Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | unifdef MSDOS | giovanni | 2014-04-24 | 1 | -12/+1 |
| | | | | ok miod@ | ||||
* | Remove some malloc/strlcpy/strlcat horror. Just use asprintf and avoid an | jsing | 2014-04-24 | 1 | -25/+12 |
| | | | | | | unchecked malloc at the same time. ok beck@ | ||||
* | add ERR_asprintf_error_data, A tool to be used to get rid of the far too | beck | 2014-04-24 | 2 | -25/+26 |
| | | | | | | | | | frequent construct of 30 lines of pointer and strlcat insanity followed by an ERR_add_error_data. I will sweep through here like a chubby mongol horde in the next few days pillaging crappy ERR_add_error_data's. Oh and while we're at it fix the nasty vdata function to use something less hard on the eyes. ok jsing@ | ||||
* | You want signals?!? I'll give you signals!!! Oh, and we have termios as | jsing | 2014-04-24 | 1 | -36/+0 |
| | | | | | | well... ok beck@ | ||||
* | More KNF. | jsing | 2014-04-24 | 2 | -37/+37 |
| | |||||
* | repair missing semicolon. from Ian Mcwilliam | tedu | 2014-04-24 | 1 | -1/+1 |
| | |||||
* | Unifdef -UPKCS1_CHECK and remove SSL_OP_PKCS1_CHECK_[12], this is leftover | miod | 2014-04-23 | 1 | -3/+0 |
| | | | | | | | | ``debug'' code from a 15+ years old bugfix and the SSL_OP_PKCS1_CHECK_* constants have had a value of zero since ages. No production code should use them. ok beck@ | ||||
* | ain't nobody got time for hpux | tedu | 2014-04-23 | 1 | -22/+0 |
| | |||||
* | fix some variables | tedu | 2014-04-23 | 1 | -2/+1 |
| | |||||
* | replace a bunch of hand duped strings with strdup | tedu | 2014-04-23 | 2 | -10/+4 |
| | |||||
* | Don't bother generating win64 assembly prologue. | miod | 2014-04-23 | 1 | -26/+2 |
| | |||||
* | malloc/memset -> calloc. from peter malone | tedu | 2014-04-23 | 1 | -2/+1 |
| | |||||
* | No longer needed during build. Brings a smile on beck@'s face. | miod | 2014-04-23 | 1 | -6/+0 |
| | |||||
* | The usual idiom to cope with systems not defining socklen_t is to add a | miod | 2014-04-23 | 2 | -49/+8 |
| | | | | | | | | | | | | | | | | | | #define socklen_t int somewhere (or a typedef, whatever gives you an integer type of the size your system expects as the 3rd argument of accept(2), really). OpenSSL here is a bit more creative by using an union of an int and a size_t, and extra code if sizeof(int) != sizeof(size_t) in order to recover the proper size. With a comment mentioning that this has no chance to work on a platform with a stack growing up and accept() returning an int, fortunately this seems to work on HP-UX. Switch to the light side of the force and declare and use socklen_t variables, period. If your system does not define socklen_t, consider bringing it back to your vendor for a refund. ok matthew@ tedu@ | ||||
* | close socket in failure cases too | tedu | 2014-04-23 | 1 | -0/+3 |
| | |||||
* | if realloc failed, BIO_accept would leak memory and return NULL, causing | tedu | 2014-04-23 | 1 | -2/+11 |
| | | | | caller to crash. Fix leak and return an error instead. from Chad Loder | ||||
* | One last Dec C tentacle on alpha. | miod | 2014-04-23 | 1 | -4/+1 |
| | |||||
* | When I grow up, I want to write workaround for long long multiplications | miod | 2014-04-23 | 1 | -15/+0 |
| | | | | under __TANDEM systems and compilers, using hardcoded octal numbers. NOT. | ||||
* | Remove IRIX_CC_BUG workaround. | miod | 2014-04-23 | 1 | -6/+0 |
| | |||||
* | I'm glad to know that Ultrix CC has a bug optimizing switch() statements | miod | 2014-04-23 | 2 | -15/+0 |
| | | | | | lacking an explicit `case 0:' construct. But Ultrix has been dead for more than 15 years, really. Don't give it any reason to move out of its coffin. | ||||
* | Grr, the more you remove, the more there remain. | miod | 2014-04-23 | 2 | -618/+0 |
| | |||||
