summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Collapse)AuthorAgeFilesLines
* KNFmiod2014-07-102-52/+68
|
* Fix a double free in a can't-fail error path in PKCS7_decrypt(), by removingmiod2014-07-102-20/+12
| | | | | the error path altogether and simplifying the local variables as a result. joint work with jsing@; ok jsing@ tedu@
* remove unused variable from ssl3_get_client_hellobcook2014-07-102-6/+4
| | | | ok tedu@ miod@
* as noted by google/android via kettenis, atexit handlers can install newtedu2014-07-101-1/+8
| | | | | handlers. if this happens, restart the loop. ok kettenis matthew millert miod
* Inline the only use of the HEX_SIZE macro and nuke both DECIMAL_SIZE andjsing2014-07-104-14/+6
| | | | | | HEX_SIZE. ok beck@ miod@
* Make sure srp_Calc_k() digest operations are checked for error; frommiod2014-07-102-18/+34
| | | | Florian Zumbiehl (florz , florz . de) on tech@
* Make sure SRP_Calc_client_key() returns NULL instead of a pristine BN_new()miod2014-07-102-8/+18
| | | | upon error; from Florian Zumbiehl (florz , florz . de) on tech@
* Nuke OPENSSL_NONPIC_relocated since nothing uses it.jsing2014-07-104-8/+4
| | | | ok miod@
* Kill a blatantly outdated (and now wrong) commentmiod2014-07-102-8/+2
|
* Fix examples description, and use less ambiguous wording.miod2014-07-101-4/+4
|
* Try and fix the horrible coding style of the example code snippets.miod2014-07-1019-398/+445
|
* Stop including standard headers via cryptlib.h - pull in the headers thatjsing2014-07-10268-420/+906
| | | | | | are needed in the source files that actually require them. ok beck@ miod@
* Remove empty sections and references to des_modes(7) which we don't have.miod2014-07-1067-218/+32
|
* Fewer lies, also do not document DES_3cbc_encrypt anymore.miod2014-07-102-44/+12
|
* Features introduce in OpenSSL 0.9.8 do not deserve their own section.miod2014-07-102-42/+38
| | | | | Instead, fold their description in the main documentation, and update the history section to mention them as well.
* Attempt to (incompletely) document EVP_aes_*().miod2014-07-107-23/+30
| | | | | | | | | When EVP_des_cbc() was suggested, suggest EVP_aes_256_cbc() instead. Remove mention of EVP_des_ede3_cbc() being the algorithm of choice for S/MIME. Don't mention US-export limited RC2 algorithms, you'd better not know about them.
* RSA_setup_blinding() gets a BN with BN_CTX_get(), returns `out of memory'miod2014-07-102-12/+2
| | | | | | | | if it fails, then never uses it anymore, and may invoke a function which needs more than one BN from the BN_CTX anyway, so this is pointless - remove the BN_CTX_get() call and the test. ok jsing
* make asn1 free safe to call with null pointers of any type.tedu2014-07-102-8/+6
| | | | ok jsing miod
* One sure hopes that OPENSSL_cleanse will:jsing2014-07-102-4/+4
| | | | /* Clear password from memory */
* Remove #if 0 code which dumps your data to stdout.miod2014-07-102-18/+2
|
* Tweak some comments. We do not really need to know that "New!" flags werejsing2014-07-102-18/+16
| | | | added 10+ years ago (they're kinda somewhat stale by now...)
* Uncompress ssltest.jsing2014-07-101-50/+0
|
* Remove more compression tendrils.jsing2014-07-106-28/+8
| | | | ok tedu@
* Stop playing with the RSA_FLAG_BLINDING flag. It does nothing.jsing2014-07-102-6/+2
| | | | ok miod@
* delete some casts. ok miodtedu2014-07-1024-70/+70
|
* Missing allocation checks and potential NULL pointer dereference in themiod2014-07-102-14/+30
| | | | error path in PEM_X509_INFO_read_bio(); ok guenther@ jsing@
* Remove RSA_FLAG_NO_EXP_CONSTTIME, which was deprecated 12+ years ago.jsing2014-07-102-26/+2
| | | | | | sthen@ confirmed that no ports are referencing it. ok miod@.
* Remove more compression related code.jsing2014-07-106-40/+6
|
* Remove DEBUG_KEYGEN and DEBUG_DECRYPT support.miod2014-07-104-98/+4
|
* replace getservbyname_r with getaddrinfo for portabilitybcook2014-07-102-12/+22
| | | | ok jsing@
* Tame the tedu... we still want to know that Compression and Expansion arejsing2014-07-101-1/+5
| | | | NONE, even if this is due to the fact that we do not support compression.
* Put back some parts of the public SSL API that should not have beenjsing2014-07-106-8/+56
| | | | completely decompressed.
* forgot to decompress here tootedu2014-07-102-17/+2
|
* Remove bogus preprocessor statements trying to pick the largest integermiod2014-07-108-64/+8
| | | | | | | | type for BF_LONG, MD[45]_LONG and SHA_LONG. First, the preprocessor symbols they check for a 64-bit system is __ILP64__ which no sane system provides; second, on the platforms which have assembler code to speed things up, the assembler code assumes a 32-bit type will be used.
* check return value of write.bcook2014-07-101-4/+15
| | | | ok beck@ jsing@
* crank major for decompression featuretedu2014-07-102-2/+2
|
* decompress libssl. ok beck jsingtedu2014-07-1049-1469/+77
|
* KNF comments, reflowing and moving out of the middle of argument lists inguenther2014-07-106-186/+300
| | | | | | places ok jsing@
* remove unused ecc_pkey_size.bcook2014-07-102-8/+4
| | | | ok jsing@ miod@
* BN_free, BN_clear_free, BN_CTX_free, BN_BLINDING_free and BN_MONT_CTX_freejsing2014-07-1012-110/+64
| | | | | | all have implicit NULL checks, so we do not need them here. ok miod@
* Use a while loop instead of an ifdowhile loop.jsing2014-07-104-24/+20
| | | | ok miod@ tedu@
* Add some extra sanity checks to make sure the test functions actuallymatthew2014-07-091-1/+13
| | | | run on altstack.
* include <limits.h> for LONG_MIN/LONG_MAX.bcook2014-07-092-4/+4
| | | | | | | Also remove <sys/filio.h> added from previous commit. This was the wrong way to get FIONBIO. ok jsing@
* ASN1_STRING_free can handle NULL, so callers don't need to check. ok miodtedu2014-07-0910-54/+34
|
* unfidef RL_DEBUG. hopefully it's been debugged by nowtedu2014-07-092-50/+2
|
* firebomb some MDEBUG leftoverstedu2014-07-091-87/+1
|
* unifdef a whole bunch of NO RSA/DSA/ECDH defines i deleted from libssltedu2014-07-0912-190/+12
|
* clean up if 0/if 1 code. we don't care anymore.tedu2014-07-092-119/+3
|
* move a commenttedu2014-07-091-3/+3
|
* reset host, port, path to null after freeing so the caller doesn'ttedu2014-07-092-2/+8
| | | | | accidentally free them again. actually a bug in the caller and (hey hey) apps/ocsp.c has exactly that bug, but it's easier/safer to fix here.