summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/reallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2019-11-02Sort standard_methods by pkey_id.inoguchi1-4/+4
ok jsing@
2019-11-02CMS didn't make the 6.6 release: adjust the text in the HISTORY sectionsschwarze23-69/+69
2019-11-02Hook cms regress.jsing1-1/+2
2019-11-02Include cms.h.jsing1-1/+2
2019-11-02Initial regress for cms.jsing2-0/+199
2019-11-02.Xr CMS_ContentInfo_new 3schwarze1-2/+3
2019-11-02.Xr BIO_new_CMS 3schwarze1-2/+3
2019-11-02document PEM_read_CMS(3), PEM_read_bio_CMS(3), PEM_write_CMS(3), andschwarze1-3/+46
PEM_write_bio_CMS(3) which jsing@ just enabled in Symbols.list rev. 1.91
2019-11-02In Symbols.list rev. 1.91, jsing enabled many CMS functions.schwarze1-1/+24
Install the new manual pages documenting the majority of them.
2019-11-02Bring back some icky buffer allocation code so that pkey_rsa_print()jsing1-9/+41
works again with the horrific API that is ASN1_bn_print(). Issue spotted by inoguchi@
2019-11-02Add tls_conn_cipher_strength() to gotls regress.jsing2-2/+20
2019-11-02Bump libcrypto, libssl and libtls minors due to symbol additions.jsing3-3/+3
2019-11-02Provide RSA_PKCS1_OpenSSL().jsing3-3/+10
Prompted by inoguchi@
2019-11-02Make RSA_padding_{add,check}_PKCS1_OAEP_mgf1() public.jsing3-9/+10
2019-11-02Make RSA_OAEP_PARAMs public.jsing3-17/+22
2019-11-02Document tls_conn_cipher_strength().jsing1-2/+14
ok schwarze@
2019-11-02Enable CMS in LibreSSL.jsing3-2/+135
ok bcook@ deraadt@ inoguchi@ job@ tb@
2019-11-02Provide tls_conn_cipher_strength().jsing4-3/+15
This returns the strength in bits of the symmetric cipher used for the connection. Diff from gilles@ ok tb@
2019-11-01In evp/pmeth_lib.c rev. 1.16, jsing@ enabled EVP_PKEY_RSA_PSS.schwarze1-3/+5
Document it.
2019-11-01In rsa.h rev. 1.45, jsing@ providedschwarze1-8/+16
the three macro constants RSA_PSS_SALTLEN_*; document them. The wording is a combination of our existing text and the wording in the OpenSSL 1.1.1 branch, which is still under a free license.
2019-11-01Add DSA CMS support.jsing1-1/+25
From OpenSSL 1.1.1d. ok tb@
2019-11-01Add RSA CMS support.jsing3-5/+262
From OpenSSL 1.1.1d. ok tb@
2019-11-01Provide NID for pSpecified.jsing2-0/+2
ok tb@
2019-11-01Wire up PKEY methods for RSA-PSS.jsing1-2/+6
ok tb@
2019-11-01Wire up ASN.1 methods for RSA-PSS.jsing1-1/+5
ok tb@
2019-11-01In rsa.h rev. 1.45, jsing@ provided the threeschwarze2-6/+64
macros EVP_PKEY_CTX_set_rsa_pss_keygen_*(3); document them. Text mostly taken from the OpenSSL 1.1.1 branch, which is still under a free license, but rearranged to fit the structure of our manual pages.
2019-11-01move the PSS macros to the end in preparation for adding more macros,schwarze1-50/+45
reduce text duplication by forming subsections, and some minor corrections
2019-11-01The EVP_PKEY_CTX_ctrl(3) manual page requires additions for RSA-PSSschwarze4-267/+358
but it is growing to excessive size, so split out RSA_pkey_ctx_ctrl(3).
2019-11-01Update RSA ASN.1 code to handle RSA-PSS.jsing4-302/+389
From OpenSSL 1.1.1d. ok tb@
2019-11-01Clean up RSA_new_method().jsing1-40/+24
Use calloc() instead of malloc() for initialisation and remove explicit zero initialisation of members. This ensures that new members always get initialised. Also use a single error return path, simplifying code. ok tb@
2019-10-31Add RSA OAEP test for pkeyutl in appstest.shinoguchi1-1/+21
2019-10-31In rsa_pmeth.c rev. 1.30, jsing@ set the minimum RSA key lengthschwarze1-2/+3
for RSA key generation to 512 bits. Document that minimum.
2019-10-31Add CMS controls for RSA.jsing1-1/+8
2019-10-31Add support for RSA-PSS.jsing5-65/+370
From OpenSSL 1.1.1d. ok inoguchi@
2019-10-31Move RSA min modulus to a define and increase from 256 to 512 bits.jsing2-4/+6
From OpenSSL 1.1.1d. ok inoguchi@
2019-10-31Fix indent and indent before labels.jsing1-5/+5
2019-10-31Use braces where a statement has both multi-line and single-line blocks.jsing1-8/+13
Makes code more robust and reduces differences with OpenSSL. ok inoguchi@
2019-10-31Add additional validation of key size, message digest size and publicjsing1-3/+17
exponent. From OpenSSL 1.1.1d. ok inoguchi@
2019-10-31Clean up some code.jsing1-11/+13
Assign and test, explicitly test against NULL and use calloc() rather than malloc. ok inoguchi@
2019-10-31Avoid potentially leaking pub_exp in pkey_rsa_copy().jsing1-4/+4
ok inoguchi@
2019-10-29In rsa.h rev. 1.41, jsing@ provided RSA_pkey_ctx_ctrl(3).schwarze1-1/+26
Write the documentation from scratch.
2019-10-29merge documentation for several macros EVP_PKEY_CTX_*_rsa_oaep_*(3)schwarze1-4/+239
and EVP_PKEY_CTX_*_ecdh_*(3); from Antoine Salon <asalon at vmware dot com> via OpenSSL commit 87103969 Oct 1 14:11:57 2018 -0700 from the OpenSSL 1.1.1 branch, which is still under a free license
2019-10-29merge documentation for EVP_PKEY_CTX_set1_id(3), EVP_PKEY_CTX_get1_id(3),schwarze1-2/+57
and EVP_PKEY_CTX_get1_id_len(3), but make it sound more like English text; from Paul Yang via OpenSSL commit f922dac8 Sep 6 10:36:11 2018 +0800 from the OpenSSL 1.1.1 branch, which is still under a free license
2019-10-29merge documentation of EVP_PKEY_CTX_set_ec_param_enc(3)schwarze1-6/+23
from Stephen Henson via OpenSSL commit 146ca72c Feb 19 14:35:43 2015 +0000
2019-10-29correct HISTORY of some RSA control macrosschwarze1-5/+26
2019-10-29list supported algorithm ids and clarify how the engine argument is usedschwarze1-10/+50
2019-10-29Add two controls that were missed in the previous commit.jsing1-1/+13
2019-10-29Update RSA OAEP code.jsing2-21/+124
This syncs the RSA OAEP code with OpenSSL 1.1.1d, correctly handling OAEP padding and providing various OAEP related controls. ok inoguchi@ tb@
2019-10-29Provide EVP_PKEY_CTX_md().jsing2-8/+18
This handles controls with a message digest by name, looks up the message digest and then proxies the control through with the EVP_MD *. This is internal only for now and will be used in upcoming RSA related changes. Based on OpenSSL 1.1.1d. ok inoguchi@ tb@
2019-10-25Free maskHash when RSA_PSS_PARAMS is freed.jsing1-3/+23
ok tb@