summaryrefslogtreecommitdiff
path: root/lib/libcrypto
AgeCommit message (Collapse)Author
2024-03-02include <time.h> for time_t and struct tm, needed for macosTheo Buehler
ok millert miod
2024-03-02Remove some GOST relicsTheo Buehler
2024-03-02Crank libressl version to 3.9.0 (finally!)Theo Buehler
2024-03-02crank libcrypto majorTheo Buehler
There were symbol addition, removal, function signature changes and struct visibility changes.
2024-03-02Change sk in CRYPTO_EX_DATA from STACK_OF(void) * to void *Theo Buehler
Requested by jsing
2024-03-02tedu OPENSSL_isservice() prototypeTheo Buehler
When tedu tedued OPENSSL_isservice(), tedus chainsaw missed crypto.h. Finish the teduing of the hack for Visual C++ 5.0 (!), which is still present in the latest and greatest OpenSSL. ok jsing
2024-03-02Make CRYPTO_THREADID opaqueTheo Buehler
With ERR_STATE out of the way, we can make CRYPTO_THREADID opaque. The type is still accessed by used public API, but some of the public API can also go away. ok jsing
2024-03-02Fix CRYPTO_malloc/free signaturesTheo Buehler
Importantly, the size in malloc is now a size_t instead of an int. The API now also takes a file and line to match upstream's signature. ok jsing
2024-03-02Remove CRYPTO_*infoTheo Buehler
Long time neutered, only used (pointlessly without error checking) in the error code until very recently. ok jsing
2024-03-02Remove a bunch of CRYPTO memory APITheo Buehler
This was neutered early on in the fork and has been rotting ever since. Some parts of the API are still used, but it's easier to clean up when most of the mess is gone. ok jsing
2024-03-02Update list of OPENSSL_NO_*Theo Buehler
This syncs the list with some version of upstream and exposes a few OPENSSL_NO_* that may now be relevant. from jsing (a long time ago)
2024-03-02Remove a few no longer used sk_FOO_* stanzasTheo Buehler
ok jsing
2024-03-02Remove sk_find_ex()Theo Buehler
This API intends to find the closest match to the needle. M2Crypto exposes it because it can. This will be fixed by patching the port. ok jsing
2024-03-02Unhook and remove GOST and STREEBOGTheo Buehler
This stops compiling the GOST source. The current implementation is low quality and got in the way, especially in libssl. While we would be open for GOST support, it needs to be significantly better than what we have had and it also needs a maintainer. Add OPENSSL_NO_GOST to opensslfeatures and stop installing gost.h. Some code wrapped in #ifndef OPENSSL_NO_GOST will be removed later. ok jsing
2024-03-02Make LHASH_OF() and STACK_OF() use opaque structsTheo Buehler
This removes internals of these two special snowflakes and will allow further simplifications. Unfortunately, there are some pieces of software that actually use LHASH_OF() (looking at you, pound, Ruby, and openssl(1)), so we get to keep exposing this garbage, at least for now. Expose lh_error() as a symbol to replace a macro reaching into _LHASH. lh_down_load() is no longer available. _LHASH and _STACK are now opaque, LHASH_NODE becomes internal-only. from jsing
2024-03-02Remove lh statsTheo Buehler
This could have been removed in an earlier bump. Now it's time for it to say goodbye. ok jsing
2024-03-02Remove X509_CRL_METHOD APITheo Buehler
I would keep repeating myself... In the bit bucket you go. ok jsing
2024-03-02Garbage collect most of the public LOOKUP APITheo Buehler
Yet another bit of extensibility that no one ever really used. X509_LOOKUP_free() needs to stay because of ... rust-openssl (and kdelibs4support). ok jsing
2024-03-02Expose X509_STORE_get1_objects()Theo Buehler
Safer replacement API for the unsafe X509_STORE_get0_objects(). ok jsing
2024-03-02Make X509_CERT_AUX internalTheo Buehler
Another struct/API that should never have leaked out of the library. ok jsing
2024-03-02Remove X509_TRUST from the public APITheo Buehler
With API and other users internal, this struct can now go. ok jsing
2024-03-02Remove DECLARE_STACK_OF(X509_TRUST)Theo Buehler
Unused since the extensibility was neutered. ok jsing
2024-03-02Remove unused public X509_TRUST APITheo Buehler
Another thing that should never have leaked out of the library. It will become internal entirely, where the code can be simplified greatly. ok jsing
2024-03-02const correct X509_PURPOSE_get0{,_{,s}name}()Theo Buehler
Unfortunately, PHP and rust-openssl still need this API. At least we can make the table read-only now since we disabled its extensibility. ok jsing
2024-03-02Make X509_PURPOSE opaqueTheo Buehler
Code using details of X509_PURPOSE does so by using API. So we can make this struct opaque. ok jsing
2024-03-02Remove unused parts of the purpose APITheo Buehler
Most of this is the ability to add custom purposes. Also the astounding X509_STORE_CTX_purpose_inherit(). The names are used by PHP, and M2Crypto exposes X509_check_purpose(), so these remain public. Some weird, most likely invalid, uses also remain in rust-openssl. ok jsing
2024-03-02Remove X509V3_EXT extensibility APITheo Buehler
You used to be able to define your own X.509 extension handlers. Great. Even greater: the verifier would ignore any custom extensions. So this was only ever useful for serialization and deserialization. In other words, almost entirely pointless. The API was also unused except for a hack in kore-acme, which was fixed recently. ok jsing
2024-03-02Remove X509_ALGOR_set_md()Theo Buehler
