summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* Reference the related accessor EVP_PKEY_get0_asn1(3).schwarze2018-05-131-5/+6
| | | | More logical ordering of EVP_PKEY_base_id(3) and EVP_PKEY_id(3) while here.
* Document EVP_PKEY_get0_asn1(3), it is declared in <openssl/evp.h>.schwarze2018-05-131-4/+13
| | | | | | | | | | It makes no sense to have method enumerators public, but the function to retrieve the method of a specific public key undocumented. Besides, it is confusing to have EVP_PKEY_asn1_get0(3) documented without mentioning the very different EVP_PKEY_get0_asn1(3). Remove a duplicate .Xr while here, and reference the related accessor EVP_PKEY_base_id(3). Triggered by tb@ adding a const qualifier to the argument.
* Document EVP_PKEY_bits(3).schwarze2018-05-132-7/+18
| | | | | | | It is clearly public because it is declared in <openssl/evp.h>, refenced from EVP_PKEY_asn1_set_public(3), and similar to the documented functions DH_bits(3) and RSA_bits(3). Triggered by tb@ adding a const qualifier to its argument.
* Add const to the ASN1_OBJECT argument of TS_TST_INFO_get_ext_by_OBJ(3).tb2018-05-132-4/+5
| | | | | | | Should have been part of the previous commit. Omission noted by schwarze. tested in bulk build by sthen ok jsing
* Add const qualifier to the ASN1_OBJ * argument oftb2018-05-133-11/+11
| | | | | | | | | TS_REQ_get_ext_by_OBJ(3), TS_REQ_set_policy_id(3), TS_RESP_CTX_add_policy(3), TS_RESP_CTX_set_def_policy(3), and TS_TST_INFO_get_ext_by_OBJ(3) tested in a bulk by sthen ok jsing
* Add const qualifiers to the char *zone and char *user arguments oftb2018-05-132-8/+13
| | | | | | | SXNET_add_id_INTEGER(3), SXNET_add_id_asc(3), SXNET_add_id_ulong(3) tested in a bulk by sthen ok jsing
* In pkcs12.h rev. 1.18 2018/05/13 13:46:55, tb@ added const qualifiersschwarze2018-05-131-4/+4
| | | | to the "pass" and "name" arguments of PKCS12_create(3). Adjust the manual.
* In pem.h rev. 1.18 2018/05/13 10:47:54, tb@ added const qualifiersschwarze2018-05-131-7/+7
| | | | | to the "name", "header", and "data" arguments of PEM_write(3) and PEM_write_bio(3). Adjust the manual.
* In ocsp.h rev. 1.15 2018/05/13 10:42:03, tb@ added const qualifiersschwarze2018-05-132-6/+6
| | | | | to the "url" argument of OCSP_crlID_new(3) and to the "urls" argument of OCSP_url_svcloc_new(3). Adjust the manuals.
* Add const qualifiers to the X509_SIG * and char * arguments oftb2018-05-132-4/+5
| | | | | | | PKCS8_decrypt(3). tested in a bulk build by sthen ok beck, jsing
* In x509.h rev. 1.49 2018/05/13 10:36:35, tb@ added a const qualifierschwarze2018-05-131-4/+4
| | | | | to the argument of X509_get_subject_name(3) and X509_get_issuer_name(3). Adjust the manual.
* Add const to the argument of PKCS12_pack_authsafes(3).tb2018-05-132-4/+4
| | | | | tested in a bulk by sthen ok beck, jsing
* Add const to the X509_ALGOR and other arguments oftb2018-05-133-20/+23
| | | | | | | PKCS12_item_decrypt_d2i(3), PKCS12_pbe_crypt(3), PKCS12_newpass(3). tested in a bulk by sthen ok beck, jsing
* In ocsp.h rev. 1.14 2018/05/13 10:30:52, tb@ added const qualifiersschwarze2018-05-131-5/+5
| | | | to the arguments of OCSP_cert_id_new(3). Adjust the manual.
* Add const to the attr argument of PKCS12_get_attr_gen(3).tb2018-05-132-4/+5
| | | | | tested in a bulk by sthen ok beck, jsing
* In x509.h rev. 1.48 2018/05/13 10:25:06, tb@ added a const qualifierschwarze2018-05-131-3/+3
| | | | to the "obj" argument of X509v3_get_ext_by_OBJ(3). Adjust the manual.
