summaryrefslogtreecommitdiffstats
path: root/lib/libssl/src/apps/req.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Move openssl(1) from /usr/sbin/openssl to /usr/bin/openssl, since it is notjsing2014-08-261-1602/+0
| | | | | | | | a system/superuser binary. At the same time, move the source code from its current lib/libssl/src/apps location to a more appropriate home under usr.bin/openssl. ok deraadt@ miod@
* whitespacederaadt2014-07-141-17/+17
|
* unifdef a whole bunch of NO RSA/DSA/ECDH defines i deleted from libssltedu2014-07-091-11/+1
|
* Use strtonum() instead of atoi(), and then impose what are we thinkderaadt2014-06-281-5/+21
| | | | | | are the current range checks. Help from millert and lteo. Please test now that it is deployed and let us know if any numbers are off.. ok lteo
* tags as requested by miod and teduderaadt2014-06-121-1/+1
|
* Stop pretending that openssl(1) applications support the -rand option.jsing2014-06-021-9/+0
| | | | | | | | | | | | The underlying code has long been removed, making this a no-op. If your random subsystem actually requires that you seed it from a file, then you really should go and buy a new random subsystem that was built after 1990. Diff from Brent Cook. ok deraadt@
* Calling signal once to ignore SIGPIPE is sufficient - we do not need to dojsing2014-05-231-1/+0
| | | | | | this again in each app. ok miod@
* It is perfectly valid to call free(NULL), so stop checking for non-NULLjsing2014-05-191-2/+1
| | | | before calling free - of some course parts of the code already did this.
* Group and sort includes.jsing2014-05-181-9/+13
| | | | | | | | Currently "apps.h" needs to be included before any of the openssl headers and there are several cases where the code depends on headers that are included by something included by apps.h... More untangling saved for later on.
* bio_err is initialised in main, hence there is no need to initialise itjsing2014-05-181-4/+0
| | | | | | | | | | | | in each application (since there is no longer a non-monolithic mode). In typical OpenSSL fashion, the code is inconsistent and there are multiple ways that bio_err was initialised - none of them actually checked to see if the initialisation actually succeeded. Additionally, it is worth noting that in at least two cases bio_err was also being used before it would have been initialised. ok miod@
* unifdef -U LINTjsing2014-04-241-3/+0
|
* When OPENSSL_C is not defined, apps_startup becomes ajsing2014-04-241-2/+2
| | | | | | | signal(SIGPIPE, SIG_IGN) and apps_shutdown is a no-op. So just do that instead. ok beck@
* Nuke the last of the windows related defines from the openssl apps.jsing2014-04-221-3/+0
| | | | ok deraadt@
* truncation check some snprintf calls (over-cautiously in case)deraadt2014-04-191-12/+47
| | | | ok jsing beck
* We'll interpret a (void) cast on snprintf() to mean it's been verified thatguenther2014-04-191-6/+6
| | | | | | truncation is either desirable, not an issue, or is detected and handled later ok deraadt@
* use intrinsic strlcpy and strlcat everywhere so we only have one set ofbeck2014-04-191-8/+8
| | | | | | funcitons to check for incorrect use. keep BUF_strlcpy and BUF_strlcat for API comptibility only. ok tedu@
* $HOME/.rnd will never be a good source of entropy. ok becktedu2014-04-181-14/+0
|
* whitespace normalizationtedu2014-04-181-24/+22
|
* Remove MAIN and PROG defines now that we do not compile non-monolithic.jsing2014-04-181-4/+2
| | | | ok tedu@
* KaboomNFtedu2014-04-181-1069/+876
|
* Make MONOLITH the default and only optionmatthew2014-04-171-23/+0
| | | | ok deraadt
* oops, exit vs return; spotted by matthewderaadt2014-04-171-1/+1
|
* since we're replacing LIST_SEPARATOR_CHAR with ':', no point using %csthen2014-04-171-1/+1
| | | | in the help printf
* Mostly gut e_os.h:deraadt2014-04-171-2/+2
| | | | | | | | USE_SOCKETS is unrelated to using sockets, but just pulls in .h files. It makes every file buy a kitchen sink, because 11 files forgot to. EXIT() is really exit(), a gentle surprise but... OPENSSL_EXIT() is really just return(), because noone compiles the openssl command non-monolithic anymore
