1. 29 5月, 2015 3 次提交
  2. 26 5月, 2015 1 次提交
  3. 11 5月, 2015 1 次提交
  4. 07 5月, 2015 1 次提交
  5. 02 5月, 2015 1 次提交
    • R
      free NULL cleanup -- coda · 25aaa98a
      Rich Salz 提交于
      After the finale, the "real" final part. :)  Do a recursive grep with
      "-B1 -w [a-zA-Z0-9_]*_free" to see if any of the preceeding lines are
      an "if NULL" check that can be removed.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      25aaa98a
  6. 01 5月, 2015 2 次提交
    • R
      free NULL cleanup 11 · efa7dd64
      Rich Salz 提交于
      Don't check for NULL before calling free functions. This gets:
              ERR_STATE_free
              ENGINE_free
              DSO_free
              CMAC_CTX_free
              COMP_CTX_free
              CONF_free
              NCONF_free NCONF_free_data _CONF_free_data
              A sk_free use within OBJ_sigid_free
              TS_TST_INFO_free (rest of TS_ API was okay)
              Doc update for UI_free (all uses were fine)
              X509V3_conf_free
              X509V3_section_free
              X509V3_string_free
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      efa7dd64
    • R
      free null cleanup finale · b548a1f1
      Rich Salz 提交于
      Don't check for NULL before calling OPENSSL_free
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      b548a1f1
  7. 26 4月, 2015 1 次提交
  8. 25 4月, 2015 1 次提交
    • R
      Big apps cleanup (option-parsing, etc) · 7e1b7485
      Rich Salz 提交于
      This is merges the old "rsalz-monolith" branch over to master.  The biggest
      change is that option parsing switch from cascasding 'else if strcmp("-foo")'
      to a utility routine and somethin akin to getopt.  Also, an error in the
      command line no longer prints the full summary; use -help (or --help :)
      for that.  There have been many other changes and code-cleanup, see
      bullet list below.
      
      Special thanks to Matt for the long and detailed code review.
      
      TEMPORARY:
              For now, comment out CRYPTO_mem_leaks() at end of main
      
      Tickets closed:
              RT3515: Use 3DES in pkcs12 if built with no-rc2
              RT1766: s_client -reconnect and -starttls broke
              RT2932: Catch write errors
              RT2604: port should be 'unsigned short'
              RT2983: total_bytes undeclared #ifdef RENEG
              RT1523: Add -nocert to fix output in x509 app
              RT3508: Remove unused variable introduced by b09eb246
              RT3511: doc fix; req default serial is random
              RT1325,2973: Add more extensions to c_rehash
              RT2119,3407: Updated to dgst.pod
              RT2379: Additional typo fix
              RT2693: Extra include of string.h
              RT2880: HFS is case-insensitive filenames
              RT3246: req command prints version number wrong
      
      Other changes; incompatibilities marked with *:
              Add SCSV support
              Add -misalign to speed command
              Make dhparam, dsaparam, ecparam, x509 output C in proper style
              Make some internal ocsp.c functions void
              Only display cert usages with -help in verify
              Use global bio_err, remove "BIO*err" parameter from functions
              For filenames, - always means stdin (or stdout as appropriate)
              Add aliases for -des/aes "wrap" ciphers.
              *Remove support for IISSGC (server gated crypto)
              *The undocumented OCSP -header flag is now "-header name=value"
              *Documented the OCSP -header flag
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      7e1b7485
  9. 28 3月, 2015 1 次提交
    • R
      free NULL cleanup · c5ba2d99
      Rich Salz 提交于
      EVP_.*free; this gets:
              EVP_CIPHER_CTX_free EVP_PKEY_CTX_free EVP_PKEY_asn1_free
              EVP_PKEY_asn1_set_free EVP_PKEY_free EVP_PKEY_free_it
              EVP_PKEY_meth_free; and also EVP_CIPHER_CTX_cleanup
      Reviewed-by: NKurt Roeckx <kurt@openssl.org>
      c5ba2d99
  10. 11 3月, 2015 1 次提交
  11. 24 1月, 2015 1 次提交
  12. 22 1月, 2015 2 次提交
  13. 13 1月, 2015 1 次提交
  14. 06 1月, 2015 1 次提交
  15. 31 12月, 2014 1 次提交
  16. 19 12月, 2014 1 次提交
  17. 11 12月, 2014 1 次提交
  18. 12 5月, 2014 1 次提交
  19. 15 2月, 2014 1 次提交
    • K
      Use defaults bits in req when not given · 33432203
      Kurt Roeckx 提交于
      If you use "-newkey rsa" it's supposed to read the default number of bits from the
      config file.  However the value isn't used to generate the key, but it does
      print it's generating such a key.  The set_keygen_ctx() doesn't call
      EVP_PKEY_CTX_set_rsa_keygen_bits() and you end up with the default set in
      pkey_rsa_init() (1024).  Afterwards the number of bits gets read from the config
      file, but nothing is done with that anymore.
      
      We now read the config first and use the value from the config file when no size
      is given.
      
      PR: 2592
      33432203
  20. 13 9月, 2013 1 次提交
    • M
      typo · 5628ec66
      Mat 提交于
      5628ec66
  21. 05 12月, 2012 1 次提交
  22. 14 3月, 2010 1 次提交
  23. 12 3月, 2010 1 次提交
  24. 10 3月, 2010 1 次提交
  25. 05 10月, 2009 1 次提交
  26. 28 7月, 2009 1 次提交
  27. 27 4月, 2009 1 次提交
  28. 15 4月, 2009 1 次提交
  29. 08 10月, 2008 1 次提交
  30. 04 6月, 2008 1 次提交
  31. 13 5月, 2008 1 次提交
  32. 13 8月, 2007 1 次提交
  33. 14 6月, 2006 1 次提交
  34. 05 6月, 2006 1 次提交
  35. 16 5月, 2006 1 次提交
  36. 12 5月, 2006 1 次提交