* In evp.h rev. 1.60 2018/05/13 06:35:10, tb@ added a const qualifierschwarze2018-05-131-3/+3
| | | | to the "sig" argument of EVP_DigestVerifyFinal(3). Adjust the manual.
* Add const qualifier to the PKCS12_SAFEBAG argument oftb2018-05-132-5/+5
| | | | | | | PKCS12_decrypt_skey(3). tested in a bulk by sthen ok beck, jsing
* Turn CRYPTO_realloc_clean() into a recallocarray() wrapper.jsing2018-05-131-11/+4
| | | | ok beck@ tb@
* Use recallocarray() instead of OPENSSL_realloc_clean().jsing2018-05-133-9/+7
| | | | | | | Also place all of the OPENSSL_* memory related prototypes under #ifndef LIBRESSL_INTERNAL. ok beck@ tb@
* Add const qualifiers to the 'pass' and 'name' arguments oftb2018-05-132-9/+9
| | | | | | | PKCS12_add_key(3), PKCS12_add_safe(3), PKCS12_create(3). tested in a bulk build by sthen ok beck, jsing
* Add const qualifier to the 'name', 'header', and 'data' arguments oftb2018-05-132-9/+10
| | | | | | | PEM_write(3) and PEM_write_bio(3). tested in a bulk build by sthen ok jsing
* Add const qualifier to the path and url{,s} parameters oftb2018-05-134-15/+16
| | | | | | | | OCSP_crlID_new(3), OCSP_parse_url(3), OCSP_sendreq_bio(3), OCSP_sendreq_new(3), and OCSP_url_svcloc_new(3). tested in a bulk build by sthen ok jsing (as part of a larger diff)
* Add const qualifier to the argument of X509_get_issuer_name(3) andtb2018-05-132-6/+6
| | | | | | | X509_get_subject_name(3). tested in a bulk build by sthen ok jsing (as part of a larger diff)
* Add const qualifier to the X509_NAME *, ASN1_BIT_STRING *, andtb2018-05-132-6/+6
| | | | | | | ASN1_INTEGER * arguments of OCSP_cert_id_new(3). tested in a bulk build by sthen ok jsing (as part of a larger diff)
* Add const qualifier to the ASN1_OBJECT * argument of:tb2018-05-132-11/+12
| | | | | | | | OCSP_REQUEST_get_ext_by_OBJ(3), OCSP_ONEREQ_ext_by_OBJ(3) OCSP_BASICRESP_get_ext_by_OBJ(3), OCSP_SINGLERESP_get_ext_by_OBJ(3) tested in a bulk build by sthen ok jsing (as part of a larger diff)
* Add const qualifier to the ASN1_OBJECT * parameter oftb2018-05-132-5/+5
| | | | | | | X509v3_get_ext_by_OBJ(3). tested in a bulk build by sthen ok jsing (as part of a larger diff)
* Add a const qualifier to the ASN1_OBJECT * argument of the following:tb2018-05-134-14/+16
| | | | | | | | EVP_PKEY_get_attr_by_OBJ(3), X509at_get_attr_by_OBJ(3), X509at_get0_data_by_OBJ(3), X509_REQ_get_attr_by_OBJ(3) tested in a bulk by sthen ok beck (as part of a larger diff)
* Add a const qualifier to the argument of EVP_PKEY_get0_asn1(3).tb2018-05-132-4/+4
| | | | | tested in a bulk build by sthen ok beck (as part of a larger diff)
* Add a const qualifier to the argument of EVP_PKEY_get0(3).tb2018-05-132-4/+4
| | | | | tested in a bulk build by sthen ok beck (as part of a larger diff)
* Add a const qualifier to the argument of EVP_PKEY_bits(3).tb2018-05-132-4/+4
| | | | | tested in a bulk build by sthen ok beck (as part of a larger diff)
* Add a const qualifier to the second argument of EVP_DigestVerifyFinal(3).tb2018-05-132-4/+5
| | | | | tested in a bulk build by sthen ok beck (as part of a larger diff)
* In bio.h rev. 1.43 2018/05/12 18:51:59, tb@ added a const qualifierschwarze2018-05-123-8/+8
| | | | | to the argument of BIO_new_accept(3), BIO_new_connect(3), and BIO_new_mem_buf(3). Update the documentation.
* In bio.h rev. 1.42 2018/05/12 17:47:53, tb@ added a const qualifierschwarze2018-05-121-3/+3
| | | | to return value of BIO_s_mem(3). Update the manual page.
