summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/opensslfeatures.h (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Remove commented version of OPENSSL_NO_EC2Mtb2023-04-251-1/+0
|
* LIBRESSL_NEXT_API is no longer neededtb2023-04-251-2/+0
|
* Temporarily define LIBRESSL_NEXT_API in opensslfeatures.htb2023-04-251-0/+2
|
* Define OPENSSL_NO_DEPRECATED and OPENSSL_NO_EC2M in opensslfeatures.htb2023-04-251-0/+2
| | | | ok beck jsing
* Define LIBRESSL_HAS_QUICtb2022-09-111-0/+1
| | | | ok jsing
* Unconditionally comment out OPENSSL_NO_RFC3779tb2022-01-141-3/+1
| | | | ok inoguchi jsing
* Expose Certificate Transparency symbols in headerstb2022-01-141-3/+1
| | | | ok inoguchi jsing
* Undo commenting of OPENSSL_NO_RFC3779tb2021-12-241-1/+3
| | | | | | | | | | | The define implies that we have the RFC 3779 API and corresponding symbols publicly exposed. We don't do that since there are still concerns about its suitability and security. oss-fuzz has code depending on this define and this broke its build as tracked down by jsing. This commit gets us oss-fuzz builds back while keeping job happy since the extension pretty printing will continue to work. ok jsing
* Make the certificate transparency code build with the rest of the librarybeck2021-11-241-1/+3
| | | | | | Do not expose it yet, this will wait for an upcoming bump ok tb@
* Move the now internal X.509-related structs into x509_lcl.h.tb2021-11-011-2/+0
| | | | | | | | Garbage collect the now unused LIBRESSL_CRYPTO_INTERNAL and LIBRESSL_OPAQUE_X509. Include "x509_lcl.h" where needed and fix a couple of unnecessary reacharounds. ok jsing
* Unifdef LIBRESSL_NEW_API. Now that the library is bumped, this istb2021-11-011-1/+0
| | | | | | no longer needed. ok jsing
* Enable RFC 3779 code.tb2021-10-311-1/+1
| | | | From job. Discussed at length with beck, claudio, job during h2k21
* Expose new API in headers and make X509 structs opaque.tb2021-10-311-0/+3
|
* Uncomment LIBRESSL_HAS_{TLS1_3,DTLS1_2} in opensslfeatures.htb2021-09-101-2/+2
|
* Expose various DTLSv1.2 specific functions and definestb2021-03-311-0/+1
| | | | ok bcook inoguchi jsing
* Import latest OPENSSL_NO_* flags from OpenSSL 1.1.1ginoguchi2020-09-091-0/+8
| | | | ok tb@
* define OPENSSL_NO_SSL_TRACE in opensslfeatures.hinoguchi2020-08-291-1/+1
| | | | ok jsing@ tb@
* Enable CMS in LibreSSL.jsing2019-11-021-1/+1
| | | | ok bcook@ deraadt@ inoguchi@ job@ tb@
* Start working towards adding feature flags (rather than anti-feature flags)jsing2018-11-061-1/+10
| | | | | | | for LibreSSL. Add a (commented out) feature flag for TLSv1.3 and define the OPENSSL_NO_TLS1_3 anti-feature flag based on the feature flag. ok beck@ bluhm@ tb@
* Define OPENSSL_NO_ASYNC - our libcryptosink does not have built in asyncjsing2018-11-041-1/+1
| | | | features (and possibly never will).
* Update the opensslfeatures.h to include all of the OPENSSL_NO_* flags thatjsing2018-11-041-8/+84
| | | | | | | | | | currently exist in OpenSSL - comment out that ones that we do not already define. Some OPENSSL_NO_* flags that we define have been removed from OpenSSL (and code that depended on these to know when features are not available now think that the features have been enabled...). We keep these defined but in their own separate group. ok bluhm@ tb@
* Reformat and sort the OPENSSL_NO_* defines.jsing2018-11-041-25/+25
|
* Remove OPENSSL_NO_NEXTPROTONEG - some software creates conflictingjsing2017-08-311-1/+0
| | | | | prototypes if we have both OPENSSL_NO_NEXTPROTONEG and the prototypes defined.
* Define OPENSSL_NO_NEXTPROTONEG since there is no longer any NPN.jsing2017-08-281-0/+1
|
* Temporarily revive MD4 for MS CHAP support.doug2015-09-141-1/+0
|
* Remove MD4 support from LibreSSL.doug2015-09-131-0/+1
| | | | | | | | MD4 should have been removed a long time ago. Also, RFC 6150 moved it to historic in 2011. Rides the major crank from removing SHA-0. Discussed with many including beck@, millert@, djm@, sthen@ ok jsing@, input + ok bcook@
* Remove SHA-0 support.doug2015-09-131-0/+1
| | | | | | | SHA-0 was withdrawn shortly after publication 20 years ago and replaced with SHA-1. This will require a major crank. ok bcook@, jsing@
* Remove SSLv3 support from LibreSSL.doug2015-08-271-0/+2
| | | | | | | | | | This is the first wave of SSLv3 removal which removes the main SSLv3 functions. Future commits will remove the rest of the SSLv3 support. Discussed the plan at c2k15. Input from jsing@, beck@, miod@, bcook@, sthen@, naddy@, and deraadt@. ok jsing@, beck@
* Remove OpenSSL engine RSAX.doug2015-07-191-0/+1
| | | | | | | | | OpenSSL stopped building it last year and removed it this year. Based on OpenSSL commit c436e05bdc7f49985a750df64122c960240b3ae1. Also cranked major version in libcrypto, libssl and libtls. "fine with me" bcook@ miod@
* Remove obsolete MDC-2DES from libcrypto.doug2015-06-201-0/+1
| | | | ok deraadt@ jsing@ miod@
* Add OPENSSL_NO_EGD to opensslfeatures.h.bcook2015-05-261-0/+1
| | | | | | | Since RAND_egd has been removed from LibreSSL, simplify porting software that relies on it. See https://github.com/libressl-portable/openbsd/pull/34 from Bernard Spil, ok deraadt@
* Enable the build of GOST routines in libcrypto. Riding upon the Cammeliamiod2014-11-181-1/+0
| | | | libcrypto minor bump.
* Add the Cammelia cipher to libcrypto.miod2014-11-171-1/+0
| | | | | | | | | | | | | | | | | | There used to be a strong reluctance to provide this cipher in LibreSSL in the past, because the licence terms under which Cammelia was released by NTT were free-but-not-in-the-corners, by restricting the right to modify the source code, as well retaining the right to enforce their patents against anyone in the future. However, as stated in http://www.ntt.co.jp/news/news06e/0604/060413a.html , NTT changed its mind and made this code truly free. We only wish there had been more visibility of this, for we could have had enabled Cammelia earlier (-: Licence change noticed by deraadt@. General agreement from the usual LibreSSL suspects. Crank libcrypto.so minor version due to the added symbols.
* it has been 4888 days since the transient feature to define short macrostedu2014-07-111-58/+1
| | | | | for apps that haven't had time to make the appropriate changes was added. time's up.
* additional features: no buffer freelists and no heartbleedtedu2014-07-111-0/+3
|
* no compression is also a feature of libressltedu2014-07-111-0/+4
|
* move all the feature settings to a common header.tedu2014-07-111-0/+72
probably ok beck jsing miod