Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Implement coordinate blinding for EC_POINT as an additional mitigation | tb | 2018-11-17 | 10 | -18/+113 |
| | | | | | | for the portsmash vulnerability. OpenBSD 6.4 errata 003 | ||||
* | bump for LibreSSL 2.8.2 | bcook | 2018-09-30 | 1 | -3/+3 |
| | |||||
* | bump for LibreSSL 2.8.1libressl-v2.8.1 | bcook | 2018-09-23 | 1 | -3/+3 |
| | |||||
* | Simplify initialization of asn1_cb; use correct spelling of NULL. | tb | 2018-09-17 | 1 | -4/+2 |
| | |||||
* | sync with mozilla-release (one removal, TURKTRUST, more details at | sthen | 2018-09-12 | 1 | -48/+1 |
| | | | | | | https://bugzilla.mozilla.org/show_bug.cgi?id=1439127) ok danj guenther millert | ||||
* | tweak previous; | jmc | 2018-09-12 | 2 | -4/+4 |
| | |||||
* | Add some accessor functions: | djm | 2018-09-12 | 8 | -17/+138 |
| | | | | | | RSA_meth_get_finish() RSA_meth_set1_name() EVP_CIPHER_CTX_(get|set)_iv() feedback and ok jsing@ tb@ | ||||
* | ASN1_OBJECTs should be freed with ASN1_OBJECT_free(3), not with free(3). | tb | 2018-09-08 | 1 | -2/+2 |
| | | | | ok inoguchi, jsing | ||||
* | indent labels | tb | 2018-09-08 | 2 | -8/+8 |
| | |||||
* | missing word & a couple of typos | tb | 2018-09-08 | 1 | -3/+3 |
| | |||||
* | use timing-safe compares for checking results in signature verification | djm | 2018-09-05 | 4 | -9/+10 |
| | | | | | | (there are no known attacks, this is just inexpensive prudence) feedback and ok tb@ jsing@ | ||||
* | Elliptic curve arithmetic only makes sense between points that belong to | tb | 2018-09-02 | 1 | -1/+5 |
| | | | | | | | | | | | | the same curve. Some Wycheproof tests violate this assumption, making ECDH_compute_key() compute and return garbage. Check that pub_key lies on the curve of the private key so that the calculations make sense. Most paths that get here have this checked (in particular those from OpenSSH and libssl), but one might get here after using d2i_* or manual computation. discussed with & ok jsing; "good catch!" markus | ||||
* | Tweak comment. | tb | 2018-09-01 | 1 | -5/+2 |
| | |||||
* | Remove extra "and" in "These functions and have been available" | tb | 2018-08-28 | 1 | -3/+3 |
| | |||||
* | fix the same "an non" issue found by tb in EVP_EncryptInit.3; | jmc | 2018-08-26 | 1 | -3/+3 |
| | |||||
* | Some of the functions in this manual need <openssl/dsa.h>, others | tb | 2018-08-26 | 1 | -3/+45 |
| | | | | | | | | | need <openssl/x509.h>. The functions {d2i,i2d}_DSA_params_{bio,fp}(3) were missing from the manual, so document them. The return values of the i2d_* functions are left undocumented, as these still need to be audited. ok schwarze (lots of input and help as usual) | ||||
* | typo: an nonce -> a nonce | tb | 2018-08-26 | 1 | -3/+3 |
| | |||||
* | crank majors after symbol addition/modification/removal | tb | 2018-08-24 | 1 | -2/+2 |
| | |||||
* | Add const to EVP_PKCS82PKEY(). | tb | 2018-08-24 | 2 | -4/+4 |
| | | | | | tested in a bulk by sthen ok jsing | ||||
* | Add consts to EVP_PKEY_asn1_set_private() | tb | 2018-08-24 | 8 | -16/+16 |
| | | | | | | | | | Requires adding a const to the priv_decode() member of EVP_PKEY_ASN1_METHOD and adjusting all *_priv_decode() functions. All this is already documented this way. tested in a bulk build by sthen ok jsing | ||||
* | After removing support for broken PKCS#8 formats (it was high time), | tb | 2018-08-24 | 7 | -22/+19 |
| | | | | | | | | we can add const to PKCS8_pkey_get0(). In order for this to work, we need to sprinkle a few consts here and there. tested in a bulk by sthen ok jsing | ||||
* | Remove EVP_PKEY2PKCS8_broken() and PKCS8_set_broken() | tb | 2018-08-24 | 5 | -98/+46 |
| | | | | | | | | | | | Provide PKCS8_pkey_add1_attr_by_NID() and PKCS8_pkey_get0_attrs(). Remove the whole broken code and simplify pkcs8_priv_key_info_st accordingly. Based on OpenSSL commit 54dbf42398e23349b59f258a3dd60387bbc5ba13 plus some const that was added later. tested in a bulk build by sthen ok jsing | ||||
* | Document const change for OCSP_cert_to_id() | tb | 2018-08-24 | 1 | -4/+4 |
| | | | | ok jsing | ||||
* | Add const to two arguments of OCSP_cert_to_id() | tb | 2018-08-24 | 2 | -6/+7 |
| | | | | | tested in a bulk by sthen ok jsing | ||||
* | Provide X509_get0_serialNumber() | tb | 2018-08-24 | 3 | -2/+10 |
| | | | | | tested in a bulk by sthen ok jsing | ||||
