not update your tree right now, more changes are coming, which will ride the libcrypto major bump.
* More KNF.jsing2014-05-115-16/+27
|