aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2000-06-01Use NO_FP_API.Ulf Möller1-1/+1
2000-06-01Don't include <stdlib.h>. In the NO_FP_API case, don't include <stdio.h>.Ulf Möller1-7/+6
2000-06-01Small documentation bug, probably a cut'n'paste, corrected.Richard Levitte1-1/+1
2000-06-01Bug fix for 64 bit HP-UX.Ulf Möller1-1/+1
Submitted by: Karsten Spang <ks@bellesystems.com>
2000-06-01Small fix to enable reading from stdin as well.Richard Levitte1-2/+2
Contributed by Yoichiro Okabe <okabe@wizsoft.co.jp>
2000-06-01"make update" + stripping the type-specific stack functions out ofGeoff Thorpe14-608/+1085
libeay.num and ssleay.num.
2000-06-01This change will cause builds (by default) to not use different STACKGeoff Thorpe6-3/+142
structures and functions for each stack type. The previous behaviour can be enabled by configuring with the "-DDEBUG_SAFESTACK" option. This will also cause "make update" (mkdef.pl in particular) to update the libeay.num and ssleay.num symbol tables with the number of extra functions DEBUG_SAFESTACK creates. The way this change works is to accompany each DECLARE_STACK_OF() macro with a set of "#define"d versions of the sk_##type##_*** functions that ensures all the existing "type-safe" stack calls are precompiled into the underlying stack calls. The presence or abscence of the DEBUG_SAFESTACK symbol controls whether this block of "#define"s or the DECLARE_STACK_OF() macro is taking effect. The block of "#define"s is in turn generated and maintained by a perl script (util/mkstack.pl) that encompasses the block with delimiting C comments. This works in a similar way to the auto-generated error codes and, like the other such maintenance utilities, is invoked by the "make update" target. A long (but mundane) commit will follow this with the results of "make update" - this will include all the "#define" blocks for each DECLARE_STACK_OF() statement, along with stripped down libeay.num and ssleay.num files.
2000-06-01The previous commit to crypto/stack/*.[ch] pulled the type-safety stringsGeoff Thorpe16-75/+117
yet tighter, and also put some heat on the rest of the library by insisting (correctly) that compare callbacks used in stacks are prototyped with "const" parameters. This has led to a depth-first explosion of compiler warnings in the code where 1 constification has led to 3 or 4 more. Fortunately these have all been resolved to completion and the code seems cleaner as a result - in particular many of the _cmp() functions should have been prototyped with "const"s, and now are. There was one little problem however; X509_cmp() should by rights compare "const X509 *" pointers, and it is now declared as such. However, it's internal workings can involve recalculating hash values and extensions if they have not already been setup. Someone with a more intricate understanding of the flow control of X509 might be able to tighten this up, but for now - this seemed the obvious place to stop the "depth-first" constification of the code by using an evil cast (they have migrated all the way here from safestack.h). Fortunately, this is the only place in the code where this was required to complete these type-safety changes, and it's reasonably clear and commented, and seemed the least unacceptable of the options. Trying to take the constification further ends up exploding out considerably, and indeed leads directly into generalised ASN functions which are not likely to cooperate well with this.
2000-06-01This is the first of two commits (didn't want to dump them all into theGeoff Thorpe3-20/+45
same one). However, the first will temporarily break things until the second comes through. :-) The safestack.h handling was mapping compare callbacks that externally are of the type (int (*)(type **,type **)) into the underlying callback type used by stack.[ch], which is (int (*)(void *,void *)). After some degree of digging, it appears that the callback type in the underlying stack code should use double pointers too - when the compare operations are invoked (from sk_find and sk_sort), they are being used by bsearch and qsort to compare two pointers to pointers. This change corrects the prototyping (by only casting to the (void*,void*) form at the moment it is needed by bsearch and qsort) and makes the mapping in safestack.h more transparent. It also changes from "void*" to "char*" to stay in keeping with stack.[ch]'s assumed base type of "char". Also - the "const" situation was that safestack.h was throwing away "const"s, and to compound the problem - a close examination of stack.c showed that (const char **) is not really achieving what it is supposed to when the callback is being invoked, what is needed is (const char * const *). So the underlying stack.[ch] and the mapping macros in safestack.h have all been altered to correct this. What will follow are the vast quantities of "const" corrections required in stack-dependant code that was being let "slip" through when safestack.h was discarding "const"s. These now all come up as compiler warnings.
2000-06-01is needed.Ulf Möller1-0/+2
2000-05-31typoBodo Möller1-1/+1
2000-05-31dh and gendh have been obsoleted by dhparam.Bodo Möller1-3/+9
2000-05-31#include <stdio.h> not needed.Ulf Möller1-1/+0
2000-05-31#include <stdlib.h> is not needed.Ulf Möller1-2/+0
2000-05-31Result of "make update"Richard Levitte1-0/+1
2000-05-31This seems to become a FAQ...Richard Levitte1-0/+11
2000-05-31sk_***_new_null() seems to be there to avoid exactly this sort of thingGeoff Thorpe1-1/+1
which is a cast between NULL and a function pointer.
2000-05-31sk_value was also suffering from de-const-ification.Geoff Thorpe3-2/+4
Also, add in a couple of missing declarations in pkcs7 code.
