1. 23 3月, 2020 1 次提交
  2. 28 9月, 2019 1 次提交
    • D
      Reorganize private crypto header files · 0c994d54
      Dr. Matthias St. Pierre 提交于
      Currently, there are two different directories which contain internal
      header files of libcrypto which are meant to be shared internally:
      
      While header files in 'include/internal' are intended to be shared
      between libcrypto and libssl, the files in 'crypto/include/internal'
      are intended to be shared inside libcrypto only.
      
      To make things complicated, the include search path is set up in such
      a way that the directive #include "internal/file.h" could refer to
      a file in either of these two directoroes. This makes it necessary
      in some cases to add a '_int.h' suffix to some files to resolve this
      ambiguity:
      
        #include "internal/file.h"      # located in 'include/internal'
        #include "internal/file_int.h"  # located in 'crypto/include/internal'
      
      This commit moves the private crypto headers from
      
        'crypto/include/internal'  to  'include/crypto'
      
      As a result, the include directives become unambiguous
      
        #include "internal/file.h"       # located in 'include/internal'
        #include "crypto/file.h"         # located in 'include/crypto'
      
      hence the superfluous '_int.h' suffixes can be stripped.
      
      The files 'store_int.h' and 'store.h' need to be treated specially;
      they are joined into a single file.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/9681)
      0c994d54
  3. 11 9月, 2018 1 次提交
  4. 07 8月, 2018 1 次提交
  5. 20 6月, 2016 1 次提交
  6. 16 6月, 2016 1 次提交
  7. 02 6月, 2016 1 次提交
  8. 18 5月, 2016 1 次提交
  9. 01 2月, 2016 2 次提交
  10. 29 1月, 2016 1 次提交
    • V
      Make it possible to check for explicit auxiliary trust · aea61161
      Viktor Dukhovni 提交于
      By default X509_check_trust() trusts self-signed certificates from
      the trust store that have no explicit local trust/reject oids
      encapsulated as a "TRUSTED CERTIFICATE" object.  (See the -addtrust
      and -trustout options of x509(1)).
      
      This commit adds a flag that makes it possible to distinguish between
      that implicit trust, and explicit auxiliary settings.
      
      With flags |= X509_TRUST_NO_SS_COMPAT, a certificate is only trusted
      via explicit trust settings.
      Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
      aea61161
  11. 28 1月, 2016 1 次提交
  12. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  13. 21 1月, 2016 1 次提交
    • V
      Reject when explicit trust EKU are set and none match. · 3342dcea
      Viktor Dukhovni 提交于
      Returning untrusted is enough for for full chains that end in
      self-signed roots, because when explicit trust is specified it
      suppresses the default blanket trust of self-signed objects.
      
      But for partial chains, this is not enough, because absent a similar
      trust-self-signed policy, non matching EKUs are indistinguishable
      from lack of EKU constraints.
      
      Therefore, failure to match any trusted purpose must trigger an
      explicit reject.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      3342dcea
  14. 04 1月, 2016 1 次提交
  15. 17 12月, 2015 1 次提交
    • R
      Rename some BUF_xxx to OPENSSL_xxx · 7644a9ae
      Rich Salz 提交于
      Rename BUF_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
      to OPENSSL_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
      Add #define's for the old names.
      Add CRYPTO_{memdup,strndup}, called by OPENSSL_{memdup,strndup} macros.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      7644a9ae
  16. 01 9月, 2015 1 次提交
  17. 14 5月, 2015 1 次提交
  18. 11 5月, 2015 1 次提交
  19. 05 5月, 2015 1 次提交
    • R
      Use safer sizeof variant in malloc · b4faea50
      Rich Salz 提交于
      For a local variable:
              TYPE *p;
      Allocations like this are "risky":
              p = OPENSSL_malloc(sizeof(TYPE));
      if the type of p changes, and the malloc call isn't updated, you
      could get memory corruption.  Instead do this:
              p = OPENSSL_malloc(sizeof(*p));
      Also fixed a few memset() calls that I noticed while doing this.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      b4faea50
  20. 03 5月, 2015 1 次提交
  21. 06 2月, 2015 1 次提交
  22. 22 1月, 2015 1 次提交
  23. 25 2月, 2010 1 次提交
  24. 06 11月, 2008 1 次提交
  25. 13 2月, 2006 1 次提交
  26. 30 10月, 2003 1 次提交
    • G
      A general spring-cleaning (in autumn) to fix up signed/unsigned warnings. · 27545970
      Geoff Thorpe 提交于
      I have tried to convert 'len' type variable declarations to unsigned as a
      means to address these warnings when appropriate, but when in doubt I have
      used casts in the comparisons instead. The better solution (that would get
      us all lynched by API users) would be to go through and convert all the
      function prototypes and structure definitions to use unsigned variables
      except when signed is necessary. The proliferation of (signed) "int" for
      strictly non-negative uses is unfortunate.
      27545970
  27. 12 6月, 2003 1 次提交
  28. 21 10月, 2001 1 次提交
  29. 25 5月, 2001 1 次提交
    • D
      · 76c919c1
      Dr. Stephen Henson 提交于
      Add missing variable length cipher flag for Blowfish.
      
