Aaron Thompson
6a6485a531
Remove unnecessary forward declarations.
2020-04-20 11:40:41 +02:00
Ondřej Surý
3178974f0c
Use the new sorting rules to regroup #include headers
2020-03-09 16:19:22 +01:00
Ondřej Surý
5777c44ad0
Reformat using the new rules
2020-02-14 09:31:05 +01:00
Evan Hunt
e851ed0bb5
apply the modified style
2020-02-13 15:05:06 -08:00
Ondřej Surý
056e133c4c
Use clang-tidy to add curly braces around one-line statements
...
The command used to reformat the files in this commit was:
./util/run-clang-tidy \
-clang-tidy-binary clang-tidy-11
-clang-apply-replacements-binary clang-apply-replacements-11 \
-checks=-*,readability-braces-around-statements \
-j 9 \
-fix \
-format \
-style=file \
-quiet
clang-format -i --style=format $(git ls-files '*.c' '*.h')
uncrustify -c .uncrustify.cfg --replace --no-backup $(git ls-files '*.c' '*.h')
clang-format -i --style=format $(git ls-files '*.c' '*.h')
2020-02-13 22:07:21 +01:00
Ondřej Surý
f50b1e0685
Use clang-format to reformat the source files
2020-02-12 15:04:17 +01:00
Ondřej Surý
a0d3614a60
Remove randomly scattered additional style check suppressions that caused unmatchedSuppression
2019-10-03 09:04:27 +02:00
Ondřej Surý
288f5a4b52
Various little fixes found by coccinelle
...
The coccinellery repository provides many little semantic patches to fix common
problems in the code. The number of semantic patches in the coccinellery
repository is high and most of the semantic patches apply only for Linux, so it
doesn't make sense to run them on regular basis as the processing takes a lot of
time.
The list of issue found in BIND 9, by no means complete, includes:
- double assignment to a variable
- `continue` at the end of the loop
- double checks for `NULL`
- useless checks for `NULL` (cannot be `NULL`, because of earlier return)
- using `0` instead of `NULL`
- useless extra condition (`if (foo) return; if (!foo) { ...; }`)
- removing & in front of static functions passed as arguments
2019-10-01 16:48:55 +02:00
Mark Andrews
b59fe46e76
address or suppress cppcheck warnings
2019-09-12 17:59:28 +10:00
Ondřej Surý
ae83801e2b
Remove blocks checking whether isc_mem_get() failed using the coccinelle
2019-07-23 15:32:35 -04:00
Ondřej Surý
78d0cb0a7d
Use coccinelle to remove explicit '#include <config.h>' from the source files
2019-03-08 15:15:05 +01:00
Evan Hunt
318b340f5e
convert query_test
...
- also fixed a bug in openssldh_link.c that turned up in the process
2018-11-14 20:17:04 -08:00
Ondřej Surý
994e656977
Replace custom isc_boolean_t with C standard bool type
2018-08-08 09:37:30 +02:00
Ondřej Surý
cb6a185c69
Replace custom isc_u?intNN_t types with C99 u?intNN_t types
2018-08-08 09:37:28 +02:00
Ondřej Surý
fc496b2b5d
Fix DH and ECDSA algorithms in PKCS#11 build
2018-07-19 14:00:40 -04:00
Ondřej Surý
c3b8130fe8
Make OpenSSL mandatory
2018-07-19 12:47:03 -04:00
Ondřej Surý
7ee8a7e69f
address win32 build issues
...
- Replace external -DOPENSSL/-DPKCS11CRYPTO with properly AC_DEFINEd
HAVE_OPENSSL/HAVE_PKCS11
- Don't enforce the crypto provider from platform.h, just from dst_api.c
and configure scripts
2018-05-22 16:32:21 -07:00
Ondřej Surý
55a10b7acd
Remove $Id markers, Principal Author and Reviewed tags from the full source tree
2018-05-11 13:17:46 +02:00
Ondřej Surý
61da2bf028
Remove support for OpenSSL < 1.0.0
2018-05-03 15:55:39 +02:00
Ondřej Surý
8bf192b4d1
Use BN_hex2bn instead of custom BN_fromhex function
2018-05-03 15:22:15 +02:00
Ondřej Surý
6b9e3b7b06
Workaround LibreSSL 2.7.0-2.7.2 quirk in DH_set0_key
2018-05-03 14:13:32 +02:00
Ondřej Surý
29ff62a149
Add support for LibreSSL 2.7
2018-05-03 14:13:20 +02:00
Petr Mensik
edaafacf36
Do not assign NULL conditionally in OpenSSL < 1.1, make it always explicit.
