1. 07 2月, 2016 1 次提交
  2. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  3. 04 9月, 2015 2 次提交
  4. 11 8月, 2015 1 次提交
  5. 14 5月, 2015 1 次提交
  6. 06 5月, 2015 1 次提交
  7. 05 5月, 2015 1 次提交
    • R
      Use safer sizeof variant in malloc · b4faea50
      Rich Salz 提交于
      For a local variable:
              TYPE *p;
      Allocations like this are "risky":
              p = OPENSSL_malloc(sizeof(TYPE));
      if the type of p changes, and the malloc call isn't updated, you
      could get memory corruption.  Instead do this:
              p = OPENSSL_malloc(sizeof(*p));
      Also fixed a few memset() calls that I noticed while doing this.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      b4faea50
  8. 02 5月, 2015 1 次提交
    • R
      free NULL cleanup -- coda · 25aaa98a
      Rich Salz 提交于
      After the finale, the "real" final part. :)  Do a recursive grep with
      "-B1 -w [a-zA-Z0-9_]*_free" to see if any of the preceeding lines are
      an "if NULL" check that can be removed.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      25aaa98a
  9. 01 5月, 2015 1 次提交
  10. 29 4月, 2015 1 次提交
  11. 17 3月, 2015 1 次提交
    • M
      Fix memset call in stack.c · 7132ac83
      Matt Caswell 提交于
      The function sk_zero is supposed to zero the elements held within a stack.
      It uses memset to do this. However it calculates the size of each element
      as being sizeof(char **) instead of sizeof(char *). This probably doesn't
      make much practical difference in most cases, but isn't a portable
      assumption.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      7132ac83
  12. 05 3月, 2015 1 次提交
  13. 25 1月, 2015 1 次提交
  14. 22 1月, 2015 1 次提交
  15. 06 1月, 2015 1 次提交
  16. 23 6月, 2014 1 次提交
  17. 14 10月, 2008 1 次提交
  18. 04 6月, 2008 1 次提交
  19. 21 1月, 2007 1 次提交
  20. 05 10月, 2004 2 次提交
  21. 21 4月, 2004 1 次提交
  22. 02 4月, 2004 1 次提交
  23. 30 4月, 2003 2 次提交
  24. 01 6月, 2001 1 次提交
  25. 28 1月, 2001 1 次提交
  26. 17 9月, 2000 1 次提交
  27. 17 6月, 2000 1 次提交
    • D
      Safe stack reorganisation in terms of function casts. · 3aceb94b
      Dr. Stephen Henson 提交于
      After some messing around this seems to work but needs
      a few more tests. Working out the syntax for sk_set_cmp_func()
      (cast it to a function that itself returns a function pointer)
      was painful :-(
      
      Needs some testing to see what other compilers think of this
      syntax.
      
      Also needs similar stuff for ASN1_SET_OF etc etc.
      3aceb94b
  28. 09 6月, 2000 1 次提交
  29. 02 6月, 2000 1 次提交
    • R
      There have been a number of complaints from a number of sources that names · 26a3a48d
      Richard Levitte 提交于
      like Malloc, Realloc and especially Free conflict with already existing names
      on some operating systems or other packages.  That is reason enough to change
      the names of the OpenSSL memory allocation macros to something that has a
      better chance of being unique, like prepending them with OPENSSL_.
      
      This change includes all the name changes needed throughout all C files.
      26a3a48d
  30. 01 6月, 2000 2 次提交
    • G
      This is the first of two commits (didn't want to dump them all into the · 7bb70435
      Geoff Thorpe 提交于
      same one). However, the first will temporarily break things until the
      second comes through. :-)
      
      The safestack.h handling was mapping compare callbacks that externally
      are of the type (int (*)(type **,type **)) into the underlying callback
      type used by stack.[ch], which is (int (*)(void *,void *)). After some
      degree of digging, it appears that the callback type in the underlying
      stack code should use double pointers too - when the compare operations
      are invoked (from sk_find and sk_sort), they are being used by bsearch
      and qsort to compare two pointers to pointers. This change corrects the
      prototyping (by only casting to the (void*,void*) form at the moment
      it is needed by bsearch and qsort) and makes the mapping in safestack.h
      more transparent. It also changes from "void*" to "char*" to stay in
      keeping with stack.[ch]'s assumed base type of "char".
      
      Also - the "const" situation was that safestack.h was throwing away
      "const"s, and to compound the problem - a close examination of stack.c
      showed that (const char **) is not really achieving what it is supposed
      to when the callback is being invoked, what is needed is
      (const char * const *). So the underlying stack.[ch] and the mapping
      macros in safestack.h have all been altered to correct this.
      
      What will follow are the vast quantities of "const" corrections required
      in stack-dependant code that was being let "slip" through when
      safestack.h was discarding "const"s. These now all come up as compiler
      warnings.
      7bb70435
    • G
      sk_value was also suffering from de-const-ification. · e20d7d71
      Geoff Thorpe 提交于
      Also, add in a couple of missing declarations in pkcs7 code.
      e20d7d71
  31. 31 5月, 2000 1 次提交
    • G
      All the little functions created by the IMPLEMENT_STACK_OF() macro will · 01296a6d
      Geoff Thorpe 提交于
      cast their type-specific STACK into a real STACK and call the underlying
      sk_*** function. The problem is that if the STACK_OF(..) parameter being
      passed in has a "const *" qualifier, it is discarded by the cast.
      
      I'm currently implementing a fix for this but in the mean-time, this is
      one case I noticed (a few type-specific sk_**_num() functions pass in
      const type-specific stacks). If there are other errors in the code where
      consts are being discarded, we will similarly not notice them. yuck.
      01296a6d
  32. 16 5月, 2000 1 次提交
  33. 04 2月, 2000 1 次提交
  34. 31 1月, 2000 1 次提交
  35. 30 5月, 1999 1 次提交
  36. 19 5月, 1999 1 次提交