      Only use trust settings if either trust or reject settings
      are present, otherwise use compatibility mode. This stops
      root CAs being rejected if they have alias of keyid set.
      76c919c1
  30. 10 5月, 2001 1 次提交
    • D
      · 926a56bf
      Dr. Stephen Henson 提交于
      Purpose and trust setting functions for X509_STORE.
      
      Tidy existing code.
      926a56bf
  31. 26 2月, 2001 1 次提交
    • D
      · fafc7f98
      Dr. Stephen Henson 提交于
      Enhance OCSP_request_verify() so it finds the signers certificate
      properly and supports several flags.
      fafc7f98
  32. 28 1月, 2001 1 次提交
  33. 17 1月, 2001 1 次提交
    • D
      · 81f169e9
      Dr. Stephen Henson 提交于
      Initial OCSP certificate verify. Not complete,
      it just supports a "trusted OCSP global root CA".
      81f169e9
  34. 02 6月, 2000 1 次提交
    • R
      There have been a number of complaints from a number of sources that names · 26a3a48d
      Richard Levitte 提交于
      like Malloc, Realloc and especially Free conflict with already existing names
      on some operating systems or other packages.  That is reason enough to change
      the names of the OpenSSL memory allocation macros to something that has a
      better chance of being unique, like prepending them with OPENSSL_.
      
      This change includes all the name changes needed throughout all C files.
      26a3a48d
  35. 01 6月, 2000 1 次提交
    • G
      The previous commit to crypto/stack/*.[ch] pulled the type-safety strings · ccd86b68
      Geoff Thorpe 提交于
      yet tighter, and also put some heat on the rest of the library by
      insisting (correctly) that compare callbacks used in stacks are prototyped
      with "const" parameters. This has led to a depth-first explosion of
      compiler warnings in the code where 1 constification has led to 3 or 4
      more. Fortunately these have all been resolved to completion and the code
      seems cleaner as a result - in particular many of the _cmp() functions
      should have been prototyped with "const"s, and now are. There was one
      little problem however;
      
      X509_cmp() should by rights compare "const X509 *" pointers, and it is now
      declared as such. However, it's internal workings can involve
      recalculating hash values and extensions if they have not already been
      setup. Someone with a more intricate understanding of the flow control of
      X509 might be able to tighten this up, but for now - this seemed the
      obvious place to stop the "depth-first" constification of the code by
      using an evil cast (they have migrated all the way here from safestack.h).
      
      Fortunately, this is the only place in the code where this was required
      to complete these type-safety changes, and it's reasonably clear and
      commented, and seemed the least unacceptable of the options. Trying to
      take the constification further ends up exploding out considerably, and
      indeed leads directly into generalised ASN functions which are not likely
      to cooperate well with this.
      ccd86b68
  36. 07 3月, 2000 1 次提交
  37. 26 2月, 2000 2 次提交
  38. 04 2月, 2000 1 次提交