summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Better fixes from openssl cvs; from markus@miod2002-08-051-3/+4
|
* typo; from openssl cvsmarkus2002-08-021-1/+1
|
* sync with http://www.openssl.org/news/patch_20020730_0_9_7.txtmarkus2002-07-302-9/+9
| | | | | (adds fix for unused kerberos and engine code, and some more assertions, as well as a 64bit integer string fix for conf_mod.c)
* apply patches from OpenSSL Security Advisory [30 July 2002],markus2002-07-304-6/+12
| | | | http://marc.theaimsgroup.com/?l=openssl-dev&m=102802395104110&w=2
* remove #define crypt DES_crypt; ok deraadt@markus2002-07-191-4/+0
|
* correct memset arguments; from Moritz Jodeit <moritz@jodeit.org> via PR/2822.fgsch2002-07-161-2/+2
|
* enviroment -> environmentjufi2002-07-071-2/+2
|
* remove support for RC4 via /dev/crypto, suggested by Niels; ok provos@markus2002-06-201-18/+0
|
* do not syslog from libraries!deraadt2002-06-191-10/+1
|
* KNF, -Wall, and other cleanups. still does not failover 100% correctlyderaadt2002-06-191-22/+52
| | | | for operations when /dev/crypto is missing, for instance in chroot
* stupid stupid bug ja ja ja jaderaadt2002-06-191-1/+1
|
* unbreak sshd with privsep: open /dev/crypto, keep fd, and callmarkus2002-06-181-5/+20
| | | | CRIOGET per EVP_Init(); ok niklas@, miod@
* per-evp state is now sizeof(struct dev_crypto_state) instead sizeof(struct ↵markus2002-06-181-6/+6
| | | | session_op)
* keep a FD per EVP_init, use a global FD for all asym operations;markus2002-06-131-83/+85
| | | | ok beck@
* KNFderaadt2002-06-111-19/+16
|
* add "dsa_dsa_mod_exp" - This mimics the software dsa_mod_exp funtionbeck2002-06-111-3/+37
| | | | | | | using two mod_exp operations - otherwise we use BN_mod_exp2 entirely in software, which makes dsa verifications glacially slow while signatures, (which use mod_exp) are fast. This lets cards that can only do bn_mod_exp decently offload most of dsa.
* Make DSA work now... at least for things that can do bn_mod_exp.beck2002-06-111-7/+4
|
* Make asymmetric crypto work in userlandbeck2002-06-111-36/+114
| | | | | this will only be used if you both have a card that supports it with a working driver and you set sysctl kern.userasymcrypto=1
* Pass the right arguments for RSA, DSA, and modexp operations. Fix theangelos2002-06-091-30/+37
| | | | translation between the crypto framework's format and the BN structure.
* After much horrible and painful slogging through asn1 code,beck2002-06-081-0/+1
| | | | | | | | | | this fixes the source of connection problems with ssl/tls connections between sparc64 and other things. The punchline, we just found a bug in floating point emulation on sparc64 when this script produces off-by-one output on sparc64. This fix is annoyingly easy for the effort expended.
* Merge OpenSSL 0.9.7-stable-20020605,beck2002-06-0738-2450/+366
| | | | correctly autogenerate obj_mac.h
* sig_atomic_t type must also be volatilederaadt2002-06-031-1/+1
|
* do not assume scripts are executablederaadt2002-05-256-6/+6
|
* Merge openssl-0.9.7-stable-SNAP-20020519beck2002-05-2111-36/+69
|
* add aes/bf/cast; ok deraadt@markus2002-05-161-2/+50
|
* use hw_cryptodevderaadt2002-05-161-24/+24
|
* Damn my rush to make it build again.beck2002-05-151-2842/+0
|
* OpenSSL 0.9.7 stable 2002 05 08 mergebeck2002-05-15632-17104/+65035
|
* fix to match documented behaviour. RAND_file_name must return a pointer tobeck2001-12-201-9/+13
| | | | buf, not something else.
* merge openssl 0.9.6b-enginebeck2001-08-0119-256/+390
| | | | | Note that this is a maintenence release, API's appear *not* to have changed. As such, I have only increased the minor number on these libraries
* http://www.openssl.org/news/secadv_prng.txt; ok beck@markus2001-08-011-8/+17
|
* openssl-engine-0.9.6a mergebeck2001-06-22121-443/+958
|
* typoderaadt2001-06-161-1/+0
|
* import DSA changes from 0.9.6a (Bleichenbacher attack), ok provos@/deraadt@markus2001-04-233-21/+66
|
* CRT and DH+SSL fix from 0.9.6a, ok provos@/deraadt@markus2001-04-221-1/+11
|
* Use correct interpretersniklas2001-01-261-2/+2
|
* make sure s always has enough from for trailing \0. even though strlcpy willbeck2001-01-121-1/+1
| | | | truncate, thanks to itojun@
* do not honour environment variables if issetugid, and even more strongly ↵deraadt2001-01-022-18/+19
| | | | support the random device
* fix util script runs to not assume they are executable.beck2000-12-183-3/+3
|
* openssl-engine0.9.6 mergebeck2000-12-1589-0/+0
| | | | Again, be sure to whack an old /usr/obj/lib/libssl if you are doing builds
* openssl-engine-0.9.6 mergebeck2000-12-15427-12838/+34187
|
* Fix typo; claudio@core-sdi.com.fgsch2000-10-101-1/+1
|
* $HOME paranoia: never use getenv("HOME") w/o checking for NULL and non-zeromillert2000-08-021-1/+1
|
* use %s with fprintfderaadt2000-07-071-1/+1
|
* RSA goes in tree for next our next release, as it will be afterbeck2000-06-152-33/+322
| | | | | | Sept 21. Note: This means you shouldn't really be running -current for anything in the United States. Either wait for Sept 21, or for the next release, or move to the free world :)
* Fix strcpy/strcat abuse and fix stupid behaviour of the defaultbeck2000-04-161-7/+24
| | | | | | | RAND_file_name - changed so that it stats the filename it returns before returing it. If the file won't stat, return DEVRANDOM (for us /dev/arandom) instead, thus making the default behaviour moderately intelligent.
* Fix randfile so it doesn't attempt to chmod and write entropy back tobeck2000-04-161-1/+14
| | | | | | devices. This caused people's /dev/arandom's to be permitted 600, which causes rsa to fail to get random data, which results in all kinds of fun with ssh :)
* link to correct renamed pagesderaadt2000-04-164-10/+10
|
* Fix this for the case where the file is a device - make sure we don'tbeck2000-04-161-5/+14
| | | | attempt to read from a device forever.
* OpenSSL 0.9.5a mergebeck2000-04-15147-18188/+1798
|