Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | http -> https for IETF/IANA URLs in comments | mmcc | 2016-03-07 | 2 | -8/+8 |
| | |||||
* | explict_bzero for some asn1 free's - ok miod@ | beck | 2016-03-06 | 2 | -3/+9 |
| | |||||
* | Make sure stdio functions don't end up in the library, from miod@ | beck | 2016-03-06 | 7 | -15/+39 |
| | | | | ok doug@ bcook@ | ||||
* | graduate bn_expand() to a real function. the openssl version of this | deraadt | 2016-03-04 | 2 | -4/+16 |
| | | | | | | | uses a macro with multiple-evaluations of arguments (different amount than the previous version..), but doug/bcook's inline version makes BIGNUM not opaque [problem spotted by naddy] ok doug | ||||
* | Revert bn_expand until there's consensus on a fix. | doug | 2016-03-04 | 1 | -14/+3 |
| | |||||
* | fix the rest of the read_ledword() calls used as lengths to be bounded. | beck | 2016-03-02 | 1 | -1/+5 |
| | | | | | inspired by guido vranken https://guidovranken.wordpress.com/2016/03/01/public-disclosure-malformed-private-keys-lead-to-heap-corruption-in-b2i_pvk_bio/ ok doug@ | ||||
* | Add bounds checking for BN_hex2bn/BN_dec2bn. | doug | 2016-03-02 | 2 | -10/+26 |
| | | | | | | | | | Need to make sure i * 4 won't overflow. Based on OpenSSL: commit 99ba9fd02fd481eb971023a3a0a251a37eb87e4c input + ok bcook@ ok beck@ | ||||
* | bound lengths coming out of a pem file to something like reality | beck | 2016-03-02 | 1 | -3/+7 |
| | | | | ok deraadt@ | ||||
* | Remove support for ancient, broken DSA implementations. | doug | 2016-03-01 | 1 | -60/+20 |
| | | | | | | | | | | | | | | | Based on a few OpenSSL commits: Remove ancient DSA workarounds commit ab4a81f69ec88d06c9d8de15326b9296d7f498ed Remove workaround for broken DSA implementations using negative integers commit dfb10af92e9663ce4eefaa1d6b678817fa85344d Typo in error name (EVP_R_DECODE_ERROR -> DSA_R_DECODE_ERROR) commit f6fb7f1856d443185c23f1a5968c08b4269dd37d ok beck@ | ||||
* | remove NULL checks for pqueue_free() | mmcc | 2016-02-29 | 2 | -22/+12 |
| | | | | ok doug@ | ||||
* | Therefor -> Therefore (where appropriate) | tb | 2016-01-29 | 2 | -2/+2 |
| | | | | from ray@, ok jmc@ | ||||
* | deprecate SSL_OP_SINGLE_DH_USElibressl-v2.3.2 | beck | 2016-01-27 | 4 | -74/+12 |
| | | | | ok jsing@ | ||||
* | Document that the ssl free() functions are NULL safe. OK mmcc@ | millert | 2015-12-30 | 6 | -12/+42 |
| | |||||
* | More adress -> address | mmcc | 2015-12-24 | 2 | -2/+2 |
| | |||||
* | remove NULL-checks before free() | mmcc | 2015-12-23 | 3 | -19/+11 |
| | |||||
* | assign pointer NULL rather than 0 | mmcc | 2015-12-23 | 1 | -2/+2 |
| | |||||
* | assign pointer to NULL rather than 0 | mmcc | 2015-12-23 | 1 | -2/+2 |
| | |||||
* | initialize a pointer to NULL rather than 0 | mmcc | 2015-12-22 | 1 | -2/+2 |
| | |||||
* | initialize ext_len to 0. | beck | 2015-12-14 | 1 | -2/+6 |
| | | | | ok guenther@ | ||||
* | initialize ok to 0 | beck | 2015-12-14 | 1 | -2/+2 |
| | | | | ok guenther@ | ||||
* | initialize md_len to 0 for readability to quell warnings. | beck | 2015-12-14 | 1 | -3/+3 |
| | | | | ok guenther@ | ||||
* | decipher comment. ok bcook@ | mmcc | 2015-12-12 | 2 | -4/+4 |
| | |||||
* | move initialization of buf up to quell warnings and make it obvious the err ↵ | beck | 2015-12-12 | 1 | -4/+5 |
| | | | | | | case is ok. ok bcook@ | ||||
* | prevent possibly use of uninitialized variable | beck | 2015-12-12 | 1 | -2/+2 |
| | | | | ok bcook@ | ||||
* | make the counter a size_t as well, which quells a warning on visual studio 2015 | beck | 2015-12-12 | 1 | -2/+3 |
| | | | | ok bcook@ | ||||
* | bump the major for libcrypto/ssl/tls for a CRYPTO_chacha_20 ABI change | bcook | 2015-12-09 | 2 | -4/+4 |
| | | | | ok jsing@, deraadt@, beck@ | ||||
* | Change the counter argument for CRYPTO_chacha_20 to be 64-bits on all platforms. | bcook | 2015-12-09 | 2 | -5/+6 |
| | | | | | | | | | | | The recently-added EVP_aead_chacha20_poly1305_ietf() function, which implements informational RFC 7539, "ChaCha20 and Poly1305 for IETF Protocols", needs a 64-bit counter to avoid truncation on 32-bit platforms. The existing TLS ChaCha20-Poly1305 ciphersuite is not impacted by this, but making this change requires an ABI bump. ok jsing@, "Looks sane" beck@ | ||||
