summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* Remove now unused ripemd i386 assembly.jsing2024-03-281-591/+0
|
* Stop building the assembly implementation of des and ripemd on i386.jsing2024-03-281-6/+2
| | | | | | | | This is the only architecture that has an assembly implementation for these algorithms. There is little to gain from accelerating legacy algorithms on a legacy architecture. Discussed with beck@ and tb@
* Consolidate most of the AES modes into a single C file.jsing2024-03-286-293/+70
| | | | Discussed with tb@
* PKCS#1.5 PBE: test and assigntb2024-03-281-3/+2
|
* Stop pandering to the loadbalancer industrial complex.beck2024-03-281-17/+3
| | | | | | | | | | | | | | | | | So we initially kept this hack around for f5 boxes that should have been patched in 2014, and were not as of 2017. The f5 article for the bug archived on their web site, and any of these devices on the public internet will have since been upgraded to deal with a host of record layer, TLS, and other bugs, or they likely won't be talking to modern stacks, since as of this point the software with the bug would not have been updated in 10 years. So just make this spec compliant and reject a supported groups extension that should not have been sent by a server. ok tb@ jsing@
* fix leaks in the horrible ssl whackery necessary for this test.beck2024-03-271-4/+5
| | | | ok tb@
* Fix up server processing of key shares.beck2024-03-272-13/+173
| | | | | | | | | | | | | | | | | | | Ensure that the client can not provide a duplicate key share for any group, or send more key shares than groups they support. Ensure that the key shares must be provided in the same order as the client preference order specified in supported_groups. Ensure we only will choose to use a key share that is for the most preferred group by the client that we also support, to avoid the client being downgraded by sending a less preferred key share. If we do not end up with a key share for the most preferred mutually supported group, will then do a hello retry request selecting that group. Add regress for this to regress/tlsext/tlsexttest.c ok jsing@
* Remove unused rc4 parisc assembly.jsing2024-03-272-299/+1
| | | | This is already disabled since it is "about 35% slower than C code".
* Catch the blowfish that escaped.jsing2024-03-271-2/+2
|
* Consolidate rc4 code.jsing2024-03-2712-119/+50
| | | | Discussed with tb@
* Remove assembly for stitched modes.jsing2024-03-273-1756/+1
| | | | | The stitched modes have been removed, so having assembly for them is of little use.
* Remove empty rc4_local.h include.jsing2024-03-273-10/+2
| | | | Discussed with tb@
* Remove private_RC4_set_key() from the public rc4.h header.jsing2024-03-271-2/+1
| | | | This does not exist in libcrypto.
* Unifdef BF_PTR2.jsing2024-03-272-95/+4
| | | | | | This removes the unused Intel special version of BF_ENC(). ok tb@
* Remove unused c2l/c2ln/l2c/l2cn macros.jsing2024-03-271-47/+3
|
* Consolidate blowfish code.jsing2024-03-276-639/+381
| | | | Requested by tb@
* Replace GETU32 and PUTU32.jsing2024-03-272-29/+26
| | | | | | | | Replace GETU32 with crypto_load_be32toh() and PUTU32 with crypto_store_htobe32(). Make the offset handling cleaner at the same time. ok beck@ joshua@ tb@
* Remove now unused files.jsing2024-03-272-274/+0
|
* Move bf_enc.c to the primary Makefile.jsing2024-03-2712-34/+12
| | | | | Now that all architectures are using bf_enc.c, it does not make sense to have it in every Makefile.inc file.
* Stop building the assembly implementation of blowfish on i386.jsing2024-03-271-3/+2
| | | | | | | | This is the only architecture that has an assembly implementation. There is little to gain from accelerating a legacy algorithm on a legacy architecture. ok beck@ tb@
* Do not allow duplicate groups in supported groups.beck2024-03-271-18/+39
| | | | | | While we are here refactor this to single return. ok jsing@ tb@
* Remove near duplicate AES_set_{encrypt,decrypt}_key() functions.jsing2024-03-271-208/+2
| | | | | | | | | | | | | | | There are currently three ways in which AES is implemented - all in assembly (amd64 et al), all in C (aarch64 et al) and, half in C and half in assembly (hppa and sparc64). The last of these cases currently makes use of a near duplicate AES_set_{encrypt,decrypt}_key() implementation that avoids using the AES tables. Remove the near duplicate version and if only a half assembly version is implemented, use the same C version of AES_set_{encrypt,decrypt}_key() as everyone else. This adds around 8KB of rodata to libcrypto on these two platforms. Discussed with beck and tb.
