1. 26 5月, 2023 1 次提交
  2. 12 4月, 2023 2 次提交
  3. 10 8月, 2021 1 次提交
  4. 27 2月, 2020 1 次提交
  5. 28 9月, 2019 1 次提交
  6. 17 4月, 2018 1 次提交
  7. 03 4月, 2018 1 次提交
  8. 25 10月, 2017 2 次提交
  9. 23 10月, 2017 1 次提交
  10. 13 4月, 2017 1 次提交
  11. 04 2月, 2017 1 次提交
  12. 23 6月, 2016 1 次提交
  13. 18 5月, 2016 1 次提交
  14. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  15. 11 1月, 2016 1 次提交
  16. 22 12月, 2015 1 次提交
  17. 10 11月, 2015 1 次提交
  18. 18 10月, 2015 1 次提交
  19. 12 10月, 2015 2 次提交
  20. 17 9月, 2015 1 次提交
    • D
      New ASN.1 embed macro. · de17bd5d
      Dr. Stephen Henson 提交于
      New ASN.1 macro ASN1_EMBED. This is the same as ASN1_SIMPLE except the
      structure is not allocated: it is part of the parent. That is instead of
      
      FOO *x;
      
      it must be:
      
      FOO x;
      
      This reduces memory fragmentation and make it impossible to accidentally
      set a mandatory field to NULL.
      
      This currently only works for SEQUENCE and since it is equivalent to
      ASN1_SIMPLE it cannot be tagged, OPTIONAL, SET OF or SEQUENCE OF.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      de17bd5d
  21. 03 9月, 2015 1 次提交
  22. 05 5月, 2015 1 次提交
    • R
      Use safer sizeof variant in malloc · b4faea50
      Rich Salz 提交于
      For a local variable:
              TYPE *p;
      Allocations like this are "risky":
              p = OPENSSL_malloc(sizeof(TYPE));
      if the type of p changes, and the malloc call isn't updated, you
      could get memory corruption.  Instead do this:
              p = OPENSSL_malloc(sizeof(*p));
      Also fixed a few memset() calls that I noticed while doing this.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      b4faea50
  23. 11 4月, 2015 1 次提交
    • D
      Don't set *pval to NULL in ASN1_item_ex_new. · f617b496
      Dr. Stephen Henson 提交于
      While *pval is usually a pointer in rare circumstances it can be a long
      value. One some platforms (e.g. WIN64) where
      sizeof(long) < sizeof(ASN1_VALUE *) this will write past the field.
      
      *pval is initialised correctly in the rest of ASN1_item_ex_new so setting it
      to NULL is unecessary anyway.
      
      Thanks to Julien Kauffmann for reporting this issue.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      f617b496
  24. 27 3月, 2015 1 次提交
  25. 26 3月, 2015 1 次提交
  26. 25 3月, 2015 1 次提交
  27. 24 3月, 2015 1 次提交
  28. 12 3月, 2015 1 次提交
    • M
      ASN1_primitive_new NULL param handling · 9e488fd6
      Matt Caswell 提交于
      ASN1_primitive_new takes an ASN1_ITEM * param |it|. There are a couple
      of conditional code paths that check whether |it| is NULL or not - but
      later |it| is deref'd unconditionally. If |it| was ever really NULL then
      this would seg fault. In practice ASN1_primitive_new is marked as an
      internal function in the public header file. The only places it is ever
      used internally always pass a non NULL parameter for |it|. Therefore, change
      the code to sanity check that |it| is not NULL, and remove the conditional
      checking.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      Reviewed-by: NAndy Polyakov <appro@openssl.org>
      9e488fd6
  29. 22 1月, 2015 1 次提交
  30. 02 9月, 2009 1 次提交
    • D
      PR: 2013 · 17b5326b
      Dr. Stephen Henson 提交于
      Submitted by: steve@openssl.org
      
      Include a flag ASN1_STRING_FLAG_MSTRING when a multi string type is created.
      This makes it possible to tell if the underlying type is UTCTime,
      GeneralizedTime or Time when the structure is reused and X509_time_adj_ex()
      can handle each case in an appropriate manner.
      
      Add error checking to CRL generation in ca utility when nextUpdate is being
      set.
      17b5326b
  31. 06 11月, 2008 1 次提交
  32. 16 3月, 2006 1 次提交
  33. 16 2月, 2006 1 次提交
  34. 02 9月, 2005 1 次提交
  35. 26 7月, 2005 1 次提交
  36. 11 5月, 2005 1 次提交
    • B
      Fix more error codes. · 8afca8d9
      Bodo Möller 提交于
      (Also improve util/ck_errf.pl script, and occasionally
      fix source code formatting.)
      8afca8d9
  37. 25 4月, 2004 1 次提交