- Jun 06, 2000
-
-
Ulf Möller authored
-
- Jun 05, 2000
-
-
Andy Polyakov authored
Submitted by: Reviewed by: PR:
-
Bodo Möller authored
-
- Jun 04, 2000
-
-
Richard Levitte authored
4.1.4 uses libiberty to define strtoul and strerror.
-
Richard Levitte authored
needed, or size_t won't be defined on SunOS 4.1.4.
-
Richard Levitte authored
-
- Jun 03, 2000
-
-
Ulf Möller authored
Submitted by: John Jarvie <jjarvie@newsguy.com>
-
Ulf Möller authored
-
Ben Laurie authored
-
- Jun 01, 2000
-
-
Richard Levitte authored
like Malloc, Realloc and especially Free conflict with already existing names on some operating systems or other packages. That is reason enough to change the names of the OpenSSL memory allocation macros to something that has a better chance of being unique, like prepending them with OPENSSL_. This change includes all the name changes needed throughout all C files.
-
Ulf Möller authored
-
Ulf Möller authored
-
Richard Levitte authored
-
Ulf Möller authored
Submitted by: Karsten Spang <ks@bellesystems.com>
-
Richard Levitte authored
Contributed by Yoichiro Okabe <okabe@wizsoft.co.jp>
-
Geoff Thorpe authored
libeay.num and ssleay.num.
-
Geoff Thorpe authored
structures and functions for each stack type. The previous behaviour can be enabled by configuring with the "-DDEBUG_SAFESTACK" option. This will also cause "make update" (mkdef.pl in particular) to update the libeay.num and ssleay.num symbol tables with the number of extra functions DEBUG_SAFESTACK creates. The way this change works is to accompany each DECLARE_STACK_OF() macro with a set of "#define"d versions of the sk_##type##_*** functions that ensures all the existing "type-safe" stack calls are precompiled into the underlying stack calls. The presence or abscence of the DEBUG_SAFESTACK symbol controls whether this block of "#define"s or the DECLARE_STACK_OF() macro is taking effect. The block of "#define"s is in turn generated and maintained by a perl script (util/mkstack.pl) that encompasses the block with delimiting C comments. This works in a similar way to the auto-generated error codes and, like the other such maintenance ut...
-
Geoff Thorpe authored
yet tighter, and also put some heat on the rest of the library by insisting (correctly) that compare callbacks used in stacks are prototyped with "const" parameters. This has led to a depth-first explosion of compiler warnings in the code where 1 constification has led to 3 or 4 more. Fortunately these have all been resolved to completion and the code seems cleaner as a result - in particular many of the _cmp() functions should have been prototyped with "const"s, and now are. There was one little problem however; X509_cmp() should by rights compare "const X509 *" pointers, and it is now declared as such. However, it's internal workings can involve recalculating hash values and extensions if they have not already been setup. Someone with a more intricate understanding of the flow control of X509 might be able to tighten this up, but for now - this seemed the obvious place to stop the "depth-first" constification of the code by using an evil cast (they have migrated all the way here from safestack.h). Fortunately, this is the only place in the code where this was required to complete these type-safety changes, and it's reasonably clear and commented, and seemed the least unacceptable of the options. Trying to take the constification further ends up exploding out considerably, and indeed leads directly into generalised ASN functions which are not likely to cooperate well with this.
-
Geoff Thorpe authored
same one). However, the first will temporarily break things until the second comes through. :-) The safestack.h handling was mapping compare callbacks that externally are of the type (int (*)(type **,type **)) into the underlying callback type used by stack.[ch], which is (int (*)(void *,void *)). After some degree of digging, it appears that the callback type in the underlying stack code should use double pointers too - when the compare operations are invoked (from sk_find and sk_sort), they are being used by bsearch and qsort to compare two pointers to pointers. This change corrects the prototyping (by only casting to the (void*,void*) form at the moment it is needed by bsearch and qsort) and makes the mapping in safestack.h more transparent. It also changes from "void*" to "char*" to stay in keeping with stack.[ch]'s assumed base type of "char". Also - the "const" situation was that safestack.h was throwing away "const"s, and to compound the problem - a close examination of stack.c showed that (const char **) is not really achieving what it is supposed to when the callback is being invoked, what is needed is (const char * const *). So the underlying stack.[ch] and the mapping macros in safestack.h have all been altered to correct this. What will follow are the vast quantities of "const" corrections required in stack-dependant code that was being let "slip" through when safestack.h was discarding "const"s. These now all come up as compiler warnings.
-
Ulf Möller authored
-
- May 31, 2000
-
-
Bodo Möller authored
-
Bodo Möller authored
-
Ulf Möller authored
-
Ulf Möller authored
-
Richard Levitte authored
-
Richard Levitte authored
-
Geoff Thorpe authored
which is a cast between NULL and a function pointer.
-
Geoff Thorpe authored
Also, add in a couple of missing declarations in pkcs7 code.
-
Richard Levitte authored
Contributed by Jeremy Norris <jeremy.norris@rebel.com>
-
Bodo Möller authored
-
Bodo Möller authored
not defined, but __SVR4 is.
-
Geoff Thorpe authored
cast their type-specific STACK into a real STACK and call the underlying sk_*** function. The problem is that if the STACK_OF(..) parameter being passed in has a "const *" qualifier, it is discarded by the cast. I'm currently implementing a fix for this but in the mean-time, this is one case I noticed (a few type-specific sk_**_num() functions pass in const type-specific stacks). If there are other errors in the code where consts are being discarded, we will similarly not notice them. yuck.
-
Bodo Möller authored
They have nothing to do with the particular PRNG (md_rand.c).
-
Bodo Möller authored
-
- May 30, 2000
-
-
Bodo Möller authored
-
Dr. Stephen Henson authored
More EVP cipher revision. Change EVP_SealInit() and EVP_OpenInit() to handle cipher parameters. Make it possible to set RC2 and RC5 params. Make RC2 ASN1 code use the effective key bits and not the key length. TODO: document how new API works.
-
Geoff Thorpe authored
Also, corrects the linux-elf-arm config string, it was previously setting $des_obj = dlfcn :-)
-
Richard Levitte authored
-
Dr. Stephen Henson authored
Declare ciphers in terms of macros. This reduces the amount of code and places each block cipher EVP definition in a single file instead of being spread over 4 files.
-
Dr. Stephen Henson authored
Declare ciphers in terms of macros. This reduces the amount of code and places each block cipher EVP definition in a single file instead of being spread over 4 files.
-