Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Rename EVP_aead_chacha20_poly1305() to EVP_aead_chacha20_poly1305_old() | jsing | 2016-04-28 | 1 | -2/+2 | |
| | | | | | | | and replace with EVP_aead_chacha20_poly1305_ietf(). The IETF version will become the standard version. Discussed with many. | |||||
* | decipher comment. ok bcook@ | mmcc | 2015-12-12 | 1 | -2/+2 | |
| | ||||||
* | Switch to miod's shiny new OPENSSL_cpu_caps() and we can now also enable | jsing | 2015-09-13 | 1 | -3/+3 | |
| | | | | | | the AES acceleration checking for i386. ok beck@ miod@ | |||||
* | If we have hardware acceleration for AES, prefer AES as a symmetric cipher | jsing | 2015-09-13 | 1 | -7/+30 | |
| | | | | | | over CHACHA20. Otherwise, prefer CHACHA20 with AES second. ok beck@ miod@ | |||||
* | Provide a SSL_CIPHER_get_by_value() function that allows a cipher to be | jsing | 2015-02-07 | 1 | -1/+19 | |
| | | | | | | | | | | | | | | retrieved via its cipher suite value. A corresponding SSL_CIPHER_by_value() function returns the cipher suite value for a given SSL_CIPHER. These functions should mean that software does not need to resort to put_cipher_by_char()/get_cipher_by_char() in order to locate a cipher. Begrudgingly also provide a SSL_CIPHER_get_by_id() function that locates a cipher via the internal cipher identifier. Unfortunately these have already been leaked outside the library via SSL_CIPHER_by_id() and the various SSL3_CK_* and TLS1_CK_* defines in the ssl3.h/tls1.h headers. ok beck@ miod@ | |||||
* | Add AEAD as a "MAC alias" so that it is possible to identify/select ciphers | jsing | 2015-01-26 | 1 | -1/+5 | |
| | | | | | | | | that use AEAD instead of a MAC. This allows for TLSv1.2 AEAD ciphers (effectively the only ciphers that are still considered to be secure) to be selected using TLSv1.2+AEAD as a cipher string. ok bcook@ doug@ miod@ | |||||
* | Remove trailing whitespace. | jsing | 2014-12-14 | 1 | -20/+20 | |
| | ||||||
* | Remove support for GOST R 34.10-94 signature authentication, along with | jsing | 2014-12-10 | 1 | -13/+4 | |
| | | | | | | | the two ciphersuites that use it. GOST94 public/private keys have been long obsoleted and libcrypto does not have support for them anyway. Discussed with Dmitry Eremin-Solenikov. | |||||
* | Remove get_optional_pkey_id() - it is a hack that existed due to GOST | jsing | 2014-12-07 | 1 | -46/+8 | |
| | | | | | | | | | | only sometimes being available... and when it was available it was via the crypto engine. GOST is now part of libcrypto proper. Instead of trying to do EVP PKEY lookups via string literals and the ASN1 interfaces, lookup the methods directly using the appropriate NID. ok bcook@ | |||||
* | Remove now bogus comment that got missed in the GOST commit. | jsing | 2014-12-06 | 1 | -5/+2 | |
| | ||||||
* | Fix some horrible style(9) violations... | jsing | 2014-12-06 | 1 | -63/+63 | |
| | ||||||
* | Update the GOST code in libssl, as contributed by Dmitry Eremin-Solenikov. | miod | 2014-11-18 | 1 | -10/+60 | |
| | | | | | This causes a libssl major version bump as this affects the layout of some internal-but-unfortunately-made-visible structs. | |||||
* | Sort and group includes. | jsing | 2014-11-16 | 1 | -1/+4 | |
| | ||||||
* | Clean up more SSLv2 remnants. | jsing | 2014-11-08 | 1 | -17/+5 | |
| | ||||||
* | Remove remnants from RC2 and SEED - there are no longer any cipher suites | jsing | 2014-11-02 | 1 | -40/+12 | |
| | | | | | | | that use these algorithms (and SEED was removed from libcrypto some time ago). ok doug@ | |||||
* | Add cipher aliases for DHE (the correct name for EDH) and ECDHE (the | jsing | 2014-10-15 | 1 | -1/+11 | |
| | | | | | correct name for EECDH). The EDH and EECDH aliases remain for backwards compatibility. | |||||
* | Use string literals in printf style calls so gcc's -Wformat works. | doug | 2014-10-03 | 1 | -3/+3 | |
| | | | | ok tedu@, miod@ | |||||
* | Add CHACHA20 as a cipher symmetric encryption alias. | jsing | 2014-09-19 | 1 | -1/+5 | |
| | | | | From Ming <gzchenym at 126.com> | |||||
* | Remove SSL_kDHr, SSL_kDHd and SSL_aDH. No supported ciphersuites use them, | jsing | 2014-09-07 | 1 | -39/+9 | |
| | | | | | | nor do we plan on supporting them. ok guenther@ | |||||
* | The correct name for EDH is DHE, likewise EECDH should be ECDHE. | jsing | 2014-07-12 | 1 | -14/+14 | |
| | | | | | | Based on changes to OpenSSL trunk. ok beck@ miod@ | |||||
* | Remove remnants from PSK, KRB5 and SRP. | jsing | 2014-07-12 | 1 | -59/+3 | |
| | | | | ok beck@ miod@ | |||||
* | Make disabling last cipher work. | guenther | 2014-07-12 | 1 | -9/+9 | |
| | | | | | From Thijs Alkemade via OpenSSL trunk ok miod@ | |||||