2018-04-04 17:28:55 +02:00
Evan Hunt
0fabe0da83
update file headers
2018-03-15 18:33:13 -07:00
Ondřej Surý
843d389661
Update license headers to not include years in copyright in all applicable files
2018-02-23 10:12:02 +01:00
Tinderbox User
ffbe6b9537
update copyright notice / whitespace
2017-09-19 23:46:23 +00:00
Mukund Sivaraman
d5707676e4
Don't use memset() to wipe memory ( #45947 )
2017-09-19 16:16:45 +05:30
Mark Andrews
3d38cfaf8a
add more LIBRESSL_VERSION_NUMBER checks
2016-11-01 12:24:22 +11:00
Tinderbox User
3bd20c8dd4
update copyright notice / whitespace
2016-10-30 23:46:10 +00:00
Mark Andrews
1fce0951ed
4497. [port] Add support for OpenSSL 1.1.0. [RT #41284 ]
2016-10-31 10:04:37 +11:00
Mark Andrews
8ee6f289d8
4450. [port] Provide more nuanced HSM support which better matches
...
the specific PKCS11 providers capabilities. [RT #42458 ]
2016-08-19 08:02:51 +10:00
Mark Andrews
0c27b3fe77
4401. [misc] Change LICENSE to MPL 2.0.
2016-06-27 14:56:38 +10:00
Mark Andrews
5b1c7ef35b
4264. [bug] Check const of strchr/strrchr assignments match
...
argument's const status. [RT #41150 ]
2015-11-20 18:38:24 +11:00
Mark Andrews
f824c65d1f
4340. [port] Fix LibreSSL compatibility. [RT #40977 ]
2015-10-19 10:43:58 +11:00
Evan Hunt
ce9f893e21
[master] address buffer accounting error
...
4168. [security] A buffer accounting error could trigger an
assertion failure when parsing certain malformed
DNSSEC keys. (CVE-2015-5722) [RT #40212 ]
2015-08-07 13:16:10 -07:00
Mark Andrews
e0fea0bf85
silence coverity warnings
2015-05-30 17:44:52 +10:00
Tinderbox User
431e5c81db
update copyright notice / whitespace
2015-05-28 23:45:24 +00:00
Mark Andrews
8bb630c751
4129. [port] Address API changes in OpenSSL 1.1.0. [RT #39532 ]
2015-05-28 14:41:21 +10:00
Mark Andrews
e53e202ef3
4128. [bug] Address issues raised by Coverity 7.6. [RT #39537 ]
2015-05-28 13:17:07 +10:00
Mark Andrews
58a1051e92
3974. [bug] handle DH_compute_key() failure correctly in
...
openssldh_link.c. [RT #37477 ]
2014-10-13 23:41:36 +11:00
Evan Hunt
3249da26fc
[master] rationalize external key handling
...
3723. [cleanup] Imported keys are now handled the same way
regardless of DNSSEC algorithm. [RT #35215 ]
2014-01-30 17:49:32 -08:00
Mark Andrews
e20788e121
update copyrights
2014-01-16 15:19:24 +11:00
Evan Hunt
ba751492fc
[master] native PKCS#11 support
...
3705. [func] "configure --enable-native-pkcs11" enables BIND
to use the PKCS#11 API for all cryptographic
functions, so that it can drive a hardware service
module directly without the need to use a modified
OpenSSL as intermediary (so long as the HSM's vendor
provides a complete-enough implementation of the
PKCS#11 interface). This has been tested successfully
with the Thales nShield HSM and with SoftHSMv2 from
the OpenDNSSEC project. [RT #29031 ]
2014-01-14 15:40:56 -08:00
Mark Andrews
2bdfb330af
update copyrights
2013-12-05 15:04:53 +11:00
Mark Andrews
c3c8823fed
3681. [port] Update the Windows build system to support feature
...
selection and WIN64 builds. This is a work in
progress. [RT #34160 ]
2013-12-04 12:47:23 +11:00
Mark Andrews
6eb6af6732
3354. [func] Improve OpenSSL error logging. [RT #29932 ]
2012-07-23 15:08:21 +10:00
Tinderbox User
ef1963d83d
update copyright notice
2012-06-15 23:45:49 +00:00
Mark Andrews
7865ea9545
3339. [func] Allow the maximum supported rsa exponent size to be specified: "max-rsa-exponent-size <value>;" [RT #29228 ]
2012-06-14 15:44:20 +10:00
Automatic Updater
135bcc2e42
update copyright notice
2011-01-11 23:47:14 +00:00
Mark Andrews
433e06a25c
3006. [func] Allow dynamically generated TSIG keys to be preserved
...
across restarts of named. Initially this is for
TSIG keys generated using GSSAPI. [RT #22639 ]
2011-01-10 05:32:04 +00:00