1. 22 8月, 2016 1 次提交
  2. 20 8月, 2016 1 次提交
  3. 26 7月, 2016 1 次提交
  4. 18 5月, 2016 1 次提交
  5. 29 4月, 2016 2 次提交
  6. 15 4月, 2016 1 次提交
    • M
      Fix ex_data locks issue · 1ee7b8b9
      Matt Caswell 提交于
      Travis identified a problem with freeing the ex_data locks which wasn't
      quite right in ff234405. Trying to fix it identified a further problem:
      the ex_data locks are cleaned up by OPENSSL_cleanup(), which is called
      explicitly by CRYPTO_mem_leaks(), but then later the BIO passed to
      CRYPTO_mem_leaks() is freed. An attempt is then made to use the ex_data
      lock already freed.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      1ee7b8b9
  7. 14 4月, 2016 1 次提交
  8. 30 3月, 2016 1 次提交
  9. 22 3月, 2016 1 次提交
  10. 09 3月, 2016 1 次提交
  11. 12 2月, 2016 1 次提交
  12. 04 2月, 2016 1 次提交
  13. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  14. 02 12月, 2015 1 次提交
  15. 24 11月, 2015 1 次提交
  16. 10 6月, 2015 2 次提交
    • M
      Change BIO_number_read and BIO_number_written() to be 64 bit · b8b12aad
      Matt Caswell 提交于
      The return type of BIO_number_read() and BIO_number_written() as well as
      the corresponding num_read and num_write members in the BIO structure has
      been changed from unsigned long to uint64_t. On platforms where an unsigned
      long is 32 bits (e.g. Windows) these counters could overflow if >4Gb is
      transferred.
      
      With thanks to the Open Crypto Audit Project for reporting this issue.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      b8b12aad
    • M
      Fix memory leaks in BIO_dup_chain() · aec54108
      Matt Caswell 提交于
      This fixes a memory leak that can occur whilst duplicating a BIO chain if
      the call to CRYPTO_dup_ex_data() fails. It also fixes a second memory leak
      where if a failure occurs after successfully creating the first BIO in the
      chain, then the beginning of the new chain was not freed.
      
      With thanks to the Open Crypto Audit Project for reporting this issue.
      Reviewed-by: NStephen Henson <steve@openssl.org>
      aec54108
  17. 14 5月, 2015 1 次提交
  18. 05 5月, 2015 1 次提交
    • R
      Use safer sizeof variant in malloc · b4faea50
      Rich Salz 提交于
      For a local variable:
              TYPE *p;
      Allocations like this are "risky":
              p = OPENSSL_malloc(sizeof(TYPE));
      if the type of p changes, and the malloc call isn't updated, you
      could get memory corruption.  Instead do this:
              p = OPENSSL_malloc(sizeof(*p));
      Also fixed a few memset() calls that I noticed while doing this.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      b4faea50
  19. 29 4月, 2015 1 次提交
  20. 25 3月, 2015 1 次提交
  21. 06 2月, 2015 1 次提交
  22. 22 1月, 2015 1 次提交
  23. 10 7月, 2014 1 次提交
  24. 17 4月, 2012 1 次提交
  25. 12 6月, 2010 1 次提交
  26. 25 6月, 2009 1 次提交
  27. 12 11月, 2008 1 次提交
  28. 01 11月, 2008 1 次提交
  29. 30 11月, 2006 1 次提交
  30. 27 4月, 2005 1 次提交
  31. 26 3月, 2004 1 次提交
  32. 31 1月, 2003 1 次提交
  33. 13 11月, 2002 1 次提交
  34. 02 9月, 2001 1 次提交
    • G
      Make the necessary changes to work with the recent "ex_data" overhaul. · 79aa04ef
      Geoff Thorpe 提交于
      See the commit log message for that for more information.
      
      NB: X509_STORE_CTX's use of "ex_data" support was actually misimplemented
      (initialisation by "memset" won't/can't/doesn't work). This fixes that but
      requires that X509_STORE_CTX_init() be able to handle errors - so its
      prototype has been changed to return 'int' rather than 'void'. All uses of
      that function throughout the source code have been tracked down and
      adjusted.
      79aa04ef
  35. 13 8月, 2001 1 次提交
    • G
      The indexes returned by ***_get_ex_new_index() functions are used when · b7727ee6
      Geoff Thorpe 提交于
      setting stack (actually, array) values in ex_data. So only increment the
      global counters if the underlying CRYPTO_get_ex_new_index() call succeeds.
      This change doesn't make "ex_data" right (see the comment at the head of
      ex_data.c to know why), but at least makes the source code marginally less
      frustrating.
      b7727ee6
  36. 08 9月, 2000 1 次提交
  37. 07 9月, 2000 1 次提交
    • D
      · cfd3bb17
      Dr. Stephen Henson 提交于
      Add docs for BIO_find_type() and friends.
      
      Added function BIO_next() otherwise you can't
      traverse a chain without accessing BIO internals.
      cfd3bb17
  38. 05 9月, 2000 1 次提交