summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Undo a calloc() replacement. It lacks the integer overflow check thatderaadt2014-04-201-14/+1
| | | | the system one has.
* KNF.jsing2014-04-2012-1154/+1134
|
* reset imprint to NULL to avoid double free. from mancha1 at zohotedu2014-04-201-0/+1
|
* release buffers fix was lost in merge. put it back.tedu2014-04-192-2/+4
|
* More KNF.jsing2014-04-194-74/+84
|
* More KNF.jsing2014-04-196-90/+122
|
* another attempt at fixing stale x509 data. since we don't know where thetedu2014-04-191-10/+8
| | | | | initial storage came from, we can't free it. just memset in the sequence case. probably ok beck
* More KNF.jsing2014-04-1914-157/+163
|
* More KNF.jsing2014-04-192-40/+40
|
* remove the openssl_fdset wrapper, and a variety of VMS'ism's likederaadt2014-04-196-48/+19
| | | | | crazy (void *) casts all over the place ok beck jsing
* KNF.jsing2014-04-196-813/+814
|
* Remove a gethostbyname() cache layer. The internet works better thesederaadt2014-04-191-50/+1
| | | | days. Initially fixed this, but Ted asked for it to die.
* ReadFile() and GetStdHandle() are not very POSIX.deraadt2014-04-194-45/+6
| | | | ok beck jsing
* truncation check some snprintf calls (over-cautiously in case)deraadt2014-04-194-19/+78
| | | | ok jsing beck
* can't actually do this. cause unknown.tedu2014-04-191-1/+1
|
* Fix some serious pointer-arithmatic-magic-number-unchecked-return eyebleedbeck2014-04-191-53/+44
| | | | | | | | | | that I stumbled into here and got stuck with. If modern society can get past selling daughters for cows, surely we can decide to write modern C code in an "application" that is probably 3 lines of shell/python/cgi away from talking to the internet in a lot of places.. (This file still needs a lot more love though) "oh god yuck" deraadt@ ok tedu@
* KNF.jsing2014-04-196-564/+530
|
* Repair some indent to be more KNF, and break instead of fallthrough toderaadt2014-04-191-12/+14
| | | | default which does break
* More KNF.jsing2014-04-193-33/+34
|
* Lacking a proof that--for this implementation--exposure of Montgomeryguenther2014-04-192-7/+7
| | | | | | | | multiplication or RSA blinding parameters doesn't permit retroactive timing analysis of the secrets, we'll do the stupidly cheap thing and cleanse them before freeing them. ok deraadt@
* More KNF.jsing2014-04-195-238/+296
|
* Remove hacky workaround for Cray T3E.deraadt2014-04-191-11/+0
| | | | ok guenther
* More KNF.jsing2014-04-194-261/+379
|
* oops, typo got into changederaadt2014-04-191-1/+1
|
* More KNF.jsing2014-04-193-10/+14
|
* malloc + strlcpy -> strdupderaadt2014-04-191-3/+2
|
* unifdef ENOTDIR, everyone has itderaadt2014-04-191-15/+3
|
* We'll interpret a (void) cast on snprintf() to mean it's been verified thatguenther2014-04-1930-85/+85
| | | | | | truncation is either desirable, not an issue, or is detected and handled later ok deraadt@
* egd is gonederaadt2014-04-192-32/+1
|
* The internal ssl2_* functions and variables are goneguenther2014-04-192-60/+0
|
* More KNF.jsing2014-04-194-685/+761
|
* Add SSL_OP_NO_TLSv1_1 and SSL_OP_NO_TLSv1_2guenther2014-04-191-4/+13
| | | | Document that SSL_OP_NO_SSLv2 is a no-op now
* More KNF and style consistency tweaksguenther2014-04-1953-479/+465
|
* More KNF.jsing2014-04-196-380/+471
|
* More KNF.jsing2014-04-196-363/+434
|
* More KNF.jsing2014-04-197-203/+207
|
* use intrinsic strlcpy and strlcat everywhere so we only have one set ofbeck2014-04-1919-66/+66
| | | | | | funcitons to check for incorrect use. keep BUF_strlcpy and BUF_strlcat for API comptibility only. ok tedu@
* OPENSSL_gmtime() is really just gmtime_r(); ok guentherderaadt2014-04-185-13/+6
|
* spacingtedu2014-04-182-20/+22
|
* tone down some XXXXX to not appear in greptedu2014-04-183-3/+3
|
* XXXXXXXXXXXXXXXX -> XXXtedu2014-04-181-3/+3
| | | | XXXXXXXXXXXXXXXXXXXXXXX -> XXXX
* unifdef NO_SOCKtedu2014-04-184-8/+0
|
* now that knf carpet bombing is finished, switch to hand to hand combat.tedu2014-04-184-346/+332
| | | | | still not sure what to make of mysteries like this: for (i = 7; i >= 0; i--) { /* increment */
* Unsurprisingly, since <unistd.h> was so darn hard to find for OpenSSL developersbeck2014-04-185-31/+4
| | | | | | | | they had resorted to manually protyping read(2) instead of incredible amount of preprocessor wizardry needed to find the ever illusive <unistd.h>. Let's just include <unistd.h> and we don't need to do this.. While we're at it flense out _OSD_POSIX and __DGJPP__ cruft. ok krw@
* collateral damagetedu2014-04-181-0/+1
|
* $HOME/.rnd will never be a good source of entropy. ok becktedu2014-04-1823-392/+2
|
* Do not ask the user to pass either -DB_ENDIAN or -DL_ENDIAN to the compiler,miod2014-04-184-13/+18
| | | | | | | but rather figure out the endianness from <machine/endian.h> automagically; help from guenther@ ok jca@ guenther@ beck@ and the rest of the `Buena SSL rampage club'
* Shrink a local buffer to the size it really needs to be; this is the onlymiod2014-04-181-1/+1
| | | | | | discrepancy found while checking proper {HEX,DECIMAL}_SIZE macro usage, which is confusing enough. tweaks and ok jca@, ok guenther@
* eroMgib dne- nai 68xtnetelca .smiod2014-04-181-7/+2
|
* Not welcomemiod2014-04-181-151/+0
|