summaryrefslogtreecommitdiff
path: root/lib
AgeCommit message (Collapse)Author
2019-03-22that "device" is an abstraction to the underlying OS PRNG.Marc Espie
In OpenBSD's case, we know it has optimal entropy properties, so just say so. okay mikeb@, "why not" deraadt@
2016-09-03Import libc++ 3.9.0Patrick Wildt
2019-03-21Reference permissions in the canonical plural.rob
ok jmc@
2019-03-21import EVP_camellia_128_cbc(3) from OpenSSL 1.1.1,Ingo Schwarze
still under a free license, tweaked by me
2019-03-21space before punct;Jason McIntyre
2019-03-21Split EVP_rc4(3) out of EVP_EncryptInit(3) to reduce clutter.Ingo Schwarze
The algorithm is insecure and yet its description would spread over three paragraphs in the cipher list, including remarkable advice like using a 40 bit key length.
2019-03-21Split EVP_des_cbc(3) out of EVP_EncryptInit(3) to reduce clutter:Ingo Schwarze
this moves a large number of functions out of the way that are no longer the latest and greatest. Also mention a few that were missing.
2019-03-21add a handful of missing functionsIngo Schwarze
that are also documented in OpenSSL 1.1.1 (still under a free license)
2019-03-21Bring back EVP_chacha20 list item that was accidentally removedTheo Buehler
in r1.28 when the AES ciphers were split into their own manual.
2019-03-20fix examples (libtls uses its own error reporting mechanism)Marc Espie
okay tb@
2019-03-20escape backslashes;Ingo Schwarze
patch from Peter Piwowarski <peterjpiwowarski at gmail dot com>
2019-03-19Document the flag EVP_CIPHER_CTX_FLAG_WRAP_ALLOW needed for the EVPIngo Schwarze
AES wrap modes, the function EVP_CIPHER_CTX_set_flags(3) needed to set it, and the companion functions EVP_CIPHER_CTX_clear_flags(3) and EVP_CIPHER_CTX_test_flags(3). With help and an OK from tb@.
2019-03-19Avoid an internal 2 byte overread in ssl_sigalgs().Joel Sing
Found by oss-fuzz, fixes issue #13797. ok beck@ tb@
2019-03-19Revert TLS1_get{,_client}_version simplification because DTLS.Joel Sing
2019-03-19update libelf from elftoolchain r3714 to r3717Jonathan Gray
check for overflow correctly after computing a file offset
2019-03-19update libelf from elftoolchain r3669 to r3714Jonathan Gray
includes changes to address problems sunil@ found with fuzzing original diff from and ok sunil@
2019-03-18* note that the handshake must be completed firstIngo Schwarze
* correct the description of "unknown" (the previous are both from OpenSSL 1.1.1, still under a free license) * add a comment saying that TLS1_get_version() and TLS1_get_client_version() are intentionally undocumented (reasons provided by jsing@)
2019-03-18Insert a missing input line break after a .Vt macro;Ingo Schwarze
from Jan Stary <hans at stare dot cz>. Where here, correct one .Vt NULL -> .Dv NULL.
2019-03-18Split EVP_aes_128_cbc(3) out of EVP_EncryptInit(3):Ingo Schwarze
both resulting pages are still long. Mention a number of missing functions. Add some text from the OpenSSL 1.1.1 EVP_aes.pod manual page, which is still under a free license. Add missing HISTORY information. Triggered by tb@ providing EVP_aes_{128,192,256}_wrap(3) in evp.h rev. 1.74.
2019-03-18In ssl.h rev. 1.165, tb@ provided version agnostic DTLS methods.Ingo Schwarze
Document them.
2019-03-18Document SM4; related to evp.h rev. 1.73.Ingo Schwarze
2019-03-18Expand the ERR_PACK() macro to ERR_REASON() for consistency.Theo Buehler
No binary change.
2019-03-18In evp.h rev. 1.75, tb@ provided EVP_PKEY_get0_hmac(3).Ingo Schwarze
Document it. Even though OpenSSL muddles the waters by lumping the description together with the other EVP_PKEY_get0_*() functions, describe it separately because a char * has no reference count and because the function fills in an additional length parameter.