* Explain the weird copy dance in EVP_DigestSignFinal()tb2024-03-271-2/+3
| | | | with jsing
* Add TLS_ERROR_INVALID_ARGUMENT error code to libtlsjoshua2024-03-273-12/+15
| | | | | | | This is an initial pass, defining the error code and using it for "too long"/length-related errors. ok beck jsing
* Fix whitespacetb2024-03-271-2/+2
|
* Use crypto_rol_u32() instead of an undefined ROTATE macro.jsing2024-03-271-9/+5
| | | | ok tb@
* Unify up_ref implementations in libssltb2024-03-272-8/+5
| | | | ok jsing
* Remove unused NDEBUG define.jsing2024-03-271-7/+1
|
* Tidy includes and a comment.jsing2024-03-271-3/+7
|
* Remove rather scary unused experimental code.jsing2024-03-271-1081/+0
| | | | ok tb@
* Clean up use of EVP_MD_CTX_{legacy_clear,cleanup} injoshua2024-03-271-18/+24
| | | | | | | | | EVP_DigestSignFinal Additionally, this cleans up some more surrounding code. This is a fixed version of r1.21. ok tb
* Demacro md4.jsing2024-03-271-100/+84
| | | | | | | Use static inline functions instead of macros. Also number rounds as per the RFC. ok joshua@ tb@
* Hide symbols in enginetb2024-03-273-1/+87
| | | | ok jsing
* Recommit r1.20joshua2024-03-271-27/+31
| | | | ok tb jsing
* Revert to r1.19 while we track down a bug in the last two commits.jsing2024-03-271-38/+29
|
* Clean up use of EVP_MD_CTX_{legacy_clear,cleanup} injoshua2024-03-271-17/+22
| | | | | | | | EVP_DigestSignFinal Additionally, this cleans up some more surrounding code. ok tB
* Use dsa for DSA and dh for DHtb2024-03-271-88/+90
| | | | | This unifies variable names and does some other cleanup. Only change in generated assembly is line number changes.
* Use dh for DH function arguments.tb2024-03-271-25/+23
| | | | No need for a variety of r, d, ...
* Unify *_up_ref() implementationstb2024-03-276-19/+12
| | | | | | No need for an inconsistently named local variable and a ternary operator. ok jsing
* Remove superfluous parentheses in X509_REQ setterstb2024-03-261-10/+10
| | | | No change in generated assembly
* Cosmetics, mostly removal of silly parenthesestb2024-03-261-21/+19
| | | | No change in generated assembly
* Drop superfluous parentheses in X509_set_version()tb2024-03-261-5/+5
|
* Tweak versions comment for CRLstb2024-03-261-1/+2
|
* piuid and psuid have annoyed me for long enoughtb2024-03-261-7/+7
|
* x509 trust: remove unneeded headerstb2024-03-261-3/+1
|
* Rework input and output handling for sha1.jsing2024-03-261-128/+79
| | | | | | | | Use be32toh(), htobe32() and crypto_{load,store}_htobe32() as appropriate. Also use the same while() loop that is used for other hash functions. ok joshua@ tb@
* Inline initial values.jsing2024-03-261-11/+8
| | | | No functional change.
* Rework input and output handling for md4.jsing2024-03-261-55/+61
| | | | | | Use le32toh(), htole32() and crypto_{load,store}_htole32() as appropriate. ok joshua@ tb@
* Simplify HMAC_CTX_new()joshua2024-03-261-9/+2
| | | | | | | There is no need to call HMAC_CTX_init() as the memory has already been initialised to zero. ok tb
* Clean up EVP_DigestSignFinaljoshua2024-03-261-27/+31
| | | | ok jsing tb