* | Turn a number of #defines into proper functions with prototypes matching | tb | 2018-08-24 | 5 | -18/+80 |
| | | | | | | those that OpenSSL has had for ages. ok jsing | ||||
* | Change PEM_Sign{Init,Update}() to return an int. | tb | 2018-08-24 | 2 | -8/+8 |
| | | | | | tested in a bulk by sthen ok jsing | ||||
* | Check return value of EVP_EncodeUpdate() in PEM_write_bio(). | tb | 2018-08-24 | 1 | -2/+3 |
| | | | | ok jsing | ||||
* | Check return value of EVP_EncodeUpdate() in b64_write(). | tb | 2018-08-24 | 1 | -3/+4 |
| | | | | ok jsing | ||||
* | Convert EVP_EncodeUpdate() to return an int to allow for error | tb | 2018-08-24 | 2 | -8/+10 |
| | | | | | | | | | checking. Matches our documented behavior. Based on OpenSSL commit c5ebfcab713a82a1d46a51c8c2668c419425b387 tested in a bulk by sthen ok jsing | ||||
* | Provide EVP_CIPHER_CTX_encrypting(). | tb | 2018-08-24 | 3 | -2/+10 |
| | | | | | tested in a bulk by sthen ok jsing | ||||
* | Document prototype change and return values for BIO_set_cipher() | tb | 2018-08-24 | 1 | -3/+5 |
| | | | | ok jsing | ||||
* | Return an int in BIO_set_cipher() to be able to report errors. | tb | 2018-08-24 | 2 | -13/+22 |
| | | | | | tested in a bulk by sthen ok jsing | ||||
* | In DSO_up_ref(), check return value of CRYPTO_add() and report | tb | 2018-08-24 | 1 | -3/+5 |
| | | | | | | failure accordingly. ok jsing | ||||
* | In ENGINE_up_ref(), check return value of CRYPTO_add() and report | tb | 2018-08-24 | 1 | -3/+5 |
| | | | | | | failure accordingly. ok jsing | ||||
* | Document new prototype and return values of X509_OBJECT_up_ref_count() | tb | 2018-08-24 | 1 | -3/+6 |
| | | | | ok jsing | ||||
* | Make X509_OBJECT_up_ref_count return an int. | tb | 2018-08-24 | 2 | -9/+7 |
| | | | | | | | Based on OpenSSL commit c5ebfcab713a82a1d46a51c8c2668c419425b387 tested in a bulk by sthen ok jsing | ||||
* | Update documentation of CRYPTO_mem_leaks*. | tb | 2018-08-24 | 1 | -6/+12 |
| | | | | ok jsing | ||||
* | Let CRYPTO_mem_leaks{,_fp,_cb}() return -1. | tb | 2018-08-24 | 2 | -12/+12 |
| | | | | | | | | | These functions are no-ops. Their signature was changed by OpenSSL to allow error checking. This way we return an error and do not indicate the (non-)existence of memory leaks. tested in a bulk by sthen ok jsing | ||||
* | Don't leak sktmp in X509_verify_cert(). | tb | 2018-08-19 | 1 | -5/+5 |
| | | | | | | CID #118791 ok jsing mestre | ||||
* | whitespace fix | tb | 2018-08-19 | 1 | -2/+2 |
| | |||||
* | Don't leak db on error in RSA_padding_check_PKCS1_OAEP(). | tb | 2018-08-19 | 1 | -7/+7 |
| | | | | | | CID #183499. input & ok jsing, ok mestre on first version | ||||
* | Add a comment that explains what the check is doing and why len >= 1. | tb | 2018-08-14 | 1 | -1/+2 |
| | | | | Prompted by a remark by jsing | ||||
* | The UI_add_{input,verify}_string() functions want a length not including | tb | 2018-08-14 | 1 | -5/+8 |
| | | | | | | | | | | | | | | the terminating NUL. EVP_read_pw_string_min() got this wrong, leading to a one-byte buffer overrun in all callers of EVP_read_pw_string(). Found by mestre running 'openssl passwd' with MALLOC_OPTIONS including C. Fix this by doing some basic sanity checking in EVP_read_pw_string_min(). Cap the len argument at BUFSIZ and ensure that min < len as well as 0 <= min and 1 <= len. The last two checks are important as these numbers may end up in reallocarray(). ok bcook (on previous version), jsing, mestre | ||||
* | Add glue to EVP_md5_sha1() so that it can be used with EVP_Sign* and | jsing | 2018-08-10 | 1 | -1/+12 |
| | | | | | | EVP_Verify*. ok tb@ | ||||
* | Add missing include to X25519 synopsis. | jsing | 2018-08-10 | 1 | -2/+3 |
| | |||||
* | typo: macro-generates wrappers -> macro-generated wrappers | tb | 2018-08-08 | 1 | -3/+3 |
| | |||||
* | Remove unnecessary NULL check from get_cert_by_subject sincelibressl-v2.8.0 | bcook | 2018-08-05 | 1 | -3/+3 |
| | | | | | | sk_BY_DIR_HASH_find already does it, removing ambiguity later in the function. ok tb@ | ||||
* | Fix a memory leak in i2d_RSA_NET on failure of ASN1_STRING_set. | bcook | 2018-08-05 | 1 | -2/+2 |
| | | | | | Found by Coverity. Feedback and ok tb@ | ||||
* | In RSA_padding_add_PKCS1_OAEP, dbmask needs to be freed on failure. | bcook | 2018-08-05 | 1 | -3/+7 |
| | | | | ok tb@ |