aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Remove NOEXIST entriesRich Salz2016-06-012-68/+0
| | | | | | checkpoint before release. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Don't leak memory on set_reasons() error pathMatt Caswell2016-06-011-3/+3
| | | | | | | The set_reasons() function in v3_crld.c leaks a STACK_OF(CONF_VALUE) object on an error path. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Don't leak memory on int X509_PURPOSE_add() error pathMatt Caswell2016-06-011-3/+10
| | | | | | | The int X509_PURPOSE_add() function was leaking an X509_PURPOSE object on error. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Don't leak memory on X509_TRUST_add() error pathMatt Caswell2016-06-011-3/+9
| | | | | | The X509_TRUST_add() function was leaking an X509_TRUST object on error. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Don't leak memory on ASN1_item_pack() error pathMatt Caswell2016-06-011-7/+14
| | | | | | | The ASN1_item_pack() function was leaking an ASN1_STRING object on error paths. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Don't leak memory on ASN1_GENERALIZEDTIME_adj() error pathMatt Caswell2016-06-011-14/+21
| | | | | | | The ASN1_GENERALIZEDTIME_adj() function leaks an ASN1_GENERALIZEDTIME object on an error path. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Don't leak memory in v2i_POLICY_MAPPINGS() on error pathMatt Caswell2016-06-011-9/+12
| | | | | | | The v2i_POLICY_MAPPINGS() function leaked ASN1_OBJECT pointers on error paths. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Don't leak memory from notice_section function on error pathMatt Caswell2016-06-011-0/+1
| | | | | | | The notice_section() function allocates a STACK_OF(CONF_VALUE) but then fails to free it on an error path. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Don't leak memory in v2i_AUTHORITY_KEYIDMatt Caswell2016-06-011-0/+4
| | | | | | | The v2i_AUTHORITY_KEYID() function can leak memory under an error condition. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Fix memory leak in crl2pkcs7 appMatt Caswell2016-06-011-2/+1
| | | | | | The crl2pkcs7 app leaks a stack of OPENSSL_STRINGs in error paths. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Free a temporary buffer used by dsaparam applicationMatt Caswell2016-06-011-0/+1
| | | | | | | The dsaparam application allocates a temporary buffer but then doesn't free it. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Free buffer on error in a2i_ASN1_INTEGER()Matt Caswell2016-06-011-0/+1
| | | | | | | The function a2i_ASN1_INTEGER() allocates a buffer |s| but then fails to free it on error paths. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Free memory on error in cms appMatt Caswell2016-06-011-1/+2
| | | | | | | The make_receipt_request() function in the cms app can leak memory on an error condition. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Free tempory data on error in ec_wNAF_mul()Matt Caswell2016-06-011-0/+2
| | | | | | | The ec_wNAF_mul() function allocates some temporary storage that it doesn't always free on an error condition. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Fix nits in crypto.pod,ssl.podRich Salz2016-06-012-4/+16
| | | | | | | After this merge, the only things left (from doc-nit-check) is 74 pages without a "RETURN VALUES" section. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Fix various doc nits.Rich Salz2016-06-016-67/+93
| | | | Reviewed-by: Richard Levitte <levitte@openssl.org>
* Remove/rename some old files.Rich Salz2016-06-0136-1693/+1
| | | | Reviewed-by: Richard Levitte <levitte@openssl.org>
* Add final(?) set of copyrights.Rich Salz2016-06-0131-63/+216
| | | | | | | | | Add copyright to missing assembler files. Add copyrights to missing test/* files. Add copyrights Various source and misc files. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Fix some RAND bugsRich Salz2016-06-013-9/+18
| | | | | | | | RT2630 -- segfault for int overlow RT2877 -- check return values in apps/rand Update CHANGES file for previous "windows rand" changes. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Ensure an ASN1_OBJECT is freed in error pathsMatt Caswell2016-06-011-1/+6
| | | | Reviewed-by: Richard Levitte <levitte@openssl.org>
* Free allocated password strings on exitMatt Caswell2016-06-011-0/+2
| | | | Reviewed-by: Richard Levitte <levitte@openssl.org>
* Free a BIO_ADDR if DTLSv1_listen return <=0Matt Caswell2016-06-011-0/+2
| | | | Reviewed-by: Richard Levitte <levitte@openssl.org>
* Ensure BIGNUM is freed in an error pathMatt Caswell2016-06-011-2/+1
| | | | Reviewed-by: Richard Levitte <levitte@openssl.org>
* Free an X509_CRL in an error pathMatt Caswell2016-06-011-1/+3
| | | | Reviewed-by: Richard Levitte <levitte@openssl.org>
* Don't leak X509_OBJECT in an error pathMatt Caswell2016-06-011-3/+3
| | | | | | Swap the ordering of some code to avoid a leak in an error path. Reviewed-by: Richard Levitte <levitte@openssl.org>
* RT4337: Crash in DESRich Salz2016-06-013-43/+46
| | | | | | | Salt must be two ASCII characters. Add tests to check for that, and a test to test the checks. Reviewed-by: Matt Caswell <matt@openssl.org>
* Fix printing of DH ParametersMatt Caswell2016-06-011-1/+2
| | | | | | | | | The -text argument to dhparam is broken, because the DHparams_print() function always returns an error. The problem is that always expects a public or private key to be present, even though that is never the case with parameters. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Add dhparam sanity check and update DH_check documentationMatt Caswell2016-06-013-17/+57