* | Remove SHA0 check, as we did in v1.21 of sha.h. | bcook | 2015-12-07 | 1 | -2/+2 |
| | | | | | | This enables ENGINE_get_digest to work again with SHA1. noted by NARUSE, Yui, @nurse from github | ||||
* | Fix for OpenSSL CVE-2015-3195 | beck | 2015-12-04 | 1 | -3/+8 |
| | | | | ok djm@ jsing@ | ||||
* | Fix for OpenSSL CVE-2015-3194 | beck | 2015-12-03 | 1 | -2/+2 |
| | | | | ok krw@ | ||||
* | fix references to lhash(3); | jmc | 2015-11-15 | 2 | -14/+16 |
| | |||||
* | mutli -> multi | miod | 2015-11-14 | 1 | -1/+1 |
| | |||||
* | Various *syncron* -> *synchron* typos. | miod | 2015-11-14 | 1 | -1/+1 |
| | |||||
* | update cross references after deleting the imaginary MLINKS | schwarze | 2015-11-12 | 2 | -2/+2 |
| | | | | bn_internal(3) and lhash(3) | ||||
* | Convert the handful of manuals that had imaginary names, | schwarze | 2015-11-12 | 6 | -1055/+0 |
| | | | | | give them names that really exist. This also helps jmc@'s ongoing work on improving NAME sections. | ||||
* | add missing functions to NAME, or otherwise correct the mlink | jmc | 2015-11-11 | 20 | -43/+69 |
| | | | | | | entry for them; feedback/ok schwarze | ||||
* | Convert five more manuals from POD to mdoc. | schwarze | 2015-11-11 | 5 | -458/+0 |
| | | | | | I found drafts of these in my tree, probably originally from Max Fillinger, that just needed minor polishing. | ||||
* | Convert and enable CMS manuals. | schwarze | 2015-11-11 | 16 | -1234/+0 |
| | | | | Already some time ago, bcook@ said these can be installed. | ||||
* | SSL_CTX_sess_set_remove mlink should be SSL_CTX_sess_set_remove_cb; | jmc | 2015-11-10 | 1 | -2/+2 |
| | |||||
* | Fix gcc version preprocessor checks to cope with gcc 5.x and beyond; | miod | 2015-11-06 | 1 | -2/+2 |
| | | | | reported by Ruslan Babayev. | ||||
* | Cast Td4[] values (which are uint8_t) to uint32_t before shifting them left by | miod | 2015-11-05 | 1 | -5/+5 |
| | | | | | | | | | 24 bits; if we don't, Td4[] gets cast to signed int, and according to C>=99 6.5.7, signed int shifted by enough bits to cause a the sign bit to be set is an UB. Reported by Pascal Cuoq on behalf of the trust-in-soft.com mafia I am {partial,slightly related} to. | ||||
* | Mention ROTL() is always invoked with a proper shift value, due to the way the | miod | 2015-11-05 | 1 | -1/+2 |
| | | | | | CAST_KEY is constructed. This is expected to reduce blood pressure in auditors. | ||||
* | bump to 2.3.2, format LIBRESSL_VERSION_NUMBER like OPENSSL_VERSION_NUMBER. | bcook | 2015-11-03 | 1 | -3/+3 |
| | | | | | | Suggested by WubTheCaptain so the same comparison code can be used with LibreSSL. https://www.openssl.org/docs/manmaster/crypto/OPENSSL_VERSION_NUMBER.html | ||||
* | Fix typo in comment of previous commit: "that that". | reyk | 2015-11-02 | 1 | -3/+3 |
| | |||||
* | bump minors after adding EVP_aead_chacha20_poly1305_ietf() | reyk | 2015-11-02 | 2 | -2/+2 |
| | | | | OK jsing@ | ||||
* | Add EVP_aead_chacha20_poly1305_ietf() - The informational RFC 7539, | reyk | 2015-11-02 | 2 | -19/+113 |
| | | | | | | | | | "ChaCha20 and Poly1305 for IETF Protocols", introduced a modified AEAD construction that is incompatible with the common style that has been already used in TLS with EVP_aead_chacha20_poly1305(). The IETF version also adds a constant (salt) that is prepended to the nonce. OK mikeb@ jsing@ | ||||
* | Pull in <sys/types.h> to get ssize_t or <stdint.h> to get uint32_t, instead of | miod | 2015-10-30 | 1 | -1/+2 |
| | | | | | relying upon previously included headers to do this, to enhance portability; from Pascal Cuoq, libressl github pull request #52 | ||||
* | Sort the obsolete flags. | doug | 2015-10-25 | 2 | -12/+12 |
| | |||||
* | Mark SSL_OP_NO_{COMPRESSION,SSLv2,SSLv3} as obsolete. | doug | 2015-10-25 | 2 | -10/+8 |
| | | | | | | For backward compatibility, the flags are redefined as 0. ok jsing@ | ||||
* | Remove last vestige of SSL_OP_NO_SSLv3 support. | doug | 2015-10-25 | 2 | -8/+2 |
| | | | | | | No part of LibreSSL checks for this flag any longer. ok jsing@ |