Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/mono/boringssl.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2015-01-06Fix a couple of minor compiler warnings.Adam Langley
One about a possible uninitialised variable (incorrect, but it's easier to keep the compiler happy) and one warning about "const static" being backwards. Change-Id: Ic5976a5f0b48f32e09682e31b65d8ea1c27e5b88 Reviewed-on: https://boringssl-review.googlesource.com/2632 Reviewed-by: David Benjamin <davidben@chromium.org> Reviewed-by: Adam Langley <agl@google.com>
2014-11-06Fix error handling in X509_PURPOSE_add and X509_TRUST_add.David Benjamin
Two leaks can happen: if idx is -1, the newly allocated entry may not be freed. Also, for X509_PURPOSE_add, if only one BUF_strdup succeeds, it will leak. Restructure both so that the allocations happen ahead of time and are properly cleaned up. This avoids leaving an existing entry in a half-broken state. Found (sort of) by scan-build; because of all the indirections and DYNAMIC flags, it doesn't actually realize the leak's been fixed. Change-Id: I5521889bd14e007b3f62b6a4906d7c346698b48c Reviewed-on: https://boringssl-review.googlesource.com/2209 Reviewed-by: Adam Langley <agl@google.com>
2014-11-06Fix leak in X509V3_EXT_add on error.David Benjamin
If it fails to be added to the list, the input should be freed. Found (sort of) by scan-build; because of all the indirections and DYNAMIC flags, it doesn't actually realize the leak's been fixed. Change-Id: Idca10964e1ffb2ace1cea7f88d94693205d70d5b Reviewed-on: https://boringssl-review.googlesource.com/2208 Reviewed-by: Adam Langley <agl@google.com>
2014-10-30Fix standalone bio_test and v3name_test on Win64.David Benjamin
Win32 still has assembly issues and bssl wants to select() on both sockets and stdin (doesn't work on Windows). But this is a start. Change-Id: Iafc5215be281aed836c5ac2dc8b379399848a2c2 Reviewed-on: https://boringssl-review.googlesource.com/2090 Reviewed-by: Adam Langley <agl@google.com>
2014-09-12Add a CRYPTO_library_init and static-initializer-less build option.David Benjamin
Chromium does not like static initializers, and the CPU logic uses one to initialize CPU bits. However, the crypto library lacks an explicit initialization function, which could complicate (no compile-time errors) porting existing code which uses crypto/, but not ssl/. Add an explicit CRYPTO_library_init function, but make it a no-op by default. It only does anything (and is required) if building with BORINGSSL_NO_STATIC_INITIALIZER. Change-Id: I6933bdc3447fb382b1f87c788e5b8142d6f3fe39 Reviewed-on: https://boringssl-review.googlesource.com/1770 Reviewed-by: Adam Langley <agl@google.com>
2014-08-28unifdef a bunch of OPENSSL_NO_* ifdefs.David Benjamin
Get all this stuff out of the way. - OPENSSL_NO_MD5 - OPENSSL_NO_SHA - OPENSSL_NO_EC - OPENSSL_NO_ECDSA - OPENSSL_NO_ECDH - OPENSSL_NO_NEXTPROTONEG - OPENSSL_NO_DH - OPENSSL_NO_SSL3 - OPENSSL_NO_RC4 - OPENSSL_NO_RSA Also manually removed a couple instances of OPENSSL_NO_DSA that seemed to be confused anyway. Did some minor manual cleanup. (Removed a few now-pointless 'if (0)'s.) Change-Id: Id540ba97ee22ff2309ab20ceb24c7eabe766d4c4 Reviewed-on: https://boringssl-review.googlesource.com/1662 Reviewed-by: Adam Langley <agl@google.com>
2014-08-21Convert all zero-argument functions to '(void)'David Benjamin
Otherwise, in C, it becomes a K&R function declaration which doesn't actually type-check the number of arguments. Change-Id: I0731a9fefca46fb1c266bfb1c33d464cf451a22e Reviewed-on: https://boringssl-review.googlesource.com/1582 Reviewed-by: Adam Langley <agl@google.com>