* Change library to use intrinsic memory allocation functions instead ofbeck2014-04-171-4/+4
| | | | | | | | OPENSSL_foo wrappers. This changes: OPENSSL_malloc->malloc OPENSSL_free->free OPENSSL_relloc->realloc OPENSSL_freeFunc->free
* spray the apps directory with anti-VMS napalm.tedu2014-04-161-12/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | so that its lovecraftian horror is not forever lost, i reproduce below a comment from the deleted code. /* 2011-03-22 SMS. * If we have 32-bit pointers everywhere, then we're safe, and * we bypass this mess, as on non-VMS systems. (See ARGV, * above.) * Problem 1: Compaq/HP C before V7.3 always used 32-bit * pointers for argv[]. * Fix 1: For a 32-bit argv[], when we're using 64-bit pointers * everywhere else, we always allocate and use a 64-bit * duplicate of argv[]. * Problem 2: Compaq/HP C V7.3 (Alpha, IA64) before ECO1 failed * to NULL-terminate a 64-bit argv[]. (As this was written, the * compiler ECO was available only on IA64.) * Fix 2: Unless advised not to (VMS_TRUST_ARGV), we test a * 64-bit argv[argc] for NULL, and, if necessary, use a * (properly) NULL-terminated (64-bit) duplicate of argv[]. * The same code is used in either case to duplicate argv[]. * Some of these decisions could be handled in preprocessing, * but the code tends to get even uglier, and the penalty for * deciding at compile- or run-time is tiny. */
* remove BIO_snprintf usage - convert to snprintf.beck2014-04-151-7/+8
| | | | | | Interestingly this fixes a bug, as the code appears to have been assuming that BIO_snprintf returns what snprintf does when it does not. ok tedu@
* Send the rotIBM stream cipher (ebcdic) to Valhalla to party for eternitybeck2014-04-151-14/+0
| | | | | with the bearded ones... some API's that nobody should be using will dissapear with this commit.
* Part 1 of eliminating BIO_snprintf(). This fixes mechanical conversionsbeck2014-04-151-4/+4
| | | | | where the return value is ignored changing to (void) snprintf. ok deraadt@
* remove more cases of MS_STATIC, MS_CALLBACK, and MS_FAR. Did youderaadt2014-04-131-1/+1
| | | | | | | know that MS_STATIC doesn't mean it is static? How far can lies and half-truths be layered? I wonder if anyone got fooled, and actually returned a pointer.. ok beck
* Merge conflicts; remove MacOS, Netware, OS/2, VMS and Windows build machinery.miod2014-04-131-6/+7
|
* resolve conflictsdjm2012-10-131-4/+82
|
* resolve conflicts, fix local changesdjm2010-10-011-215/+288
|
* resolve conflictsdjm2008-09-061-51/+172
|
* resolve conflictsdjm2005-04-291-6/+18
|
* merge 0.9.7dmarkus2004-04-081-17/+17
|
* merge 0.9.7b with local changes; crank majors for libssl/libcryptomarkus2003-05-121-17/+40
|
* more strcpy & sprintf murder; ho okderaadt2003-04-041-19/+19
|
* merge with openssl-0.9.7-stable-SNAP-20020911,markus2002-09-141-5/+11
| | | | | new minor for libcrypto (_X509_REQ_print_ex) tested by miod@, pb@
* Merge openssl-0.9.7-stable-SNAP-20020519beck2002-05-211-108/+6
|
* OpenSSL 0.9.7 stable 2002 05 08 mergebeck2002-05-151-207/+498
|
* openssl-engine-0.9.6a mergebeck2001-06-221-5/+4
|
* openssl-engine-0.9.6 mergebeck2000-12-151-36/+91
|
* OpenSSL 0.9.5a mergebeck2000-04-151-2/+2
|
* OpenSSL 0.9.5 mergebeck2000-03-191-164/+247
| | | | | | *warning* this bumps shared lib minors for libssl and libcrypto from 2.1 to 2.2 if you are using the ssl26 packages for ssh and other things to work you will need to get new ones (see ~beck/libsslsnap/<arch>) on cvs or ~beck/src-patent.tar.gz on cvs
* OpenSSL 0.9.4 mergebeck1999-09-291-131/+191
|
* Import of SSLeay-0.9.0b with RSA and IDEA stubbed + OpenBSD buildryker1998-10-051-0/+1137
functionality for shared libs. Note that routines such as sslv2_init and friends that use RSA will not work due to lack of RSA in this library. Needs documentation and help from ports for easy upgrade to full functionality where legally possible.