| | | | | | | | | | | | | The -check argument to dhparam should never identify any problems if we have just generated the parameters. Add a sanity check for this and print an error and fail if necessary. Also updates the documentation for the -check argument, and the DH_check() function. RT#4244 Reviewed-by: Richard Levitte <levitte@openssl.org>
* Raise an Err when CRYPTO_THREAD_lock_new failsFdaSilvaYY2016-06-016-3/+15
| | | | | | | | Add missing error raise call, as it is done everywhere else. and as CRYPTO_THREAD_lock_new don't do it internally. Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org>
* req command incorrectly displays the bits for an EC keyMatt Caswell2016-06-011-2/+6
| | | | | | | | | | | | | | When the "req" command is used to generate a new EC key using the -newkey option it will incorrectly display: Generating a 2048 bit EC private key This commit fixes the message to not display the bit length for EC keys because we don't currently support getting that during generation. GitHub Issue #1068 Reviewed-by: Richard Levitte <levitte@openssl.org>
* OpenBSD doesn't have ucontext.h so don't try and include itMatt Caswell2016-06-011-1/+3
| | | | | | | | On OpenBSD we turn off async capabilities due to no ucontext.h. RT#4379 Reviewed-by: Richard Levitte <levitte@openssl.org>
* make updateMatt Caswell2016-05-311-0/+1
| | | | Reviewed-by: Richard Levitte <levitte@openssl.org>
* Updates from reviewMat2016-05-311-7/+9
| | | | | Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
* Fix: PEM_read_bio_PrivateKey with no-ui / no-stdioMat2016-05-311-7/+7
| | | | | | | | | | If openssl is compiled with no-ui or no-stdio, then PEM_read_bio_PrivateKey fails if a password but no callback is provided. The reason is that the premature return in the PEM_def_callback implementation when OPENSSL_NO_STDIO or OPENSSL_NO_UI is defined, comes too early. This patch moves the ifdef block to the correct place. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
* Remove null check, per review feedback. Note this in the docs.TJ Saunders2016-05-312-3/+2
| | | | | Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1135)
* Add requested HISTORY section, remove copy/pastos, per review feedback.TJ Saunders2016-05-311-18/+7
| | | | | Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1135)
* Add an SSL_SESSION accessor for obtaining the protocol version number, withTJ Saunders2016-05-313-0/+62
| | | | | | | accompanying documentation. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1135)
* RT4539: Add section for renamed ciphers.Rich Salz2016-05-311-0/+7
| | | | Reviewed-by: Richard Levitte <levitte@openssl.org>
* speed.c: fix segfault with unrecognized algorithmsCristian Stoica2016-05-311-1/+5
| | | | | | | | | | | | | | When an unrecognized algorithm is given on command line together with -async_jobs, speed_main will jump to clean-up and run ASYNC_cleanup_thread without calling ASYNC_init_thread first. Example: openssl speed -async_jobs 4 ras2048 Signed-off-by: Cristian Stoica <cristian.stoica@nxp.com> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1084)
* Parameter copy sanity checks.Dr. Stephen Henson2016-05-315-4/+14
| | | | | | | | | | | | Don't copy parameters is they're already present in the destination. Return error if an attempt is made to copy different parameters to destination. Update documentation. If key type is not initialised return missing parameters RT#4149 Reviewed-by: Richard Levitte <levitte@openssl.org>
* return error in ct_move_scts()Dr. Stephen Henson2016-05-311-1/+1
| | | | Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
* Travis: update sanitizer configsEmilia Kasper2016-05-301-4/+4
| | | | | | | | | - Use the new enable-ubsan and enable-asan configuration options. - Separate ubsan and asan runs. - In addition, run shared ubsan tests to get more coverage. (Shared asan tests need a bit more thought to get them working.) Reviewed-by: Rich Salz <rsalz@openssl.org>
* Fix strdup macro redefinitionMat2016-05-301-1/+3
| | | | | | | | This fixes the following error when the CRT debug heap (crtdbg.h) is used: e_os.h(476): warning C4005: 'strdup': macro redefinition C:\Program Files (x86)\Windows Kits\10\Include\10.0.10586.0\ucrt\crtdbg.h(319): note: see previous definition of 'strdup' Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1137)
* perl: use the 'if' module to conditionally load File::GlobRichard Levitte2016-05-305-15/+5
| | | | | | | Trying to use normal perl conditions to conditionally 'use' a perl module didn't quite work. Using the 'if' module to do so does work. Reviewed-by: Andy Polyakov <appro@openssl.org>
* Make sure max in fmtstr() doesn't overflow into negativityRichard Levitte2016-05-301-2/+10
| | | | Reviewed-by: Matt Caswell <matt@openssl.org>
* set RAND_event and RAND_screen to deprecated in 1.1.0 in librypto.numJoey Yandle2016-05-291-2/+2
| | | | | | Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1079)
* fix deprecation version number in docsJoey Yandle2016-05-291-1/+1
| | | | | | Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1079)
* update docs with descriptions and deprecationJoey Yandle2016-05-291-0/+9
| | | | | | Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1079)
* fix return value in docsJoey Yandle2016-05-291-1/+1
| | | | | | Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1079)
* add removed functions back as deprecatedJoey Yandle2016-05-294-1/+34
| | | | | | Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1079)