1. 07 7月, 2017 2 次提交
  2. 05 7月, 2017 1 次提交
  3. 25 4月, 2017 1 次提交
  4. 20 7月, 2016 2 次提交
  5. 18 5月, 2016 1 次提交
  6. 17 5月, 2016 1 次提交
  7. 15 4月, 2016 1 次提交
    • M
      Fix ex_data locks issue · 1ee7b8b9
      Matt Caswell 提交于
      Travis identified a problem with freeing the ex_data locks which wasn't
      quite right in ff234405. Trying to fix it identified a further problem:
      the ex_data locks are cleaned up by OPENSSL_cleanup(), which is called
      explicitly by CRYPTO_mem_leaks(), but then later the BIO passed to
      CRYPTO_mem_leaks() is freed. An attempt is then made to use the ex_data
      lock already freed.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      1ee7b8b9
  8. 31 3月, 2016 1 次提交
    • M
      Remove the CRYPTO_mem_leaks adjustment for the BIO · b3895f42
      Matt Caswell 提交于
      CRYPTO_mem_leaks attempts to adjust the count of bytes leaks to not
      include the BIO that is being used to print the results out. However this
      does not work properly. In all internal cases we switch off recording
      the memory allocation during creation of the BIO so it makes no difference.
      In other cases if the BIO allocates any additional memory during
      construction then the adjustment will be wrong anyway. It also skips over
      the BIO memory during print_leak anyway, so the BIO memory is never
      added into the total. In other words this was broken in lots of ways and
      has been since it was first added.
      
      The simplest solution is just to make it the documented behaviour that
      you must turn off memory logging when creating the BIO, and remove all
      the adjustment stuff completely. The adjustment code was only ever in
      master and never made it to a release branch so there is no loss of
      functionality.
      
      This commit also fixes a compilation failure when using
      enable-crypto-mdebug.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      b3895f42
  9. 09 3月, 2016 2 次提交
  10. 17 2月, 2016 1 次提交
    • R
      Implement the use of heap manipulator implementions · 05c7b163
      Richard Levitte 提交于
      - Make use of the functions given through CRYPTO_set_mem_functions().
      - CRYPTO_free(), CRYPTO_clear_free() and CRYPTO_secure_free() now receive
        __FILE__ and __LINE__.
      - The API for CRYPTO_set_mem_functions() and CRYPTO_get_mem_functions()
        is slightly changed, the implementation for free() now takes a couple
        of extra arguments, taking __FILE__ and __LINE__.
      - The CRYPTO_ memory functions will *always* receive __FILE__ and __LINE__
        from the corresponding OPENSSL_ macros, regardless of if crypto-mdebug
        has been enabled or not.  The reason is that if someone swaps out the
        malloc(), realloc() and free() implementations, we can't know if they
        will use them or not.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      05c7b163
  11. 15 2月, 2016 1 次提交
  12. 10 2月, 2016 2 次提交
  13. 06 2月, 2016 1 次提交
  14. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  15. 12 1月, 2016 4 次提交
  16. 11 1月, 2016 2 次提交
  17. 09 1月, 2016 1 次提交
  18. 08 1月, 2016 1 次提交
    • R
      mem functions cleanup · bbd86bf5
      Rich Salz 提交于
      Only two macros CRYPTO_MDEBUG and CRYPTO_MDEBUG_ABORT to control this.
      If CRYPTO_MDEBUG is not set, #ifdef out the whole debug machinery.
              (Thanks to Jakob Bohm for the suggestion!)
      Make the "change wrapper functions" be the only paradigm.
      Wrote documentation!
      Format the 'set func' functions so their paramlists are legible.
      Format some multi-line comments.
      Remove ability to get/set the "memory debug" functions at runtme.
      Remove MemCheck_* and CRYPTO_malloc_debug_init macros.
      Add CRYPTO_mem_debug(int flag) function.
      Add test/memleaktest.
      Rename CRYPTO_malloc_init to OPENSSL_malloc_init; remove needless calls.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      bbd86bf5
  19. 22 12月, 2015 1 次提交
  20. 17 12月, 2015 3 次提交
  21. 02 12月, 2015 1 次提交
  22. 10 11月, 2015 1 次提交
  23. 05 10月, 2015 1 次提交
  24. 14 5月, 2015 1 次提交
  25. 05 5月, 2015 1 次提交
    • R
      Use safer sizeof variant in malloc · b4faea50
      Rich Salz 提交于
      For a local variable:
              TYPE *p;
      Allocations like this are "risky":
              p = OPENSSL_malloc(sizeof(TYPE));
      if the type of p changes, and the malloc call isn't updated, you
      could get memory corruption.  Instead do this:
              p = OPENSSL_malloc(sizeof(*p));
      Also fixed a few memset() calls that I noticed while doing this.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      b4faea50
  26. 02 5月, 2015 1 次提交
    • R
      free NULL cleanup -- coda · 25aaa98a
      Rich Salz 提交于
      After the finale, the "real" final part. :)  Do a recursive grep with
      "-B1 -w [a-zA-Z0-9_]*_free" to see if any of the preceeding lines are
      an "if NULL" check that can be removed.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      25aaa98a
  27. 29 4月, 2015 1 次提交
  28. 28 4月, 2015 1 次提交
  29. 22 1月, 2015 2 次提交