summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Collapse)AuthorAgeFilesLines
* This commit was manufactured by cvs2git to create tag 'OPENBSD_3_5_BASE'.OPENBSD_3_5_BASEcvs2svn2004-03-22676-171165/+0
|
* Unbreak rmd160. Was broken on sparc64 when compiled with gcc3. Fix and reporthshoexer2004-03-222-4/+4
| | | | | | | | | | by Simon Kellner. XXX This is only a temporary work-around and we still need a REAL fix for XXX this issue. Testing on different archs by marc@ tdvall@ millert@ otto@ ho@ miod@ hshoexer@ ok deraadt@
* Insert missing ABORT if EC_GROUP_copy() fails.tom2004-03-212-2/+2
| | | | ok markus@
* return(00); -> return(0); markus@ okaaron2004-03-172-4/+4
|
* out-of-bounds read in (unused) kerberos ciphersuites (CAN-2004-0112)markus2004-03-172-0/+32
|
* avoid null-pointer deref (aka CAN-2004-0079)markus2004-03-172-0/+16
| | | | see http://www.openssl.org/news/secadv_20040317.txt
* remove some weirdness;jmc2004-03-141-2/+1
|
* fix formatting, Pedro Martellettotedu2004-03-021-3/+3
|
* do not recommend a format string error..; pbastos@rdc.puc-rio.brderaadt2004-03-011-3/+3
|
* change amd64's MACHINE_ARCH from x86_64 to amd64. There are many manyderaadt2004-02-272-182/+2
| | | | | | reasons for this, quite a few of them technical, and not all of them in response to Intel's broken ia32e crud. The gcc toolchain stays at x86_64 for now.
* Sanity fix.tdeval2004-02-191-2/+5
| | | | reviewed by deraadt@, tedu@
* remove redundant code, u_int8_t cannot be > 0xffotto2004-02-161-16/+2
| | | | ok deraadt@ millert@
* Cleanup and shrink ACSS_KEY a bit. Thus crank library minor.hshoexer2004-02-137-39/+49
| | | | | | Change cipher modes to more generic names and add an additional mode. ok deraadt@ markus@
* kill memory.3;jmc2004-02-102-66/+1
| | | | suggested by deraadt@
* add MLINKS for 64-bit functions in byteorder(3);jmc2004-02-101-4/+6
| | | | passes miod's "make sure it doesn't break libc or libpthread" test;
* make Nm match Dt;jmc2004-02-101-10/+2
|
* make Nm match Dt; found by pb@jmc2004-02-091-23/+2
| | | | some of this ok espie@, all of it ok deraadt@
* simpler ssl manpages, using --name=.espie2004-02-091-117/+33
| | | | okay markus@
* punctuate variable; okay jmc@.espie2004-02-091-2/+2
|
* remove some debug code and cleanup..deraadt2004-02-042-36/+12
|
* Traditionally, getopt(3) has treated "--foo" the same as "--". However,millert2004-02-041-10/+9
| | | | | | | | this can cause confusion when a user tries to use a long option with a program that only supports short options. Furthermore, it appears to be in violation of POSIX, which states that "--" shall indicate the end of argument processing, not any string that begins with "--". OK otto@ and closes PR 3666.
* H comes before J;jmc2004-02-041-6/+6
|
* OK, this time the AES soft keys work with ssh and such. I spent over 3deraadt2004-02-032-32/+126
| | | | | hours learning that OpenSSL's internal functions for AES extended keys generate screwy byte order swapped data..