* | Remove the PSK code. We don't need to drag around this | beck | 2014-07-11 | 1 | -3/+1 | |
| | | | | | baggage. ok miod@ jsing@ | |||||
* | Remove more compression tendrils. | jsing | 2014-07-10 | 1 | -5/+1 | |
| | | | | ok tedu@ | |||||
* | Remove more compression related code. | jsing | 2014-07-10 | 1 | -10/+1 | |
| | ||||||
* | Put back some parts of the public SSL API that should not have been | jsing | 2014-07-10 | 1 | -1/+19 | |
| | | | | completely decompressed. | |||||
* | decompress libssl. ok beck jsing | tedu | 2014-07-10 | 1 | -173/+2 | |
| | ||||||
* | Clean up and simplify SSL_CIPHER_description by always using asprintf. If | jsing | 2014-07-09 | 1 | -54/+54 | |
| | | | | | | | a buffer was supplied then we copy the result into it. Also make the failure case return values match the documentation. Joint work with beck@ | |||||
* | tedu the SSL export cipher handling - since we do not have enabled export | jsing | 2014-07-09 | 1 | -53/+11 | |
| | | | | | | ciphers we no longer need the flags or code to support it. ok beck@ miod@ | |||||
* | Remove SSL_FIPS. | jsing | 2014-07-08 | 1 | -8/+1 | |
| | | | | ok deraadt@ miod@ | |||||
* | Use asprintf() instead of a fixed 128-byte size in SSL_CIPHER_description() | miod | 2014-06-18 | 1 | -11/+11 | |
| | | | | | | when no storage buffer is passed. ok deraadt@ tedu@ | |||||
* | In SSL_COMP_add_compression_method(), make sure error cases actually return | miod | 2014-06-18 | 1 | -2/+2 | |
| | | | | | | `error' rather than `success'. ok deraadt@ | |||||
* | Add ChaCha20-Poly1305 based ciphersuites. | jsing | 2014-06-13 | 1 | -2/+14 | |
| | | | | | | Based on Adam Langley's chromium patches. Tested by and ok sthen@ | |||||
* | tags as requested by miod and tedu | deraadt | 2014-06-12 | 1 | -1/+1 | |
| | ||||||
* | Add an SSL_CIPHER_ALGORITHM2_AEAD flag that is used to mark a cipher as | jsing | 2014-06-08 | 1 | -0/+38 | |
| | | | | | using EVP_AEAD. Also provide an EVP_AEAD-only equivalent of ssl_cipher_get_evp(). | |||||
* | Use C99 initialisers for cipher_aliases. This improves readability, | jsing | 2014-06-01 | 1 | -92/+332 | |
| | | | | | | | | removes the need for zero values to be specified (meaning that we usually specify two fields instead of 12), makes the field names grepable and protects from future field reordering/removal. ok beck@ miod@ | |||||
* | More KNF. | jsing | 2014-05-30 | 1 | -56/+73 | |
| | ||||||
* | unidef DH, ECDH, and ECDSA. there's no purpose to a libssl without them. | tedu | 2014-05-29 | 1 | -11/+0 | |
| | | | | ok deraadt jsing | |||||
* | repair KNF indent | deraadt | 2014-05-29 | 1 | -1/+1 | |
| | ||||||
* | Wrap some long lines. | jsing | 2014-05-27 | 1 | -4/+8 | |
| | ||||||
* | Remove MemCheck_{on,off} that escaped last time around. | jsing | 2014-05-27 | 1 | -4/+0 | |
| | ||||||
* | More KNF. | jsing | 2014-05-27 | 1 | -2/+2 | |
| | ||||||
* | Unchecked malloc() return value in SSL_COMP_add_compression_method(), in the | miod | 2014-05-26 | 1 | -0/+4 | |
| | | | | | !OPENSSL_NO_COMP case. Does not affect OpenBSD as we compile the opposite code path. | |||||
* | Remove TLS_DEBUG, SSL_DEBUG, CIPHER_DEBUG and OPENSSL_RI_DEBUG. Much of | jsing | 2014-05-25 | 1 | -13/+0 | |
| | | | | | | | this is sporadic, hacked up and can easily be put back in an improved form should we ever need it. ok miod@ | |||||
* | Turn off MemCheck_on and MemCheck_off. These calls are pointless since the | jsing | 2014-05-25 | 1 | -2/+0 | |
| | | | | | | crypto memory debugging code has been castrated. ok miod@ "kill it" beck@ | |||||
* | The ssl_ciper_get_evp() function is currently overloaded to also return the | jsing | 2014-05-25 | 1 | -22/+32 | |
| | | | | | | | | | | | compression associated with the SSL session. Based on one of Adam Langley's chromium diffs, factor out the compression handling code into a separate ssl_cipher_get_comp() function. Rewrite the compression handling code to avoid pointless duplication and so that failures are actually returned to and detectable by the caller. ok miod@ | |||||
* | In ssl_cipher_get_evp(), fix off-by-one in index validation before accessing | miod | 2014-05-24 | 1 | -2/+2 | |
| | | | | | | arrays. "kind of scary" deraadt@, ok guenther@ | |||||
* | KSSL is dead... nuke KSSL_DEBUG from orbit. | jsing | 2014-05-20 | 1 | -14/+0 | |
| | | | | ok beck@ miod@ | |||||
* | Remove SRP and Kerberos support from libssl. These are complex protocols | tedu | 2014-05-05 | 1 | -4/+0 | |
| | | | | | all on their own and we can't effectively maintain them without using them, which we don't. If the need arises, the code can be resurrected. | |||||
* | switch to reallocarray | tedu | 2014-04-22 | 1 | -2/+2 | |
| |