summaryrefslogtreecommitdiff
path: root/src/usr.bin (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* Remove space between '*' and pointer variable.inoguchi2022-01-111-11/+9
|
* Convert openssl(1) smime option handlinginoguchi2022-01-111-357/+744
| | | | | | Apply new option handling to openssl(1) smime and no functional changes. input and ok jsing@
* Unbreak tree. Sorry about that.tb2022-01-101-7/+7
|
* NULL out pointers after transferring them to the DSA object.tb2022-01-101-1/+9
|
* Dedup get_dsa*() code.tb2022-01-101-91/+60
| | | | Pointed out by jsing
* Convert testdsa to accessors for opaque DSAtb2022-01-101-30/+90
| | | | ok inoguchi jsing
* Document openssl pkey -check,-pubcheck and param -checktb2022-01-101-2/+12
|
* Implement openssl pkey -{,pub}check and pkeyparam -checktb2022-01-104-10/+79
| | | | | | | These expose EVP_PKEY_{,public_,param_}check() to the command line. They are currently noops and will be enabled in the upcoming bump. ok inoguchi jsing
* Indicate current default cipherinoguchi2022-01-081-3/+3
|
* Free memory before assign to avoid leakinoguchi2022-01-061-1/+7
| | | | CID 313263 313301 313322
* Free memory if error occurredinoguchi2022-01-061-2/+4
|
* Remove NULL check before freeinoguchi2022-01-061-3/+2
|
* Wrap long lines and add some bracesinoguchi2022-01-051-74/+129
|
* Check function return valueinoguchi2022-01-051-8/+18
|
* Checking pointer variable with NULLinoguchi2022-01-051-74/+75
|
* Use calloc instead of mallocinoguchi2022-01-051-2/+2
| | | | suggested by tb@
* Check NULL first and unindent the rest of the codeinoguchi2022-01-051-41/+45
| | | | suggested by tb@
* Convert openssl(1) cms option handlinginoguchi2022-01-051-620/+1240
| | | | | | | Just applying new option handling and no functional changes. Referred to verify.c and using 'verify_shared_options'. ok and comments from jsing@ and tb@
* Check error returns for HMAC_* to appease coverity.tb2021-12-261-4/+13
| | | | CID 345114
* One more leak similar to previous.tb2021-12-261-2/+2
|
* Plug leakstb2021-12-261-2/+2
| | | | CID 345111
* Plug memleaktb2021-12-261-2/+4
| | | | CID 345119
* Attempt to opportunistically use the host name for SNI in s_client.jsing2021-12-261-10/+34
| | | | ok beck@ inoguchi@ tb@
* Convert req.c to compile with opaque EVP_MD_CTX.tb2021-12-121-25/+43
| | | | ok inoguchi
* Convert passwd.c to opaque EVP_MD_CTX and add a bit of error checking.tb2021-12-121-35/+72
| | | | tweak/ok inoguchi
* Make speed.c compile with opaque EVP_CIPHER, EVP_MD and HMAC_CTX.tb2021-12-121-20/+29
| | | | ok inoguchi
* A few more simplifications using get0_pubkey instead of get_pubkey + free.tb2021-12-121-9/+5
|
* Simplify x509.c slightly by using X509_get0_pubkey() instead oftb2021-12-121-5/+3
| | | | | | X509_get_pubkey() ok inoguchi
* Make x509.c compile with opaque EVP_PKEY.tb2021-12-121-7/+15
| | | | ok inoguchi
* Use correct spelling of NULLtb2021-12-121-2/+2
| | | | ok inoguchi
* Make ts.c compile with opaque EVP_MD_CTX.tb2021-12-121-5/+10
| | | | ok inoguchi
* Simple conversion to opaque EVP_CIPHER.tb2021-12-071-5/+9
|
* Clean up a bunch of dead code in s_server.c and s_socket.ctb2021-12-063-36/+21
| | | | | | | | | | | | jsg's analysis tool flagged a potential double free in do_server(). While this looks like a false positive, we can clean this code up a little: the host name passed to the callbacks isn't used by either sv_body() and www_body(), so it can be made local to do_accept() (an extra variable would not even be needed). Simplify the callbacks' signatures accordingly. Remove some commented out linger code that would never be used again anyway. ok inoguchi jsg
* openssl(1): drop support for netscape certificates and server gated keys.tb2021-11-265-138/+12
| | | | ok inoguchi jsing
* We know how to print a size_t now. Drop a comment and a cast.tb2021-11-251-6/+4
| | | | ok bluhm inoguchi
* Tweak for opaque EVP_MD: use EVP_MD_type(dgst) instead of dgst->type.tb2021-11-211-2/+2
|
* Convert openssl(1) to using BN_GENCB on the heaptb2021-11-204-51/+74
| | | | | | | | | This is three times the same thing while genrsa needs some extra steps to deal with opaque BIGNUMs. We can also garbage collect some Win 3.1 contortions and use the conversion routines directly instead of doing them manually. ok jsing
* typo in commenttb2021-11-201-3/+3
|
* Various minor adjustments to make openssl(1) compile with opaquetb2021-10-313-12/+23
| | | | structs in X509.
* Garbage collect another unused variable.jca2021-10-251-4/+1
| | | | Spotted by egcc and probably clang 13. ok tb@
* Preapre x509.c for upcoming libcrypto bumptb2021-10-231-19/+11
| | | | ok beck jsing
* Fix some whitespace issues, some pointed out by jsing, some found intb2021-10-231-4/+4
| | | | the vicinity.
* Prepare s_server for opaque structs in libcryptotb2021-10-231-8/+13
| | | | ok beck jsing
* Prepare crl.c for opaque structs in libcrypto.tb2021-10-231-9/+12
| | | | ok beck jsing
* Prepare pcks12 for opaque structs in libcryptotb2021-10-231-69/+70
| | | | | | | | | | | | | | | get_cert_chain() needs some error checking. return X509_V_ errors instead of trying to overload the NULL and then whine in a comment that this won't really work. Fix a bug that printed only the first attribute by factoring out the thing that did the actual printing. Sprinkle a few changes to accessors here and there. This is loosely based on what OpenSSL did with some simplifications by jsing. ok beck jsing
* Stop reaching into structs that will become opaque in ca.ctb2021-10-231-5/+3
| | | | "just commit it" beck
* Nuke the asn1-kludge. This was a workaround for CAs with broken PCKS#10tb2021-10-232-35/+5
| | | | | | encoders many moons ago. OpenSSL removed it in 2015. ok beck jsing
* Add a length check before NUL-terminating target. From Jonas Termansen.tb2021-10-231-1/+5
| | | | ok jsing
* Garbage collect an unused variable.tb2021-10-221-4/+2
|
* Stop setting enc.modified manually. It's no longer needed.tb2021-10-222-4/+2
|