* oops, software key gen bugderaadt2004-02-032-70/+20
|
* Switch to using software generated extended keys (because the cpu cannotderaadt2004-02-032-20/+70
| | | | | | | | | | yet generate 192 & 256 bit keys). Ensure that 192 and 256 are in the nids table. This also accelerates performance for 128 a tiny bit: type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes aes-128-cbc 34921.48k 129617.82k 362059.93k 623649.81k 790397.77k aes-192-cbc 26227.43k 99215.33k 283242.84k 509881.15k 665323.22k aes-256-cbc 26133.22k 97458.06k 265990.84k 457824.69k 579835.09k
* Obsoleted by getopt_long.cmillert2004-02-031-116/+0
|
* Correct the arm ifdefs previously inserted, is working correctly now.drahn2004-02-031-3/+3
|
* config for arm, copied from powerpc/sparc ok markus@drahn2004-02-031-0/+180
|
* If on an i386, detect existance of the VIA C3 xcrypt-* using sysctl ofderaadt2004-02-032-8/+348
| | | | | | | | the machdep.xcrypt node. If they exist, use the xcrypt-cbc instruction to accelerate aes-{128,192,256}-cbc, for more than 100x performance increase. This code has no effect on any cpu... Tested thus far using openssl speed command, and of course, ssh. 778MB/sec AES-128-CBC performance at 8192 byte block size.
* 'F'reeguard doc, as reported missing by brad. nit free thanks to jmctedu2004-02-021-1/+8
|
* Add const type qualifier. ok jmc@nordin2004-02-012-4/+4
|
* s/arm32/arm/ with VFP bit to match netbsd.drahn2004-02-011-3/+3
|
* cleanup byte order detection per arch a bit; mickey okderaadt2004-01-291-14/+4
|
* the rest of the libs stuff; from art@ againmickey2004-01-283-2/+363
|
* use new .St macro;jmc2004-01-253-5/+5
|
* `Ns' implies `No', so `Ns No' -> `Ns'; (even simpler in adduser(8))jmc2004-01-235-10/+10
| | | | discussed with todd@
* Use correct cvs id string.hshoexer2004-01-236-6/+6
| | | | ok deraadt@
* remove junk return at endderaadt2004-01-232-4/+0
|
* enable acss.hshoexer2004-01-235-5/+17
| | | | | | | ok @deraadt @markus Also bump minor version. ok @deraadt
* evp api and manual page for acsshshoexer2004-01-233-0/+236
| | | | ok deraadt@ markus@
* Add acss to libcrypto.hshoexer2004-01-236-0/+614
| | | | ok deraadt@ markus@
* Call _exit() not exit() from abort() if we are unable to kill ourselvesmillert2004-01-201-3/+3
| | | | | to avoid flushing stdio twice. This code path should never really happen though. Also make the function declaration ANSI. OK deraadt@
* Fix the example code. The loop invariant 'i' was not bound by MAXTOKENSmillert2004-01-201-3/+3
| | | | | which could result in writing a NUL byte outside of tokens[]. A fix, from Patrick Latifi, is to move the increment into the "i < MAXTOKENS - 1" block.
* Fix printf format string. ok markus@otto2004-01-141-1/+1
|
* - Rename index to longindex and explain its use.fgsch2004-01-061-9/+20
| | | | | | | | - Talk about zeroing the last element of the longopts array. - Remove '?' from the switch and some KNF to the code. - Change 0's to NULL where appropriate. jmc@ ok.
* sync protos with <netdb.h>;jmc2003-12-301-3/+3
| | | | from Andrey Matveev;
* niels kindly dropped clause 3/4 from the license. tnx!itojun2003-12-121-6/+1
|
* we can skip arc4random() call here. markusitojun2003-12-121-2/+2
|
* correct non-repetitive ID code, based on comments from niels provos.itojun2003-12-101-12/+16
| | | | | | - seed2 is necessary, but use it as "seed2 + x" not "seed2 ^ x". - skipping number is not needed, so disable it for 16bit generator (makes the repetition period to 30000)
* Discard first 256 bytes of keystream, as per recommendation indjm2003-11-261-1/+10
| | | | | "Weaknesses in the Key Scheduling Algorithm of RC4", Fluhrer, Mantin and Shamir. ok itojun@