Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Crank libcrypto major since my previous commit changed the size of the | jsing | 2014-06-24 | 1 | -1/+1 | |
| | | | | ChaCha context. Other changes will also ride this crank. | |||||
* | unbreak build of getentropy_sysctl - we need linux/sysctl.h, and | beck | 2014-06-23 | 1 | -18/+21 | |
| | | | | RANDOM_UUID is an enum member. | |||||
* | unbreak - main needs to be extern in here somewhere. | beck | 2014-06-23 | 1 | -1/+2 | |
| | ||||||
* | repair indentation for an inner loop; shorten some macros and variable | deraadt | 2014-06-21 | 1 | -129/+135 | |
| | | | | | names to shorten line lengths ok beck | |||||
* | hash in correct pointer | deraadt | 2014-06-21 | 1 | -2/+2 | |
| | ||||||
* | KNF | beck | 2014-06-20 | 1 | -48/+56 | |
| | ||||||
* | indent | deraadt | 2014-06-20 | 1 | -2/+2 | |
| | ||||||
* | rearrange so that the main function with the important comments is at the top | otto | 2014-06-20 | 1 | -78/+80 | |
| | | | | ok deraadt@ beck@ | |||||
* | Work in progress on how to deal with the inherit unreliability of | beck | 2014-06-20 | 1 | -0/+439 | |
| | | | | | | /dev/urandom. Does well in the fallback case. Get it in tree so it can be worked on. ok otto@ deraadt@ | |||||
* | Provide support for non-funopen systems. | deraadt | 2014-06-11 | 1 | -2/+2 | |
| | | | | ok beck | |||||
* | Abandon the auto-ENGINE /dev/crypto interface. VIA 3des cbc receives | deraadt | 2014-06-10 | 1 | -2/+2 | |
| | | | | | | | | | | | | | collateral damage. The syncronous nature of this mechanism has hampered performance for symmetric crypto relative to brute-force cpu. The assymetric crypto support never really materialized in drivers. So abandon the complexity. ok tedu beck mikeb some disagrement from djm but if he wants to test /dev/crypto ciphers he should do it without this this gigantic API in the way | |||||
* | A few months back there was a big community fuss regarding direct-use | deraadt | 2014-06-02 | 1 | -2/+2 | |
| | | | | | | | | | | | | of the intel RDRAND instruction. Consensus was RDRAND should probably only be used as an additional source of entropy in a mixer. Guess which library bends over backwards to provide easy access to RDRAND? Yep. Guess which applications are using this support? Not even one... but still, this is being placed as a trap for someone. Send this support straight to the abyss. ok kettenis | |||||
* | Fix ia64 cross-gcc target. | tobiasu | 2014-05-27 | 1 | -0/+3 | |
| | | | | | | opensslconf.h is just a dummy, we're lightyears away from working userspace. ok deraadt@ | |||||
* | "for every change..." | tedu | 2014-05-25 | 1 | -1/+1 | |
| | ||||||
* | define LIBRESSL_INTERNAL, and use it to hide the bad stuff from ourselves | tedu | 2014-05-25 | 1 | -1/+2 | |
| | | | | ok beck | |||||
* | When OPENSSL_LOAD_CONF was added it ended up with more #if 0 code, | jsing | 2014-05-16 | 1 | -2/+2 | |
| | | | | | | | | | | | more #ifdefs and a new source file that contains a single function. Nuke the #if 0 code that is now a macro and move the single function in evp_acnf.c to c_all.c, which is where the other code lives. While here, tidy evp.h slightly, remove an unnecessary #ifdef __OpenBSD__ and nuke a comment that is now a lie. ok miod@ | |||||
* | Add a ChaCha20-Poly1305 AEAD EVP implementation to libcrypto, from Adam | jsing | 2014-05-15 | 1 | -2/+2 | |
| | | | | | | Langley's Chromium OpenSSL patches. ok miod@ | |||||
* | Add an AEAD EVP interface to libcrypto, along with AES-GCM AEAD | jsing | 2014-05-15 | 1 | -2/+2 | |
| | | | | | | | implementations. This largely pulls in Adam Langley's AEAD patches from Chromium's OpenSSL. ok miod@ | |||||
* | Add poly1305 to libcrypto utilising Andrew Moon's public domain | jsing | 2014-05-14 | 1 | -1/+6 | |
| | | | | | | implementation. ok miod@ | |||||
* | Move the `pqueue' part of libcrypto, which is a glorified sorted linked list | miod | 2014-05-12 | 2 | -8/+3 | |
| | | | | | | | | | | | | | of 64-bit data, and only used by DTLS, to libssl where it belongs. Remove pqueue_print() which is a debugging interface and serves no useful purpose, except for the regress test, which grows its own pqueue_print() routine. Bump libcrypto major and libssl minor. WARNING: do not update your tree right now, more changes are coming, which will ride the libcrypto major bump. | |||||
* | miod forgot about fcrypt_b.c being needed, before he went off to get his | deraadt | 2014-05-07 | 1 | -1/+2 | |
| | | | | | beauty sleep. He's probably having a nightmare about this right now.... ok tedu | |||||
* | Sort CFLAGS, SRC and SSLASM stanzas by the directories they apply to, to make | miod | 2014-05-06 | 2 | -68/+83 | |
| | | | | | these files similar in layout to the other md Makefile.inc; no functional change. | |||||
