Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | getentropy for osx and solaris. will be needed for a portable release | beck | 2014-07-08 | 2 | -0/+838 | |
| | ||||||
* | fix oops, accidental delete.. darn copying of files between machines | beck | 2014-07-08 | 1 | -2/+2 | |
| | ||||||
* | j should be an int, like repeat | beck | 2014-07-08 | 1 | -3/+4 | |
| | ||||||
* | unbreak last commit - but same intent, make re-seed less expensive | beck | 2014-07-08 | 1 | -12/+16 | |
| | ||||||
* | repeat calls to getentrypy() with the same pid likely indicate reseeds. | deraadt | 2014-07-08 | 1 | -3/+10 | |
| | | | | | | Since we assume the PRNG above is doing "something old, something new" folding, shortcut and do fewer repeats through the timing loop. ok beck | |||||
* | fix HD() misuse; from brent cook | deraadt | 2014-06-26 | 1 | -2/+2 | |
| | ||||||
* | AT_BASE returns us the *address* of the start of ld.so, so | beck | 2014-06-25 | 1 | -2/+2 | |
| | | | | | use the address, not what it points to (which is always the same) ok deraadt@ | |||||
* | get the page of data at AT_SYSINFO_EHDR | beck | 2014-06-25 | 1 | -2/+2 | |
| | | | | ok deraadt@ | |||||
* | comment fixes from theo | beck | 2014-06-25 | 1 | -5/+6 | |
| | ||||||
* | Possibly obtain a little bit of entropy from addresses returned | beck | 2014-06-25 | 1 | -2/+23 | |
| | | | | | by getauxval if we have it. ok deraadt@ | |||||
* | O_NOFOLLOW would be very nice to have here if the version of linux | beck | 2014-06-25 | 1 | -10/+11 | |
| | | | | | we are running supports it. from enh@google.com | |||||
* | Remove BIO_f_reliable(), guilty of playing with EVP_MD_CTX internals it | miod | 2014-06-24 | 1 | -2/+2 | |
| | | | | | should not know anything about. Verified not to be used in ports; riding upon the recent libcrypto major bump. | |||||
* | Crank libcrypto major since my previous commit changed the size of the | jsing | 2014-06-24 | 1 | -1/+1 | |
| | | | | ChaCha context. Other changes will also ride this crank. | |||||
* | unbreak build of getentropy_sysctl - we need linux/sysctl.h, and | beck | 2014-06-23 | 1 | -18/+21 | |
| | | | | RANDOM_UUID is an enum member. | |||||
* | unbreak - main needs to be extern in here somewhere. | beck | 2014-06-23 | 1 | -1/+2 | |
| | ||||||
* | repair indentation for an inner loop; shorten some macros and variable | deraadt | 2014-06-21 | 1 | -129/+135 | |
| | | | | | names to shorten line lengths ok beck | |||||
* | hash in correct pointer | deraadt | 2014-06-21 | 1 | -2/+2 | |
| | ||||||
* | KNF | beck | 2014-06-20 | 1 | -48/+56 | |
| | ||||||
* | indent | deraadt | 2014-06-20 | 1 | -2/+2 | |
| | ||||||
* | rearrange so that the main function with the important comments is at the top | otto | 2014-06-20 | 1 | -78/+80 | |
| | | | | ok deraadt@ beck@ | |||||
* | Work in progress on how to deal with the inherit unreliability of | beck | 2014-06-20 | 1 | -0/+439 | |
| | | | | | | /dev/urandom. Does well in the fallback case. Get it in tree so it can be worked on. ok otto@ deraadt@ | |||||
* | Provide support for non-funopen systems. | deraadt | 2014-06-11 | 1 | -2/+2 | |
| | | | | ok beck | |||||
* | Abandon the auto-ENGINE /dev/crypto interface. VIA 3des cbc receives | deraadt | 2014-06-10 | 1 | -2/+2 | |
| | | | | | | | | | | | | | collateral damage. The syncronous nature of this mechanism has hampered performance for symmetric crypto relative to brute-force cpu. The assymetric crypto support never really materialized in drivers. So abandon the complexity. ok tedu beck mikeb some disagrement from djm but if he wants to test /dev/crypto ciphers he should do it without this this gigantic API in the way | |||||
* | A few months back there was a big community fuss regarding direct-use | deraadt | 2014-06-02 | 1 | -2/+2 | |
| | | | | | | | | | | | | of the intel RDRAND instruction. Consensus was RDRAND should probably only be used as an additional source of entropy in a mixer. Guess which library bends over backwards to provide easy access to RDRAND? Yep. Guess which applications are using this support? Not even one... but still, this is being placed as a trap for someone. Send this support straight to the abyss. ok kettenis | |||||
* | Fix ia64 cross-gcc target. | tobiasu | 2014-05-27 | 1 | -0/+3 | |
| | | | | | | opensslconf.h is just a dummy, we're lightyears away from working userspace. ok deraadt@ | |||||
* | "for every change..." | tedu | 2014-05-25 | 1 | -1/+1 | |
| | ||||||
* | define LIBRESSL_INTERNAL, and use it to hide the bad stuff from ourselves | tedu | 2014-05-25 | 1 | -1/+2 | |
| | | | | ok beck | |||||