One of those void APIs that are super hard to use safely since they can fail but can't communicate failure. Nothing uses this. Internal uses have been converted to error checked X509_ALGOR_set_evp_md(). ok jsing
2024-03-02Adjust signature of ERR_load_strings()Theo Buehler
This aligns the prototypes with OpenSSL 1.1. ok jsing
2024-03-02Remove ERR_get_stateTheo Buehler
The ERR_STATE struct is an unused implementation detail of the horrific error stack code. It is the last public consumer of CRYPTO_THREAD internals. Make this and its accessor internal so we can make the CRYPTO_THREAD struct opaque. ok jsing
2024-03-02Simplify engine.hTheo Buehler
Garbage collect some more of this former horror show. ok jsing
2024-03-02Garbage collect CUSTOM_KEY_LENGTH/SET_KEY_LENGTHTheo Buehler
These are unused defines that used to add unwanted complications in EVP_CIPHER_CTX_set_key_lenght(). ok jsing
2024-03-02Remove more PBE stuff from the public APITheo Buehler
This is still needed internally for CMS and its predecessors. This removal will enable disentangling some of its innards. ok jsing
2024-03-02Remove most PBEPARAM stuff from public visibilityTheo Buehler
The struct itself needs to remain public, unfortunately. ok jsing
2024-03-02Remove a lot of PKCS12 garbage from the public APITheo Buehler
PKCS12 is a hot mess. Please participate in the survey at the end of https://www.cs.auckland.ac.nz/~pgut001/pubs/pfx.html to increase its credibility and unanimity. ok jsing
2024-03-02Remove RC4-HMAC-MD5 and AES-{128,256}-CBC-HMAC-SHA-1Theo Buehler
"Stitched" mode AEADs were removed from libssl a long time ago. Nothing uses these CIPHERs anymore. ok jsing
2024-03-02Make legacy cipher methods internalTheo Buehler
These are ASN.1 handlers for CIPHERs, still used by CMS and its predecessors. They should never have been public. ok jsing
2024-03-02Remove EVP_PBE_* API from public visibilityTheo Buehler
You can no longer add your custom PBE algorithm. Pity. EVP_PBE_CipherInit() stays for internal use, the rest goes away copmletely. ok jsing
2024-03-02Remove EVP_PKEY_meth_*() APITheo Buehler
After ameth, the second bit of custom EVP_PKEY API removal. ok jsing
2024-03-02Remove the ameth libTheo Buehler
This is accessor API for ASN.1 methods needed for custom PKEYs. Nothing has ever used this. This has been neutered for months. The EVP_PKEY_asn1_* API that needs to stay was moved elsewhere. ok jsing
2024-03-02Remove EVP_MD_meth* againTheo Buehler
Erlang upstream disabled the otp_test_engine for LibreSSL >= 3.5 without explanation. It was the only reason we added this garbage API in the first place. Meanwhile libfido2 started using it for a mock up of OpenSSL 3's broken fetch design with old API. This is pointless, so all this garbage goes away again (in particular we can remove the absolutely horrifying EVP_MD_meth_set_app_datasize() again). ok jsing
2024-03-02Fix signature and semantics of EVP_{CIPHER,MD}_CTX_init()Theo Buehler
When the EVP_CIPHER_CTX and the EVP_MD_CTX were still expected to live on the stack, these initialization APIs were wrappers around memset. In OpenSSL 1.1, somebody removed them and carelessly made _init() an alias of _reset() aka _cleanup(). As a consequence, both signature and semantics changed. Unsurprisingly, there is now code out there that actually uses the new semantics, which causes leaks on LibreSSL and older OpenSSL. This aligns our _init() with OpenSSL 1.1 semantics. ok jsing
2024-03-02Remove unused OBJ_create_and_add_object()Theo Buehler
This is an alias for OBJ_create(). I haven't dug into its history. ok jsing
2024-03-02Remove no longer supported OBJ_NAME_TYPEsTheo Buehler
OBJ_NAME_TYPE_PKEY_METH and OBJ_NAME_TYPE_COMP_METH were never used as far as I can tell. Unfortunately, PHP and Python still use the weirdly named OBJ_NAME_do_all*() API to list available ciphers and digests, so the MD and CIPHER variants need to remain public. ok jsing
2024-03-02Make OBJ_add_object() staticTheo Buehler
This is another implementation detail that should never have leaked out of the library. Only OBJ_create() ever used this. ok jsing
2024-03-02Remove OBJ_bsearch_()Theo Buehler
The only reason this has still been part of the public API was that libssl used it for cipher lookup. This was fixed by replacing the lookup by proper bsearch() -- why OpenSSL felt the need to reinvent ANSI C API badly will forever remain a mystery. The stack code in libcrypto still uses a version of this. This should be rewritten. It will be a bit easier once sk_find_ex() is removed. ok jsing
2024-03-02Switch name member of OBJ_NAME to const void *Theo Buehler
Because this is the type it should have had from the get go. ok jsing
2024-03-02Remove unused public OBJ_NAME_* APITheo Buehler
This functionality has been disabled for a few months. Now it is high time to garbage collect it. ok jsing
2024-03-02Remove EVP_{add,delete}_{cipher,digest}_alias()Theo Buehler
These are macro wrappers around the neutered OBJ_NAME_{add,remove}() API (notice the consistency), which will be removed shortly. Only security/xca used to use this. ok jsing
2024-03-02Remove EVP_add_{cipher,digest}() from public APITheo Buehler
Ciphers and digests are now handled in a static lookup table and no longer by the associative array that used to underlie the OBJ_NAME API. Adding ciphers is no longer possible. What uses this API does so for historic reasons coming from a time where SHA-2 and some AES variants needed to be enabled explicitly. Ports doing this (PHP and DANE code) were fixed. ok jsing