summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/dsa/dsa_err.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2024-04-15More X9.62 stuff was never used outside of ec_asn1.ctb2-43/+5
We only need the ASN.1 items. ok jsing
2024-04-15EC_PRIVATEKEY becomes internal-only, tootb2-15/+10
ok jsing
2024-04-15Unexport the ECPKPARAMETERS APItb3-19/+12
ok jsing
2024-04-15Make ECPARAMETERS_{new,free,it} internal-onlytb2-8/+5
ok jsing
2024-04-15Move BIO_CONNECT_{new,free}() to internal-onlytb2-7/+5
ok jsing
2024-04-15Remove ASN1_time_clamp_not_after() from Symbols.listtb1-1/+0
This was only ever semi-public and libtls no longer uses it since it was switched to the BoringSSL POSIX time API. ok jsing
2024-04-15Enable negative zero checks for BN_clear_bit() and BN_mask_bits().jsing1-5/+1
2024-04-15Prevent negative zero from being created via BN bit functions.jsing1-1/+7
Both BN_clear_bit() and BN_mask_bits() can create zero values - in both cases ensure that the negative sign is correctly handled if the value becomes zero. Thanks to Guido Vranken for providing a reproducer. Fixes oss-fuzz #67901 ok tb@
2024-04-15drop htonl(), htons(), ntohl(), ntohs() MD functions from libcnaddy5-50/+21
Userland code compiled in a normal fashion picks up the htonl(), htons(), ntohl(), ntohs() macros implemented by endian.h. The functions in libc are effectively unused. Keep the MI functions in case something looks for the symbols in libc or plays games with #undef, but change them to wrap the implementation from endian.h. tweaks suggested by claudio@, ok miod@
2024-04-14t22 and t23 can fail if the first chunk ends up being allocated atotto1-2/+12
the very end of the page. Circumvent that. Reported by and fix ok anton@
2024-04-14Fix indenttb1-3/+3
pointed out by jsing
2024-04-14Delete a few more GOST remnantstb1-21/+1
When I unifdefed GOST support, the tree wasn't fully unlocked, so I didn't want to touch a public header. All this code is in #ifndef OPENSSL_NO_GOST, which we define. ok jsing
2024-04-14Remove documentation of no longer available APItb1-85/+4
2024-04-13Error check X509_ALGOR_set0() in {dsa,ec}_pkey_ctrl()tb2-7/+16
These are four versions of near identical code: PKCS#7 and CMS controls for DSA and EC. The checks are rather incomplete and should probably be merged somehow (see the Ed25519 version in ecx_methods(). For now, only replace X509_ALGOR_set0() with its internal by_nid() version and, while there, spell NULL correctly. ok jca
2024-04-13Unwrap a line for consistency with other copy-pasted versionstb1-3/+2
2024-04-12bio_enc: various basic cleanuptb1-64/+67
Call a BIO bio rather than bi, a, or b; don't cast when assigning from or to a (void *). Drop loads of silly redundant parentheses, use better order of variable declarations. No change in the generated assembly
2024-04-12Garbage collect various *_init() pmethstb3-53/+24
It's unclear whether the functions these support were ever really used for anything else than kicking off an overenginerred state machine. ok jsing
2024-04-12Fix a potential NULL-deref in EVP_PKEY_keygen()tb1-6/+8
After a EVP_PKEY_new() failure, a NULL pointer would be passed to the keygen pmeth, which could result in tears. ok beck jsing
2024-04-11Remove parentheses after returntb1-40/+40
This file was very undecided what style to choose and often changed its mind in the middle of a function. No change in the generated assembly.
2024-04-11Rework internal tm_to_*() converterstb1-69/+66
Make them static. Don't make them allocate if passed a NULL ASN1_TIME to avoid leaks. This currently means that we accept a NULL and succeed. That's very ugly but better than what we have now. Simplify ASN1_TIME_set_string_internal() accordingly and allocate an ASN1_TIME at the API boundary of ASN1_TIME_adj_internal() and of ASN1_TIME_to_generalized_time(). ok beck (after a lot of squealing and distress)
2024-04-10symbols test: Remove a few things that are long gonetb1-19/+5
2024-04-10Re-guard the crypto_malloc macros.beck1-1/+3
accidentally not included in crypto.h commit requested and ok tb@
2024-04-10Remove the prototype of BN_gcd_nonct()tb1-2/+1
2024-04-10Hide deprecated functions in ec.hbeck5-12/+31
use LCRYPTO_UNUSED and remove the LIBRESSL_INTERNAL guard ok tb@
2024-04-10Hide deprecated functions in evp.hbeck5-14/+19
use LCRYPTO_UNUSED and remove the LIBRESSL_INTERNAL guard around them. ok tb@
2024-04-10Add HMAC_init and HMAC_CTX_reset to Symbols.namespace.beck1-0/+2
ok tb@
2024-04-10Hide symbols in bn.hbeck6-19/+21
Mark them LCRYPTO_UNUSED appropriately and remove the LIBRESSL_INTERNAL guards around them ok tb@
2024-04-10Hide a couple of LCRYPTO_UNUSED in asn1.hbeck4-10/+8
and remove the LIBRESSL_INTERNAL guards around them ok tb@
2024-04-10Add RC2 symbols to Symbols.namespace.beck1-0/+7
These got missed when they were hidden ok tb@
2024-04-10Finish hiding symbols in rand.hbeck5-6/+34
This removes the LIBRESSL_INTERNAL guards and marks the functions within as LCRYPTO_UNUSED
2024-04-10Finish Hiding symbols in crypto.hbeck9-18/+101
crypto.h already had the symbols not hidden behind LIBRESSL_INTERNAL hidden - This now picks up the reset of them marking them as LCRYPTO_UNUSED, and removes the LIBRESSL_INTERNAL guard. These symbols will now be hidden, but if we use them inside the library in a namespaced build we will get a deprecation warning. use outside the library will be as with any other hidden symbol, so fine. ok tb@
2024-04-09whirlpool_test: avoid calling arc4random_uniform(0)tb1-2/+4
This causes a SIGFPE on solaris Fixes https://github.com/libressl/portable/issues/1042
2024-04-09whirlpool_test: zap lots of trailing whitespacetb1-58/+58
2024-04-09bn_convert: plug leak spotted by ASANtb1-2/+4
2024-04-09Add a comment on abuse of EXFLAG_INVALIDtb1-1/+8
We added things we probably shouldn't have, and so did BoringSSL and OpenSSL. Terrible API is terrible. discussed with jsing
2024-04-09Add initial regress for BN_set_bit(), BN_clear_bit() and BN_mask_bits().jsing2-1/+229