2014-08-07Add X509_up_ref and use it internally.David Benjamin
Avoid needing to manually increment the reference count and using the right lock, both here and in Chromium. Change-Id: If116ebc224cfb1c4711f7e2c06f1fd2c97af21dd Reviewed-on: https://boringssl-review.googlesource.com/1415 Reviewed-by: Adam Langley <agl@google.com>
2014-07-15Move public headers to include/openssl/Adam Langley
Previously, public headers lived next to the respective code and there were symlinks from include/openssl to them. This doesn't work on Windows. This change moves the headers to live in include/openssl. In cases where some symlinks pointed to the same header, I've added a file that just includes the intended target. These cases are all for backwards-compat. Change-Id: I6e285b74caf621c644b5168a4877db226b07fd92 Reviewed-on: https://boringssl-review.googlesource.com/1180 Reviewed-by: David Benjamin <davidben@chromium.org> Reviewed-by: Adam Langley <agl@google.com>
2014-07-07Remove CHARSET_EBCDICAlex Chernyakhovsky
Since crypto/ebcdic.{c,h} are not present in BoringSSL, remove the #ifdefs Changes were made by running find . -type f -name *.c | xargs unifdef -m -U CHARSET_EBCDIC find . -type f -name *.h | xargs unifdef -m -U CHARSET_EBCDIC using unifdef 2.10. An additional two ifdefs (CHARSET_EBCDIC_not) were removed manually. Change-Id: Ie174bb00782cc44c63b0f9fab69619b3a9f66d42 Reviewed-on: https://boringssl-review.googlesource.com/1093 Reviewed-by: Adam Langley <agl@google.com>
2014-06-21Add OPENSSL_str[n]casecmpAdam Langley
Windows has different names for these functions and also doesn't have the strings.h header in which they appear. This change adds tiny wrapper functions for Windows.
2014-06-21Enforce _X509_CHECK_FLAG_DOT_SUBDOMAINS internal-onlyAdam Langley
(Imported from upstream's cfbc10fb327cf8535d6e9b402d1d03140d23d753)
2014-06-21Client-side namecheck wildcards.Adam Langley
A client reference identity of ".example.com" matches a server certificate presented identity that is any sub-domain of "example.com" (e.g. "www.sub.example.com). With the X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS flag, it matches only direct child sub-domains (e.g. "www.sub.example.com"). (cherry picked from commit e52c52f10bb8e34aaf8f28f3e5b56939e8f6b357) (Imported from upstream's 3cc8a3f2343cda796de90c127b9e907ca3ec2da5)
2014-06-21Fixes to host checking.Adam Langley
Fixes to host checking wild card support and add support for setting host checking flags when verifying a certificate chain. (Imported from upstream's a2219f6be36d12f02b6420dd95f819cf364baf1d)
2014-06-21Extension checking fixes.Adam Langley
When looking for an extension we need to set the last found position to -1 to properly search all extensions. PR#3309 (Imported from upstream's 5cd5e0219d2e9a8c1f2fec3d867f38179c3a86af)
2014-06-21Include self-signed flag in certificates.Adam Langley
Include self-signed flag in certificates by checking SKID/AKID as well as issuer and subject names. Although this is an incompatible change it should have little impact in pratice because self-issued certificates that are not self-signed are rarely encountered. (Imported from upstream's c00f8d697aed17edbd002e2f6c989d8fbd7c4ecf)
2014-06-21Add extension free function.Adam Langley
(Imported from upstream's 984a30423d70126ed1df30e4b52962398cdaa9b6.)
2014-06-21Const correctness.Adam Langley
This change fixes a number of build warnings.
2014-06-21Inital import.Adam Langley
Initial fork from f2d678e6e89b6508147086610e985d4e8416e867 (1.0.2 beta). (This change contains substantial changes from the original and effectively starts a new history.)