Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Remove BN_init() documentation | tb | 2023-04-25 | 1 | -40/+2 |
| | |||||
* | Remove BN_CTX_init() documentation | tb | 2023-04-25 | 1 | -23/+3 |
| | |||||
* | Remove the no longer used BN_MONT_CTX_init() | tb | 2023-04-25 | 2 | -15/+2 |
| | |||||
* | Remove a couple of temporary hacks | tb | 2023-04-25 | 2 | -17/+2 |
| | |||||
* | Move a few now internal prototypes to bn_local.h | tb | 2023-04-25 | 2 | -24/+17 |
| | |||||
* | Remove old BN_one/BN_zero compat stuff | tb | 2023-04-25 | 1 | -13/+1 |
| | | | | ok jsing | ||||
* | Remove X9.31 support | tb | 2023-04-25 | 7 | -493/+6 |
| | | | | ok jsing | ||||
* | Remove the no longer used BN_CTX_init() | tb | 2023-04-25 | 2 | -14/+2 |
| | | | | ok jsing | ||||
* | Bump LibreSSL version to 3.8.0 | tb | 2023-04-25 | 1 | -2/+2 |
| | |||||
* | Remove the nseq command | tb | 2023-04-25 | 4 | -211/+5 |
| | |||||
* | Document most command constants. | schwarze | 2023-04-25 | 1 | -2/+60 |
| | | | | | They are part of the public API, may be needed for implementing custom BIO types, and application programmers need to avoid clashing with them. | ||||
* | Update Wycheproof.go to exercise truncated SHA-2 and SHA-3 | tb | 2023-04-25 | 1 | -5/+27 |
| | |||||
* | Bump majors after symbol addition and removal | tb | 2023-04-25 | 3 | -6/+6 |
| | |||||
* | Update Symbols.list after symbol addition and removal | tb | 2023-04-25 | 1 | -134/+10 |
| | |||||
* | Comment out a few now unused files from Makefile | tb | 2023-04-25 | 1 | -14/+14 |
| | |||||
* | Use proper fix for the recent x400Address issue | tb | 2023-04-25 | 2 | -6/+4 |
| | | | | | | From David Benjamin (BoringSSL) ok beck | ||||
* | Temporarily define LIBRESSL_NEXT_API in opensslfeatures.h | tb | 2023-04-25 | 1 | -0/+2 |
| | |||||
* | Define OPENSSL_NO_DEPRECATED and OPENSSL_NO_EC2M in opensslfeatures.h | tb | 2023-04-25 | 1 | -0/+2 |
| | | | | ok beck jsing | ||||
* | Wire up truncated SHA-2, SHA-3 and related things | tb | 2023-04-25 | 5 | -7/+32 |
| | | | | from jsing | ||||
* | Remove no longer necessary compat #defines | tb | 2023-04-25 | 1 | -6/+1 |
| | |||||
* | Add NIDs for truncated SHA-2, SHA-3 and related things | tb | 2023-04-25 | 2 | -7/+72 |
| | | | | From jsing | ||||
* | bn_mod_exp: temporarily add a prototype for BN_mod_exp_recp() | tb | 2023-04-25 | 1 | -1/+4 |
| | |||||
* | bn_test: temporarily add prototypes for reciprocal functions | tb | 2023-04-25 | 1 | -1/+13 |
| | | | | This is a hack needed until bn_local.h is updated | ||||
* | bn_test: BN_one() will become void, so stop checking it | tb | 2023-04-25 | 1 | -8/+8 |
| | |||||
* | bn_primes: the NIST primes will go away, so remove their tests | tb | 2023-04-25 | 1 | -41/+1 |
| | |||||
* | The bio_asn1 test will need to be linked statically after the bump | tb | 2023-04-25 | 1 | -1/+3 |
| | |||||
* | Remove CTS test | tb | 2023-04-25 | 2 | -179/+0 |
| | |||||
* | CTS support will go away, so unhook corresponding regress | tb | 2023-04-25 | 1 | -2/+1 |
| | |||||
* | The #ifdef missed a few NETSCAPE_CERT things | tb | 2023-04-25 | 1 | -2/+2 |
| | |||||
* | Remove v3_sxnet from the standard extensions | tb | 2023-04-25 | 1 | -3/+2 |
| | |||||
* | Invalidate the DER cache earlier on in X509 setter functions | job | 2023-04-25 | 1 | -1/+8 |
| | | | | | | | Note that it is important to invalidate the cache before returning, as the return might bubble up an error. OK tb@ jsing@ | ||||
* | Use X509_set_version() and X509_REQ_set_version() instead doing it by hand | job | 2023-04-25 | 2 | -11/+4 |
| | | | | | | | A small side-effect in X509_to_X509_REQ() is that 'x->req_info->enc.modified' now earlier on is set to 1. OK tb@ jsing@ | ||||
* | Fix allocation size | tb | 2023-04-25 | 1 | -3/+3 |
| | | | | Reported by anton | ||||
* | Unbreak tree: file missed in last commit | tb | 2023-04-25 | 1 | -1/+3 |
| | | | | Reported by anton | ||||
* | Add endbr64 where needed by inspection. Passes regresson tests. | deraadt | 2023-04-25 | 28 | -1/+113 |