* | Enable assembler code for DES. Assembler code for BN is commented out as it | miod | 2014-05-05 | 1 | -0/+27 | |
| | | | | | uses the `umul' and `udiv' instructions directly, which are not supported on v7 processors. | |||||
* | Enable the assembler code for BN, which was lost quite some time ago. | miod | 2014-05-04 | 1 | -0/+19 | |
| | ||||||
* | Remove the !SSLASM conditional. Either there is an arch-specific Makefile.inc, | miod | 2014-05-04 | 1 | -4/+2 | |
| | | | | | or the !SSLASM list of files applies. This allows for an arch-specific Makefile.inc to not specify SSLASM. | |||||
* | Enable assembler code for AES, DES, GCM, SHA1, SHA256 and SHA512. | miod | 2014-05-03 | 1 | -0/+46 | |
| | | | | | The sparcv9 BN code is not enabled, as it expects to run on a 32-bit userland and will need to be fixed for 64-bit userland first. | |||||
* | Enable assembler code for AES, BN (Montgomery), GCM128, SHA1, SHA256 and SHA512. | miod | 2014-05-03 | 1 | -0/+45 | |
| | | | | | Note that GCM128 Neon code is currently not built (and thus not tested), as the current toolchain does not support Neon instructions. | |||||
* | Correctly enable Montgomery code. | miod | 2014-05-03 | 1 | -1/+2 | |
| | ||||||
* | Enable assembler bits for BN (Montgomery), SHA1 and SHA256. | miod | 2014-05-03 | 1 | -0/+44 | |
| | | | | Assembler bits for AES remain commented out as they run slower than the C code. | |||||
* | Correctly enable assembler Montgomery routine. | miod | 2014-05-02 | 1 | -1/+2 | |
| | ||||||
* | Correctly enable assembler Montgomery routine. | miod | 2014-05-02 | 1 | -1/+2 | |
| | ||||||
* | Reenable assembler code for SHA384 and SHA512 now that it no longer miscomputes | miod | 2014-05-02 | 1 | -3/+3 | |
| | | | | things. Worth doing as it's twice faster than the C code. | |||||
* | Disable assembler version of SHA512 for now, it produces wrong results. | miod | 2014-05-02 | 1 | -3/+3 | |
| | ||||||
* | Enable use of assembly code for AES, BN (Montgomery), SHA1, SHA256 and SHA512. | miod | 2014-05-01 | 1 | -0/+50 | |
| | | | | RC4 assembler code is not used, as it runs about 35% slower than the C code. | |||||
* | Enable use of the assembly code for BN (Montgomery) and SHA1. | miod | 2014-05-01 | 1 | -0/+40 | |
| | ||||||
* | Enable use of the assembly code for AES, BN, SHA1, SHA256 and SHA512. | miod | 2014-05-01 | 1 | -0/+36 | |
| | ||||||
* | + e_chacha.c, and bump minor | miod | 2014-05-01 | 2 | -2/+3 | |
| | ||||||
* | Add ChaCha to libcrypto, based on djb's public domain implementation. | jsing | 2014-05-01 | 1 | -1/+6 | |
| | | | | ok deraadt@ | |||||
* | We do not need a separate file for two compatibility wrapper functions. | jsing | 2014-04-27 | 1 | -2/+2 | |
| | | | | ok miod@ | |||||
* | Make libssl and libcrypto compile with -Werror | beck | 2014-04-23 | 1 | -2/+2 | |
| | | | | ok miod@ | |||||
* | Chop off more SSLv2 tentacles and start fixing and noting y2038 issues. | guenther | 2014-04-20 | 1 | -1/+1 | |
| | | | | | | | APIs that pass times as longs will have to change at some point... Bump major on both libcrypto and libssl. ok tedu@ | |||||
* | Do not ask the user to pass either -DB_ENDIAN or -DL_ENDIAN to the compiler, | miod | 2014-04-18 | 1 | -11/+1 | |
| | | | | | | | but rather figure out the endianness from <machine/endian.h> automagically; help from guenther@ ok jca@ guenther@ beck@ and the rest of the `Buena SSL rampage club' | |||||
* | first round of static config. ok miod | tedu | 2014-04-18 | 13 | -559/+0 | |
| | ||||||
* | Put back i2d_ASN1_SET() and d2i_ASN1_SET() from the NO_ASN1_OLD prune, as there | miod | 2014-04-18 | 1 | -1/+2 | |
| | | | | | | | are still some 3rd-party code using it, and fixing them is not trivial. As an excuse gift, the memory leaks on failure in resurrected a_set.c have been fixed. | |||||
* | we need to crank | tedu | 2014-04-18 | 1 | -1/+1 | |
| | ||||||
* | another round of chemo for the RAND code to provide clarity. | tedu | 2014-04-18 | 1 | -3/+2 | |
| | | | | ok deraadt | |||||
* | egd support is too dangerous to leave where somebody might find it. | tedu | 2014-04-18 | 1 | -2/+2 | |
| | | | | ok deraadt. | |||||
* | Use !defined() rather than empty(). | miod | 2014-04-17 | 1 | -2/+2 | |
| | ||||||
* | -Wall | tedu | 2014-04-17 | 1 | -1/+3 | |
| | ||||||
* | Ok, there was a need for OPENSSL_cleanse() instead of bzero() to prevent | miod | 2014-04-17 | 1 | -2/+2 | |
| | | | | | | | | | | | supposedly smart compilers from optimizing memory cleanups away. Understood. Ok, in case of an hypothetically super smart compiler, OPENSSL_cleanse() had to be convoluted enough for the compiler not to recognize that this was actually bzero() in disguise. Understood. But then why there had been optimized assembler versions of OPENSSL_cleanse() is beyond me. Did someone not trust the C obfuscation? |