* | When OPENSSL_LOAD_CONF was added it ended up with more #if 0 code, | jsing | 2014-05-16 | 1 | -2/+2 | |
| | | | | | | | | | | | more #ifdefs and a new source file that contains a single function. Nuke the #if 0 code that is now a macro and move the single function in evp_acnf.c to c_all.c, which is where the other code lives. While here, tidy evp.h slightly, remove an unnecessary #ifdef __OpenBSD__ and nuke a comment that is now a lie. ok miod@ | |||||
* | Add a ChaCha20-Poly1305 AEAD EVP implementation to libcrypto, from Adam | jsing | 2014-05-15 | 1 | -2/+2 | |
| | | | | | | Langley's Chromium OpenSSL patches. ok miod@ | |||||
* | Add an AEAD EVP interface to libcrypto, along with AES-GCM AEAD | jsing | 2014-05-15 | 1 | -2/+2 | |
| | | | | | | | implementations. This largely pulls in Adam Langley's AEAD patches from Chromium's OpenSSL. ok miod@ | |||||
* | Add poly1305 to libcrypto utilising Andrew Moon's public domain | jsing | 2014-05-14 | 1 | -1/+6 | |
| | | | | | | implementation. ok miod@ | |||||
* | Move the `pqueue' part of libcrypto, which is a glorified sorted linked list | miod | 2014-05-12 | 2 | -8/+3 | |
| | | | | | | | | | | | | | of 64-bit data, and only used by DTLS, to libssl where it belongs. Remove pqueue_print() which is a debugging interface and serves no useful purpose, except for the regress test, which grows its own pqueue_print() routine. Bump libcrypto major and libssl minor. WARNING: do not update your tree right now, more changes are coming, which will ride the libcrypto major bump. | |||||
* | miod forgot about fcrypt_b.c being needed, before he went off to get his | deraadt | 2014-05-07 | 1 | -1/+2 | |
| | | | | | beauty sleep. He's probably having a nightmare about this right now.... ok tedu | |||||
* | Sort CFLAGS, SRC and SSLASM stanzas by the directories they apply to, to make | miod | 2014-05-06 | 2 | -68/+83 | |
| | | | | | these files similar in layout to the other md Makefile.inc; no functional change. | |||||
* | Enable assembler code for DES. Assembler code for BN is commented out as it | miod | 2014-05-05 | 1 | -0/+27 | |
| | | | | | uses the `umul' and `udiv' instructions directly, which are not supported on v7 processors. | |||||
* | Enable the assembler code for BN, which was lost quite some time ago. | miod | 2014-05-04 | 1 | -0/+19 | |
| | ||||||
* | Remove the !SSLASM conditional. Either there is an arch-specific Makefile.inc, | miod | 2014-05-04 | 1 | -4/+2 | |
| | | | | | or the !SSLASM list of files applies. This allows for an arch-specific Makefile.inc to not specify SSLASM. | |||||
* | Enable assembler code for AES, DES, GCM, SHA1, SHA256 and SHA512. | miod | 2014-05-03 | 1 | -0/+46 | |
| | | | | | The sparcv9 BN code is not enabled, as it expects to run on a 32-bit userland and will need to be fixed for 64-bit userland first. | |||||
* | Enable assembler code for AES, BN (Montgomery), GCM128, SHA1, SHA256 and SHA512. | miod | 2014-05-03 | 1 | -0/+45 | |
| | | | | | Note that GCM128 Neon code is currently not built (and thus not tested), as the current toolchain does not support Neon instructions. | |||||
* | Correctly enable Montgomery code. | miod | 2014-05-03 | 1 | -1/+2 | |
| | ||||||
* | Enable assembler bits for BN (Montgomery), SHA1 and SHA256. | miod | 2014-05-03 | 1 | -0/+44 | |
| | | | | Assembler bits for AES remain commented out as they run slower than the C code. | |||||
* | Correctly enable assembler Montgomery routine. | miod | 2014-05-02 | 1 | -1/+2 | |
| | ||||||
* | Correctly enable assembler Montgomery routine. | miod | 2014-05-02 | 1 | -1/+2 | |
| | ||||||
* | Reenable assembler code for SHA384 and SHA512 now that it no longer miscomputes | miod | 2014-05-02 | 1 | -3/+3 | |
| | | | | things. Worth doing as it's twice faster than the C code. | |||||
* | Disable assembler version of SHA512 for now, it produces wrong results. | miod | 2014-05-02 | 1 | -3/+3 | |
| | ||||||
* | Enable use of assembly code for AES, BN (Montgomery), SHA1, SHA256 and SHA512. | miod | 2014-05-01 | 1 | -0/+50 | |
| | | | | RC4 assembler code is not used, as it runs about 35% slower than the C code. | |||||
* | Enable use of the assembly code for BN (Montgomery) and SHA1. | miod | 2014-05-01 | 1 | -0/+40 | |
| | ||||||
* | Enable use of the assembly code for AES, BN, SHA1, SHA256 and SHA512. | miod | 2014-05-01 | 1 | -0/+36 | |
| | ||||||
* | + e_chacha.c, and bump minor | miod | 2014-05-01 | 2 | -2/+3 | |
| | ||||||
* | Add ChaCha to libcrypto, based on djb's public domain implementation. | jsing | 2014-05-01 | 1 | -1/+6 | |
| | | | | ok deraadt@ |