summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Collapse)AuthorAgeFilesLines
* RSA_setup_blinding() gets a BN with BN_CTX_get(), returns `out of memory'miod2014-07-102-12/+2
| | | | | | | | if it fails, then never uses it anymore, and may invoke a function which needs more than one BN from the BN_CTX anyway, so this is pointless - remove the BN_CTX_get() call and the test. ok jsing
* make asn1 free safe to call with null pointers of any type.tedu2014-07-102-8/+6
| | | | ok jsing miod
* One sure hopes that OPENSSL_cleanse will:jsing2014-07-102-4/+4
| | | | /* Clear password from memory */
* Remove #if 0 code which dumps your data to stdout.miod2014-07-102-18/+2
|
* Tweak some comments. We do not really need to know that "New!" flags werejsing2014-07-102-18/+16
| | | | added 10+ years ago (they're kinda somewhat stale by now...)
* Uncompress ssltest.jsing2014-07-101-50/+0
|
* Remove more compression tendrils.jsing2014-07-106-28/+8
| | | | ok tedu@
* Stop playing with the RSA_FLAG_BLINDING flag. It does nothing.jsing2014-07-102-6/+2
| | | | ok miod@
* delete some casts. ok miodtedu2014-07-1024-70/+70
|
* Missing allocation checks and potential NULL pointer dereference in themiod2014-07-102-14/+30
| | | | error path in PEM_X509_INFO_read_bio(); ok guenther@ jsing@
* Remove RSA_FLAG_NO_EXP_CONSTTIME, which was deprecated 12+ years ago.jsing2014-07-102-26/+2
| | | | | | sthen@ confirmed that no ports are referencing it. ok miod@.
* Remove more compression related code.jsing2014-07-106-40/+6
|
* Remove DEBUG_KEYGEN and DEBUG_DECRYPT support.miod2014-07-104-98/+4
|
* replace getservbyname_r with getaddrinfo for portabilitybcook2014-07-102-12/+22
| | | | ok jsing@
* Tame the tedu... we still want to know that Compression and Expansion arejsing2014-07-101-1/+5
| | | | NONE, even if this is due to the fact that we do not support compression.
* Put back some parts of the public SSL API that should not have beenjsing2014-07-106-8/+56
| | | | completely decompressed.
* forgot to decompress here tootedu2014-07-102-17/+2
|
* Remove bogus preprocessor statements trying to pick the largest integermiod2014-07-108-64/+8
| | | | | | | | type for BF_LONG, MD[45]_LONG and SHA_LONG. First, the preprocessor symbols they check for a 64-bit system is __ILP64__ which no sane system provides; second, on the platforms which have assembler code to speed things up, the assembler code assumes a 32-bit type will be used.
* check return value of write.bcook2014-07-101-4/+15
| | | | ok beck@ jsing@
* crank major for decompression featuretedu2014-07-102-2/+2
|
* decompress libssl. ok beck jsingtedu2014-07-1049-1469/+77
|
* KNF comments, reflowing and moving out of the middle of argument lists inguenther2014-07-106-186/+300
| | | | | | places ok jsing@
* remove unused ecc_pkey_size.bcook2014-07-102-8/+4
| | | | ok jsing@ miod@
* BN_free, BN_clear_free, BN_CTX_free, BN_BLINDING_free and BN_MONT_CTX_freejsing2014-07-1012-110/+64
| | | | | | all have implicit NULL checks, so we do not need them here. ok miod@
* Use a while loop instead of an ifdowhile loop.jsing2014-07-104-24/+20
| | | | ok miod@ tedu@
* Add some extra sanity checks to make sure the test functions actuallymatthew2014-07-091-1/+13
| | | | run on altstack.
* include <limits.h> for LONG_MIN/LONG_MAX.bcook2014-07-092-4/+4
| | | | | | | Also remove <sys/filio.h> added from previous commit. This was the wrong way to get FIONBIO. ok jsing@
* ASN1_STRING_free can handle NULL, so callers don't need to check. ok miodtedu2014-07-0910-54/+34
|
* unfidef RL_DEBUG. hopefully it's been debugged by nowtedu2014-07-092-50/+2
|
* firebomb some MDEBUG leftoverstedu2014-07-091-87/+1
|
* unifdef a whole bunch of NO RSA/DSA/ECDH defines i deleted from libssltedu2014-07-0912-190/+12
|
* clean up if 0/if 1 code. we don't care anymore.tedu2014-07-092-119/+3
|
* move a commenttedu2014-07-091-3/+3
|
* reset host, port, path to null after freeing so the caller doesn'ttedu2014-07-092-2/+8
| | | | | accidentally free them again. actually a bug in the caller and (hey hey) apps/ocsp.c has exactly that bug, but it's easier/safer to fix here.
* stale prototypetedu2014-07-092-4/+2
|
* Make comments readable.jsing2014-07-092-54/+66
|
* More KNF.jsing2014-07-0938-644/+662
|
* KNF.jsing2014-07-094-246/+216
|
* reduce obvious dependency on global g_pool by moving to local aliasestedu2014-07-091-42/+48
| | | | ok otto
* ocsp_check_ids says "If algoritm mismatch let caller deal with it" beforetedu2014-07-092-12/+2
| | | | | | returning 2. The one and only caller doesn't check for that, so... Stop returning it. ok miod
* Minor cleanupsmatthew2014-07-091-5/+12
| | | | | | | | | | | | | Rename _waitpid() to safewaitpid() to avoid POSIX reserved identifier namespace. KNF nit: return value expressions should be surrounded by parentheses, per style(9). Ensure SIGCHLD is set to SIG_DFL, not SIG_IGN. POSIX allows (and requires under XSI) that terminated child processes not leave zombies if SIGCHLD is set to SIG_IGN, and it also allows execve() to leave SIGCHLD set to SIG_IGN.
* Better workaround for OS X sigaltstack() bugmatthew2014-07-091-15/+20
| | | | | | | OS X's sigaltstack() fails with ENOMEM if ss_size < MINSIGSTKSZ even if SS_DISABLE is specified in ss_flags. Rather than add code to try to cope with this stupidity, just don't bother restoring the original signal stack.
* Update to match the current state of crypto/rand, and remove MLINKS formiod2014-07-099-199/+31
| | | | RAND_event and RAND_screen.
* Remove mention that the PRNG needs to be seeded before invoking somemiod2014-07-0928-73/+8
| | | | functions.
* Unifdef -UPKCS_TESTVECT - we don't want the random data used in OAEP paddingmiod2014-07-092-12/+2
| | | | to get overwritten by a known value, ever.
* rephrase the stpcpy() warningnaddy2014-07-091-2/+2
| | | | new wording agreed by at least kettenis@ millert@ otto@
* {malloc,reallocarray} + memset(,0,) -> callocmiod2014-07-094-14/+10
| | | | ok tedu@
* Clean up after arc4random u_int32_t uint32_t changebeck2014-07-091-5/+5
| | | | ok jsing@
* changes to improve portabilitybcook2014-07-091-10/+11
| | | | ok beck@ deraadt@ jsing@ guenther@
* Replace memset(a, 0, ...); free(a); by explicit_bzero(a, ...); free(a); inmiod2014-07-092-4/+4
| | | | | | | fear a smartass-optimizing compiler decides memset is useless immediately before free(). ok jsing@ deraadt@ tedu@