| | | | | ok jsing, and kind of tb an earlier version | ||||
* | Future users of libcrypto will also have to do without strong extranet | tb | 2023-04-24 | 2 | -2/+8 |
| | | | | | | support. discussed with beck and jsing | ||||
* | Mark NETSCAPE_CERT_SEQUENCE for removal | tb | 2023-04-24 | 3 | -4/+12 |
| | | | | discussed with beck and jsing | ||||
* | Mark the NDEF API for removal | tb | 2023-04-24 | 2 | -2/+9 |
| | | | | Discussed with jsing and beck | ||||
* | Free and calloc() the tlsext_build_order and remember its length | tb | 2023-04-24 | 1 | -2/+14 |
| | | | | | | | Aligns tlsext_randomize_build_order() with tlsext_linearize_build_order() and will help regression testing. ok jsing | ||||
* | Fix sk_is_sorted to tread 0 and 1 element lists as sorted. | beck | 2023-04-24 | 1 | -3/+12 |
| | | | | | | from boringssl ok tb@ jsing@ | ||||
* | Use TLSEXT_TYPE_alpn instead of the stupid long one | tb | 2023-04-24 | 1 | -2/+2 |
| | |||||
* | Sort X.509 error reasons, use next available error value, and align | job | 2023-04-24 | 2 | -4/+4 |
| | | | | | | error message with internal error code name. OK tb@ jsing@ | ||||
* | Revert 1.32 | job | 2023-04-24 | 1 | -27/+2 |
| | | | | | | | jsing@ noted that ASN1_OP_D2I_POST might not be the best place to introduce this check (as could lead to pushing errors (ASN1_R_AUX_ERROR) onto the stack). Additionally, without matching validation on the encoding side brittleness is introduced. | ||||
* | Replace X509v3_get_ext_count() with X509_get_ext_count() | job | 2023-04-23 | 1 | -2/+2 |
| | | | | Error introduced in 1.24 | ||||
* | In the case of V1 certs, the extension count should be exactly 0 | job | 2023-04-23 | 1 | -2/+2 |
| | | | | OK tb@ | ||||
* | If extensions are encountered on a X.509 V1 cert, mark as invalid | job | 2023-04-23 | 1 | -2/+5 |
| | | | | | | | While there, explicitly check for 0 - as X509_get_version() is a wrapper around the less than beloved ASN1_INTEGER_get(). OK tb@ | ||||
* | Add compliance checks for the X.509 version field | job | 2023-04-23 | 3 | -4/+31 |
| | | | | | | | | | | | | | | Check whether the X.509 version is in the range of valid version values, and also checks whether the version is consistent with fields new to those versions (such as X.509 v3 extensions). X.690 section 11.5 states: "The encoding of a set value or a sequence value shall not include an encoding for any component value which is equal to its default value." However, enforcing version 1 (value 0) to be absent reportedly caused some issues as recent as July 2020, so accept version 1 even if it is explicitly encoded. OK tb@ beck@ | ||||
* | Fix the client test and the tlsext test to work with randomized | tb | 2023-04-23 | 3 | -4/+21 |
| | | | | | TLS extensions (this involves unrandomizing the extension order for the tests that rely on golden numbers. | ||||
* | Randomize the order of TLS extensions | tb | 2023-04-23 | 4 | -5/+71 |
| | | | | | | | | | | | | | | | | | | | | | On creation of an SSL using SSL_new(), randomize the order in which the extensions will be sent. There are several constraints: the PSK extension must always come last. The order cannot be randomized on a per-message basis as the strict interpretation of the standard chosen in the CH hashing doesn't allow changing the order between first and second ClientHello. Another constraint is that the current code calls callbacks directly on parsing an extension, which means that the order callbacks are called depends on the order in which the peer sent the extensions. This results in breaking apache-httpd setups using virtual hosts with full ranomization because virtual hosts don't work if the SNI is unknown at the time the ALPN callback is called. So for the time being, we ensure that SNI always precedes ALPN to avoid issues until this issue is fixed. This is based on an idea by David Benjamin https://boringssl-review.googlesource.com/c/boringssl/+/48045 Input & ok jsing | ||||
* | Man page update for EVP_sha512_224() and EVP_sha512_256() | job | 2023-04-23 | 1 | -2/+22 |
| | | | | OK tb@ |