summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/dsa/dsa_lib.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2024-03-26Rework input and output handling for sha1.jsing1-128/+79
Use be32toh(), htobe32() and crypto_{load,store}_htobe32() as appropriate. Also use the same while() loop that is used for other hash functions. ok joshua@ tb@
2024-03-26Inline initial values.jsing1-11/+8
No functional change.
2024-03-26Rework input and output handling for md4.jsing1-55/+61
Use le32toh(), htole32() and crypto_{load,store}_htole32() as appropriate. ok joshua@ tb@
2024-03-26Simplify HMAC_CTX_new()joshua1-9/+2
There is no need to call HMAC_CTX_init() as the memory has already been initialised to zero. ok tb
2024-03-26Clean up EVP_DigestSignFinaljoshua1-27/+31
ok jsing tb
2024-03-26Reject setting invalid versions for certs, CRLs and CSRstb3-3/+18
The toolkit aspect bites again. Lots of invalid CRLs and CSRs are produced because people neither read the RFCs nor does the toolkit check anything it is fed. Reviewers apparently also aren't capable of remembering that they have three copy-pasted versions of the same API and that adding a version check to one of the might suggest adding one for the other two. This requires ruby-openssl 20240326p0 to pass ok beck job jsing
2024-03-26Add TLS_ERROR_INVALID_CONTEXT error code to libtlsjoshua4-11/+16
ok jsing@ beck@
2024-03-26Remove now unnecessary do {} while (0);jsing1-3/+1
2024-03-26Inline HASH_MAKE_STRING.jsing1-13/+12
No change to generated assembly.
2024-03-26Remove PKCS5_pbe2_set_iv()tb1-28/+9
This used to be a generalization of PKCS5_pbe2_set(). Its only caller was the latter, which always passes aiv == NULL and pbe_prf == -1. Thus, the iv would always be random and regarding the pbe_prf, it would always end up being NID_hmacWithSHA1 since the only ctrl grokking EVP_CTRL_PBE_PRF_NID was RC2's control, but only if PBE_PRF_TEST was defined, which it wasn't. ok jsing
2024-03-26Reorder functions expanded from md32_common.h.jsing1-103/+102
No functional change.
2024-03-26Unifdef PBE_PRF_TESTtb1-7/+1
This gets use of the last mention of EVP_CTRL_PBE_PRF_NID outside of evp.h ok jsing
2024-03-26Expand HASH_* defines.jsing1-26/+28
No change to generated assembly.
2024-03-26Inline hash functions from md32_common.h.jsing1-1/+102
No change to generated assembly.
2024-03-26Fix previous commit.jsing1-2/+2
2024-03-26Add error code support to libtlsjoshua12-225/+363
This adds tls_config_error_code() and tls_error_code(), which will become public API at a later date. Additional error codes will be added in follow-up commits. ok jsing@ beck@
2024-03-26Reorder functions.jsing1-13/+13
No functional change.
2024-03-26Provide an optimised bn_subw() for amd64.jsing1-3/+22
bn_subw() will be used more widely in an upcoming change.
2024-03-26Clean up use of EVP_MD_CTX_{legacy_clear,cleanup} in EVP_SignFinaljoshua1-6/+8
ok jsing@
2024-03-26Stop including md32_common.h in md5.c and remove unused defines.jsing1-17/+1
This is now no longer needed. ok tb@
2024-03-26Clean up use of EVP_MD_CTX_{legacy_clear,cleanup} in EVP_VerifyFinaljoshua1-6/+7
ok tb@
2024-03-26Include stdint.h for uintptr_t.jsing1-1/+2
2024-03-26Add back x509_local.h for PBKDF2PARAMtb1-1/+2
2024-03-26PKCS5_pbe2_set_iv() can be local to p5_pbev2tb2-6/+3
quoth the muppet "yes I know this is horrible!"
