1. 18 9月, 2015 1 次提交
  2. 17 9月, 2015 1 次提交
  3. 03 9月, 2015 1 次提交
  4. 14 5月, 2015 1 次提交
  5. 05 5月, 2015 1 次提交
    • R
      Use safer sizeof variant in malloc · b4faea50
      Rich Salz 提交于
      For a local variable:
              TYPE *p;
      Allocations like this are "risky":
              p = OPENSSL_malloc(sizeof(TYPE));
      if the type of p changes, and the malloc call isn't updated, you
      could get memory corruption.  Instead do this:
              p = OPENSSL_malloc(sizeof(*p));
      Also fixed a few memset() calls that I noticed while doing this.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      b4faea50
  6. 02 5月, 2015 1 次提交
    • R
      free NULL cleanup -- coda · 25aaa98a
      Rich Salz 提交于
      After the finale, the "real" final part. :)  Do a recursive grep with
      "-B1 -w [a-zA-Z0-9_]*_free" to see if any of the preceeding lines are
      an "if NULL" check that can be removed.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      25aaa98a
  7. 24 3月, 2015 1 次提交
  8. 09 2月, 2015 1 次提交
  9. 06 2月, 2015 1 次提交
  10. 28 1月, 2015 1 次提交
    • R
      OPENSSL_NO_xxx cleanup: SHA · 474e469b
      Rich Salz 提交于
      Remove support for SHA0 and DSS0 (they were broken), and remove
      the ability to attempt to build without SHA (it didn't work).
      For simplicity, remove the option of not building various SHA algorithms;
      you could argue that SHA_224/256/384/512 should be kept, since they're
      like crypto algorithms, but I decided to go the other way.
      So these options are gone:
      	GENUINE_DSA         OPENSSL_NO_SHA0
      	OPENSSL_NO_SHA      OPENSSL_NO_SHA1
      	OPENSSL_NO_SHA224   OPENSSL_NO_SHA256
      	OPENSSL_NO_SHA384   OPENSSL_NO_SHA512
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      474e469b
  11. 22 1月, 2015 2 次提交
  12. 28 6月, 2014 1 次提交
  13. 05 12月, 2012 1 次提交
  14. 14 12月, 2010 1 次提交
  15. 01 9月, 2008 1 次提交
  16. 29 8月, 2008 1 次提交
  17. 21 8月, 2008 1 次提交
  18. 04 8月, 2008 1 次提交
  19. 07 9月, 2007 1 次提交
  20. 03 10月, 2006 1 次提交
  21. 21 9月, 2006 2 次提交
  22. 10 9月, 2006 1 次提交
  23. 24 7月, 2006 1 次提交
  24. 02 10月, 2005 1 次提交
  25. 01 10月, 2005 1 次提交
  26. 02 9月, 2005 1 次提交
  27. 09 12月, 2004 1 次提交
  28. 05 10月, 2004 1 次提交
  29. 27 7月, 2001 1 次提交
    • D
      · 1241126a
      Dr. Stephen Henson 提交于
      More linker bloat reorganisation:
      
      Split private key PEM and normal PEM handling. Private key
      handling needs to link in stuff like PKCS#8.
      
      Relocate the ASN1 *_dup() functions, to the relevant ASN1
      modules using new macro IMPLEMENT_ASN1_DUP_FUNCTION. Previously
      these were all in crypto/x509/x_all.c along with every ASN1
      BIO/fp function which linked in *every* ASN1 function if
      a single dup was used.
      
      Move the authority key id ASN1 structure to a separate file.
      This is used in the X509 routines and its previous location
      linked in all the v3 extension code.
      
      Also move ASN1_tag2bit to avoid linking in a_bytes.c which
      is now largely obsolete.
      
      So far under Linux stripped binary with single PEM_read_X509
      is now 238K compared to 380K before these changes.
      1241126a
  30. 23 2月, 2001 1 次提交
  31. 09 12月, 2000 1 次提交
    • D
      · 9d6b1ce6
      Dr. Stephen Henson 提交于
      Merge from the ASN1 branch of new ASN1 code
      to main trunk.
      
      Lets see if the makes it to openssl-cvs :-)
      9d6b1ce6
  32. 02 6月, 2000 1 次提交
    • R
      There have been a number of complaints from a number of sources that names · 26a3a48d
      Richard Levitte 提交于
      like Malloc, Realloc and especially Free conflict with already existing names
      on some operating systems or other packages.  That is reason enough to change
      the names of the OpenSSL memory allocation macros to something that has a
      better chance of being unique, like prepending them with OPENSSL_.
      
      This change includes all the name changes needed throughout all C files.
      26a3a48d
  33. 01 6月, 2000 1 次提交
    • G
      The previous commit to crypto/stack/*.[ch] pulled the type-safety strings · ccd86b68
      Geoff Thorpe 提交于
      yet tighter, and also put some heat on the rest of the library by
      insisting (correctly) that compare callbacks used in stacks are prototyped
      with "const" parameters. This has led to a depth-first explosion of
      compiler warnings in the code where 1 constification has led to 3 or 4
      more. Fortunately these have all been resolved to completion and the code
      seems cleaner as a result - in particular many of the _cmp() functions
      should have been prototyped with "const"s, and now are. There was one
      little problem however;
      
      X509_cmp() should by rights compare "const X509 *" pointers, and it is now
      declared as such. However, it's internal workings can involve
      recalculating hash values and extensions if they have not already been
      setup. Someone with a more intricate understanding of the flow control of
      X509 might be able to tighten this up, but for now - this seemed the
      obvious place to stop the "depth-first" constification of the code by
      using an evil cast (they have migrated all the way here from safestack.h).
      
      Fortunately, this is the only place in the code where this was required
      to complete these type-safety changes, and it's reasonably clear and
      commented, and seemed the least unacceptable of the options. Trying to
      take the constification further ends up exploding out considerably, and
      indeed leads directly into generalised ASN functions which are not likely
      to cooperate well with this.
      ccd86b68
  34. 29 1月, 2000 1 次提交
  35. 20 10月, 1999 1 次提交
  36. 18 9月, 1999 1 次提交
  37. 03 6月, 1999 1 次提交
  38. 30 5月, 1999 1 次提交