2000-05-31config can now detect ARM Linux automagically.Richard Levitte1-0/+1
Contributed by Jeremy Norris <jeremy.norris@rebel.com>
2000-05-31strtoul is not used anywhere.Bodo Möller1-1/+0
2000-05-31When compiling with /opt/SUNWspro/SC4.2/bin/cc on Solaris, __svr4__ isBodo Möller1-1/+1
not defined, but __SVR4 is.
2000-05-31All the little functions created by the IMPLEMENT_STACK_OF() macro willGeoff Thorpe2-2/+2
cast their type-specific STACK into a real STACK and call the underlying sk_*** function. The problem is that if the STACK_OF(..) parameter being passed in has a "const *" qualifier, it is discarded by the cast. I'm currently implementing a fix for this but in the mean-time, this is one case I noticed (a few type-specific sk_**_num() functions pass in const type-specific stacks). If there are other errors in the code where consts are being discarded, we will similarly not notice them. yuck.
2000-05-31Move Windows seeding functions into a separate file.Bodo Möller4-144/+297
They have nothing to do with the particular PRNG (md_rand.c).
2000-05-31Add "FIXME" comment.Bodo Möller1-1/+8
2000-05-30Improve PRNG robustness.Bodo Möller2-1/+49
2000-05-30More EVP cipher revision.Dr. Stephen Henson8-96/+169
Change EVP_SealInit() and EVP_OpenInit() to handle cipher parameters. Make it possible to set RC2 and RC5 params. Make RC2 ASN1 code use the effective key bits and not the key length. TODO: document how new API works.
2000-05-30"make update"Geoff Thorpe3-1/+20
Also, corrects the linux-elf-arm config string, it was previously setting $des_obj = dlfcn :-)
2000-05-30You must have an empty line between =item'sRichard Levitte1-0/+1
2000-05-30Fourth phase EVP revision.Dr. Stephen Henson1-0/+168
Declare ciphers in terms of macros. This reduces the amount of code and places each block cipher EVP definition in a single file instead of being spread over 4 files.
2000-05-30Fourth phase EVP revision.Dr. Stephen Henson32-3106/+320
Declare ciphers in terms of macros. This reduces the amount of code and places each block cipher EVP definition in a single file instead of being spread over 4 files.
2000-05-29Configuration for linux on ARM (contributed by Jeremy NorrisRichard Levitte1-0/+3
<jeremy.norris@rebel.com>)
2000-05-29Minor corrections to documentation.Geoff Thorpe3-14/+8
* speed processes any/all options passed to it, not just one. * DH and DSA have no "_get_method()" functions, only RSA does. * typos.
2000-05-29another warning.Geoff Thorpe1-1/+1
2000-05-29It seems that mktime does what is required here. Certainly timegm() canGeoff Thorpe1-6/+1
not be used because it is not available on all systems (most notably, win32).
2000-05-29This declaration seems to have been added into the header file accidently.Geoff Thorpe2-2/+0
There's no trace of it being implemented and it doesn't seem to have been intended given that it is prototyped with a BIO yet there was a BIO- specific version added in at the same time.
2000-05-29oops.Geoff Thorpe1-2/+2
2000-05-28Third phase of EVP cipher overhaul.Dr. Stephen Henson34-253/+134
Remove duplicated code in EVP.
2000-05-27Bugfix: clear error queue after ignoring ssl_verify_cert_chain result.Bodo Möller3-1/+9
2000-05-27Second phase of EVP cipher overhaul.Dr. Stephen Henson34-184/+259
Change functions like EVP_EncryptUpdate() so they now return a value. These normally have software only implementations which cannot fail so this was acceptable. However ciphers can be implemented in hardware and these could return errors.
2000-05-26Beginnings of EVP cipher overhaul. This should eventuallyDr. Stephen Henson37-65/+166
enhance and tidy up the EVP interface. This patch adds initial support for variable length ciphers and changes S/MIME code to use this. Some other library functions need modifying to support use of modified cipher parameters. Also need to change all the cipher functions that should return error codes, but currenly don't. And of course it needs extensive testing...
2000-05-25cvs updateGeoff Thorpe1-0/+18
2000-05-25typoBodo Möller1-1/+1
2000-05-25Implement SSL_OP_TLS_ROLLBACK_BUG for servers.Bodo Möller2-15/+38
Call dh_tmp_cb with correct 'is_export' flag. Avoid tabs in CHANGES.
2000-05-24Add the target system linux-m68kRichard Levitte2-0/+2
2000-05-24Add DSA library string. Workaround for IIS .key file invalidDr. Stephen Henson3-1/+10
ASN1 encoding.
2000-05-23Fix Blowfish URL.Ralf S. Engelschall1-1/+1
Submitted by: Arnaud De Timmerman <Arnaud.De.Timmerman@branchur.fr>
2000-05-21Yet more typesafety.Ben Laurie3-6/+8
2000-05-21Avoid sprintfBodo Möller1-1/+1
2000-05-21Avoid sprintf.Bodo Möller1-2/+3
2000-05-21Avoid sprintf, and harmonize indentation.Bodo Möller1-73/+76