2024-03-26Clean up use of EVP_MD_CTX_{legacy_clear,cleanup} in PKCS1_MGF1joshua1-9/+14
ok tb@
2024-03-26Clean up use of EVP_MD_CTX_{legacy_clear,cleanup} injoshua1-19/+22
RSA_verify_PKCS1_PSS_mgf1 ok jsing@ tb@
2024-03-26Clean up use of EVP_CIPHER_CTX_{legacy_clear,cleanup} in EVP_OpenInitjoshua1-3/+3
ok tb@
2024-03-26Demacro MD5 and improve data loading.jsing1-116/+154
Use static inline functions instead of macros and improve handling of aligned data. Also number rounds as per RFC 1321. ok tb@
2024-03-26Mark internal functions as static.jsing1-5/+5
2024-03-26Move bn_montgomery_reduce() and drop prototype.jsing1-73/+71
No functional change.
2024-03-26Fix function guards.jsing1-3/+3
2024-03-26Add an indicator that an extension has been processed.beck3-3/+21
ok jsing@
2024-03-26Fix expected client hello value to allow for supported_groups change.beck1-4/+4
ok jsing@
2024-03-26Garbage collect the unused verifyctx() and verifyctx_init()tb2-23/+5
ok joshua jsing
2024-03-26Process supported groups before key share.beck1-15/+15
This will allow us to know the client preferences for an upcoming change to key share processing. ok jsing@
2024-03-26Disable client handshake test for now for pending changes.beck1-2/+3
ok jsing@
2024-03-26Use errno_value instead of num for readabilityjoshua1-7/+7
ok jsing@
2024-03-26Use errno_value instead of num for readabilityjoshua2-12/+12
ok beck@ jsing@
2024-03-26Change ts to only support one second precision.beck3-84/+9
RFC 3631 allows for sub second ASN1 GENERALIZED times, if you choose to support sub second time precison. It does not indicate that an implementation must support them. Supporting sub second timestamps is just silly and unrealistic, so set our maximum to one second of precision. We then simplify this code by removing some nasty eye-bleed that made artisinally hand crafted strings and jammed them into an ASN1_GENERALIZEDTIME. ok tb@, jsing@, with one second precision tested by kn@
2024-03-26Clean up conf's module_init()tb1-39/+27
Immediately error out when no name or value is passed instead of hiding this in a a combination of ternary operator and strdup error check. Use calloc(). Unindent some stupid, don't pretend this function can return anything but -1 and 1, turn the whole thing into single exit and call the now existing imodule_free() instead of handrolling it. ok jsing
2024-03-25Rewrite HKDF_expand().jsing1-38/+50
Simplify overflow checking and length tracking, use a CBB to handle output and use HMAC_CTX_new() rather than having a HMAC_CTX on the stack. ok tb@
2024-03-25Revert r1.13 since it currently breaks openssl-ruby regress tests.jsing1-2/+2
ok tb@
2024-03-25Inline sctx in EVP_DigestSignFinaljoshua1-11/+8
ok tb@ jsing@
2024-03-25Clean up use of EVP_MD_CTX_{legacy_clear,cleanup} in PKCS5_PBE_keyivgenjoshua1-11/+12
ok tb@
2024-03-25Error on setting an invalid CSR versionjob1-2/+2
Reported by David Benjamin (BoringSSL) OK tb@
2024-03-25Remove unneeded brackets from if statement in EVP_DigestSignFinaljoshua1-3/+2
ok tb@
2024-03-25Clean up use of EVP_MD_CTX_{legacy_clear,cleanup} in EVP_BytesToKeyjoshua1-12/+14
ok tb@
2024-03-25Codify more insane CRYPTO_EX_DATA API.jsing1-9/+59
The current CRYPTO_EX_DATA implementation allows for data to be set without calling new, indexes can be used without allocation, new can be called without getting an index and dup can be called after new or without calling new.
2024-03-25Revise for TLS extension parsing/processing changes.jsing1-108/+42
2024-03-25Simplify TLS extension parsing and processing.jsing1-155/+98
Rather than having a separate parse and process step for each TLS extension, do a first pass that parses all of the TLS outer extensions and retains the extension data, before running a second pass that calls the TLS extension processing code. ok beck@ tb@