* const qualifiers for BIO_new_mem_buf(), BIO_new_connect() andtb2018-05-124-11/+11
| | | | | | | | BIO_new_accept(). The one for BIO_new_mem_buf() is a bit ugly since it needs to cast away the newly added const qualifier, as in OpenSSL commit 8ab31975bac. ok jsing
* Add const qualifiers to the return values of BIO_s_mem() andtb2018-05-123-9/+9
| | | | | | BIO_s_datagram(). ok jsing
* Cleanup c2i_ASN1_BIT_STRING() code.jsing2018-05-121-20/+23
| | | | | | | | | | Avoid overloading a variable to store both a value and an error code - we can simply inline the error calls (as done everywhere else). Remove a bunch of unnecessary parentheses and tidy a few other things. With input from tb@. ok inoguchi@ tb@
* Add a missing bounds check in c2i_ASN1_BIT_STRING().jsing2018-05-121-1/+6
| | | | | | | | | This could potentially result in a left shift that exceeded the size of the storage type. Issue found by Simon Friedberger, Robert Merget and Juraj Somorovsky. ok inoguchi@ tb@
* Use explicit_bzero() rather than memset() when clearing a BIGNUM.jsing2018-05-121-2/+2
| | | | ok bcook@ tb@
* begin LibreSSL 2.8.0 dev branchbcook2018-05-031-3/+3
|
* In evp.h rev. 1.59 2018/05/02 15:51:41, tb@ added a const qualifierschwarze2018-05-023-9/+9
| | | | | to the return value of BIO_f_base64(3), BIO_f_cipher(3), and BIO_f_base64(3). Update the documentation.
* Add const qualifiers to return value of BIO_f_{base64,cipher,md}().tb2018-05-024-13/+13
| | | | | tested in bulk by sthen ok jsing
* Remove incorrect NULL checks in DH_set0_key().tb2018-05-021-5/+1
| | | | | | Reported by Ondřej Surý, LibreSSL-portable issue #92. ok inoguchi, jsing
* In x509.h rev. 1.46 2018/05/01 19:01:28, tb@ added const qualifiersschwarze2018-05-012-6/+6
| | | | to some function arguments. Update the documentation.
* Convert a handful of X509_*() functions to take const as in OpenSSL.tb2018-05-0110-43/+44
| | | | | tested in a bulk by sthen ok jsing
* In bio.h rev. 1.41 2018/05/01 13:29:09, tb@ added const qualifiersschwarze2018-05-019-28/+28
| | | | to the prototypes of several functions. Update the documentation.
* Fix whitespace on a few lines to reduce noise in an upcoming diff.tb2018-05-011-5/+5
|
* const for BIO_{new,set}() and most of the BIO_{f,s}_*() family oftb2018-05-0114-52/+52
| | | | | | functions. ok beck, jsing
* In view of the recent BN_FLG_CONSTTIME vulnerabilities in OpenSSL,schwarze2018-04-294-28/+104
| | | | | | | | | | | | | | | | carefully document constant time vs. non-constant time operation of BN_div(3), BN_mod_exp(3), and BN_mod_inverse(3). Until the work that is required on the ill-designed BN_exp(3) and BN_gcd(3) interfaces can be undertaken, also document the imperfections in their behaviour, for now. Finally, mention BN_mod_exp(3) behaviour for even moduli. Delete the vague statement about some functions automatically setting BN_FLG_CONSTTIME. It created a false sense of security. Do not rely on it: not all relevant functions do that. Topic brought up by beck@, significant feedback and OK jsing@.
* Fix a small timing side channel in dsa_sign_setup(). Simple adaptationtb2018-04-281-12/+25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | of OpenSSL commit c0caa945f6ef30363e0d01d75155f20248403df4 to our version of this function. ok beck, jsing Original commit message: commit c0caa945f6ef30363e0d01d75155f20248403df4 Author: Pauli <paul.dale@oracle.com> Date: Wed Nov 1 06:58:13 2017 +1000 Address a timing side channel whereby it is possible to determine some information about the length of the scalar used in DSA operations from a large number (2^32) of signatures. This doesn't rate as a CVE because: * For the non-constant time code, there are easier ways to extract more information. * For the constant time code, it requires a significant number of signatures to leak a small amount of information. Thanks to Neals Fournaise, Eliane Jaulmes and Jean-Rene Reinhard for reporting this issue. Reviewed-by: Andy Polyakov <appro@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/4576)]