* | Forgotten during latest spring cleaning of unreferenced bits. | miod | 2014-04-23 | 1 | -276/+0 |
| | |||||
* | Unifdef -UPEDANTIC. ok beck@ tedu@ | miod | 2014-04-23 | 13 | -73/+35 |
| | |||||
* | Remove duplicate pointer assignment in ASN1_primitive_free(); Dirk Engling | miod | 2014-04-23 | 1 | -1/+0 |
| | |||||
* | Figure out endianness at compile-time, using _BYTE_ORDER from | miod | 2014-04-23 | 8 | -64/+50 |
| | | | | | | | <machine/endian.h>, rather than writing 1 to a 32-bit variable and checking whether the first byte is nonzero. tweaks and ok matthew@; ok beck@ tedu@ | ||||
* | Casting from a const unsigned char ** to a const unsigned char ** seems... | jsing | 2014-04-23 | 1 | -8/+4 |
| | | | | | | | unnecessary. Remove the temporary ugly casts - the comments even call them that! ok guenther@ | ||||
* | Make libssl and libcrypto compile with -Werror | beck | 2014-04-23 | 2 | -3/+3 |
| | | | | ok miod@ | ||||
* | Make sure ret->name is NULL'ed before return when freeing. | beck | 2014-04-23 | 1 | -0/+1 |
| | | | | from Dirk Engling <erdgeist@erdgeist.org> | ||||
* | Rather than sprinkling magical numbers everywhere, we can use sizeof() | beck | 2014-04-23 | 1 | -4/+4 |
| | | | | | for the size of a fixed size array. From Dirk Engling <erdgeist@erdgeist.org> | ||||
* | unifdef -UAES_LONG for we do not intend to run on platforms where int is smaller | miod | 2014-04-22 | 2 | -8/+0 |
| | | | | than 32 bits. | ||||
* | So it turns out that libcrypto on i386 platforms, unconditionaly compiles this | miod | 2014-04-22 | 1 | -39/+0 |
| | | | | | | | | | | | | | little gem called OPENSSL_indirect_call(), supposedly to be ``handy under Win32''. In my view, this is a free-win ROP entry point. Why try and return to libc when you can return to libcrypto with an easy to use interface? Better not give that much attack surface, and remove this undocumented entry point. ok beck@ tedu@ | ||||
* | When compiling with AES_WRAP_TEST, make main() return a meaningful value | miod | 2014-04-22 | 1 | -1/+15 |
| | | | | | instead of garbage, and add this to the libcrypto regress. Note these tests are incomplete, as they always use the default IV. | ||||
* | null a pointer to prevent double free. from Dirk Engling | tedu | 2014-04-22 | 1 | -0/+1 |
| | |||||
* | Remove files which look like actual code compiled in libcrypto, but isn't. | miod | 2014-04-22 | 2 | -170/+0 |
| | | | | One even says (in comments): HAS BUGS! DON'T USE | ||||
* | fix memory leaks. from Dirk Engling | tedu | 2014-04-22 | 3 | -21/+12 |
| | |||||
* | Remove meat which either duplicates code found in apps/, or is only of value | miod | 2014-04-22 | 19 | -3531/+0 |
| | | | | for 20th century historians, and can be put in the Attic. | ||||
* | KNF. | jsing | 2014-04-21 | 2 | -239/+249 |
| | |||||
* | KNF. | jsing | 2014-04-21 | 7 | -343/+409 |
| | |||||
* | KNF. | jsing | 2014-04-21 | 4 | -102/+119 |
| | |||||
* | KNF. | jsing | 2014-04-21 | 12 | -1467/+1618 |
| | |||||
* | no need for malloc casts | deraadt | 2014-04-21 | 2 | -2/+2 |
| | |||||
* | KNF. | jsing | 2014-04-21 | 3 | -83/+77 |
| | |||||
* | More KNF. | jsing | 2014-04-21 | 4 | -8/+8 |
| | |||||
* | KNF. | jsing | 2014-04-21 | 14 | -1570/+1612 |
| | |||||
* | KNF. | jsing | 2014-04-21 | 4 | -558/+591 |
| | |||||
* | KNF. | jsing | 2014-04-21 | 5 | -659/+722 |
| | |||||
* | wrong calloc, see people do care | deraadt | 2014-04-21 | 1 | -1/+2 |
| | |||||
* | KNF. | jsing | 2014-04-21 | 5 | -1971/+2092 |
| | |||||
* | improve realloc/calloc/malloc patterns; ok guenther | deraadt | 2014-04-21 | 16 | -48/+23 |
| | |||||
* | Delete #if 0'd time related functions which are totally expired. | deraadt | 2014-04-21 | 2 | -74/+0 |
| | | | | No point even seeing these when we do the 2038 audit later on... |