openssl/demos
Rich Salz b4faea50c3 Use safer sizeof variant in malloc
For a local variable:
        TYPE *p;
Allocations like this are "risky":
        p = OPENSSL_malloc(sizeof(TYPE));
if the type of p changes, and the malloc call isn't updated, you
could get memory corruption.  Instead do this:
        p = OPENSSL_malloc(sizeof(*p));
Also fixed a few memset() calls that I noticed while doing this.

Reviewed-by: Richard Levitte <levitte@openssl.org>
2015-05-04 15:00:13 -04:00
..
asn1 Run util/openssl-format-source -v -c . 2015-01-22 09:20:09 +00:00
bio Remove goto inside an if(0) block 2015-05-01 14:29:48 -04:00
certs
cms free NULL cleanup -- coda 2015-05-01 14:37:16 -04:00
easy_tls free NULL cleanup 5a 2015-04-30 17:33:59 -04:00
engines free NULL cleanup -- coda 2015-05-01 14:37:16 -04:00
err Run util/openssl-format-source -v -c . 2015-01-22 09:20:09 +00:00
evp Dead code cleanup: crypto/*.c, x509v3, demos 2015-02-02 11:08:16 -05:00
pkcs12 Run util/openssl-format-source -v -c . 2015-01-22 09:20:09 +00:00
prime Run util/openssl-format-source -v -c . 2015-01-22 09:20:09 +00:00
sign Run util/openssl-format-source -v -c . 2015-01-22 09:20:09 +00:00
smime free NULL cleanup 5a 2015-04-30 17:33:59 -04:00
ssl Remove SSLv2 support 2014-12-04 11:55:03 +01:00
ssltest-ecc
state_machine Use safer sizeof variant in malloc 2015-05-04 15:00:13 -04:00
x509 Run util/openssl-format-source -v -c . 2015-01-22 09:20:09 +00:00
b64.c free null cleanup finale 2015-05-01 10:02:07 -04:00
b64.pl
privkey.pem
README
selfsign.c Dead code cleanup: crypto/*.c, x509v3, demos 2015-02-02 11:08:16 -05:00
spkigen.c free NULL cleanup 5a 2015-04-30 17:33:59 -04:00

NOTE: Don't expect any of these programs to work with current
OpenSSL releases, or even with later SSLeay releases.

Original README:
=============================================================================

Some demo programs sent to me by various people

eric