2019-03-17bump minors after symbol additionTheo Buehler
2019-03-17Provide EVP_PKEY_get0_hmac(). From OpenSSL 1.1.1 which is stillTheo Buehler
freely licensed. From jsing
2019-03-17Provide EVP_aes_{128,192,256}_wrap(). This is a compatibleTheo Buehler
implementation based on the one in OpenSSL 1.0.2r which is still freely licensed. The functions are undocumented in OpenSSL. To use them, one needs to set the undocumented EVP_CIPHER_CTX_FLAG_WRAP_ALLOW flag on the EVP_CIPHER_CTX. resolves #505 ok jsing
2019-03-17Add the SM4 block cipher from the Chinese standard GB/T 32907-2016.Theo Buehler
This is an ISC licensed version based on the sources by Ribose Inc that were ported to OpenSSL in 2017. Patch from Daniel Wyatt with minor tweaks. ok inoguchi, jsing
2019-03-17Provide version agnostic DTLS methods.Joel Sing
ok tb@
2019-03-17Correct return value handling in tls13_handshake_recv_action().Joel Sing
The recv action handler returns success/failure, rather than a TLS13_IO_* value, which is what tls13_handshake_recv_action() needs to return. Failure previously mapped to TLS13_IO_EOF, which is not ideal. ok tb@
2019-03-17Partially clean up the TLS1_get_{,client}_version macros.Joel Sing
LibreSSL only supports TLSv1.0 and above, hence the checks the macros are performing are useless. Simplify them to their effective code. Also place both under #ifndef LIBRESSL_INTERNAL and use the variables directly in our code, which improves readability. ok tb@
2019-03-17Remove the alert level from the TLSv1.3 alert callback.Joel Sing
In TLSv1.3 the alert level is effectively meaningless and the record layer has already checked that it is appropriate. As such, drop it from the alert callback. ok tb@
2019-03-17Document MAP_CONCEAL. Prompted by jmc@. ok otto@ schwarze@.cheloha
2019-03-15Document the return values of X509_delete_ext(3) and X509_add_ext(3).Ingo Schwarze
From Viktor Dukhovni via OpenSSL commit 0df65d82 Jun 12 11:51:53 2018 -0400 which is still under a free license because it is before the 1.1.1 branch point. While here, add several missing const qualifiers.
2019-03-15OpenSSL documents the macro OPENSSL_VERSION_TEXT since Sep 24, 2018;Ingo Schwarze
so mention it here, too.
2019-03-15Document OCSP_basic_verify(3).Ingo Schwarze
From David dot von dot Oheimb at siemens dot com via OpenSSL commit b8c32081 Feb 10 15:45:11 2018 +0100, which is still under a free license because it is before the 1.1.1 branch point.
2019-03-15Remove FBSDID.Kevin Lo
ok deraadt@
2019-03-14build with NDEBUG defined to disable debug/tracking codeRobert Nagy
ok patrick@
2019-03-14libcxxRobert Nagy
2019-03-13Fix a number of ASN1_INTEGER vs ASN1_STRING mixups coming from theTheo Buehler
mechanical M_ASN1 macro expansion. The ASN1_INTEGER_cmp function takes signs into account while ASN1_STRING_cmp doesn't. The mixups mostly involve serialNumbers, which, in principle, should be positive. However, it is unclear whether that is checked or enforced anywhere in the code, so these are probably bugs. Patch from Holger Mikolon ok jsing
2019-03-13add a comment to format-pem.pl documenting typical steps to updateStuart Henderson
cert.pem from Mozilla NSS.
2019-03-13Backport support for probing ARMv8 HW acceleration capabilities on armv7Patrick Wildt
in preparation for adding support for the probing code for arm64. ok bcook@
2019-03-13Initial IP-based caching implementation with O(logn) lookup.Paul Irofti
Caching implemented via red-black trees, this can be improved and further work is on-going to bring it closer to GNU's performance that uses a LRU-MRU 8-entries based caching algorithm. Prompted by robert@ who run into a runtime of an executed macro of 5 minutes in libreoffice. With this the execution is reduced to 58 seconds. C++11 tips from espie@, rsadowski@ Tested by robert@ OK mortimer@, kettenis@.
2019-03-12Setting and getting the rounding mode on our arm64 FPU has not workedPatrick Wildt
in libm since the rounding mode is in fpcr, not fpsr. Since both FPU registers are 32-bit we can store them in the 64-bit fenv_t to make handling the bits easier. While there add FE_DENORMAL, which also exists on x86. Also make sure that whenever we are being passed an exception mask, we only allow the bits that are supported by hardware. Found by regression tests Debugged with Moritz Buhl ok kettenis@
2019-03-10fix some cases of spaces before full stops, where none were neccessary;Jason McIntyre
2019-03-10rename CRYPTO_set_locking_callback.3 to CRYPTO_lock.3Ingo Schwarze
because CRYPTO_set_locking_callback() is now a no-op and was never documented in the first place; no text change; requested by jmc@ long ago
2019-03-10delete functions from the manual page that do nothing in LibreSSLIngo Schwarze
and that don't do anything in OpenSSL either; no significant amount of text remains from OpenSSL, so change the Copyright information and license of CRYPTO_set_locking_callback.3; OK inoguchi@ jmc@
2019-03-08remove a sentence that was once helpful when dirname.3 and basename.3Sebastian Benoit
shared one manpage. ok florian@
2019-03-06Typo in comment.Theo Buehler
From Holger Mikolon
2019-03-04Don't index a void pointer, fixes compilation with visual studio.Todd C. Miller
Gcc/clang will treat void * as char * but this is non-standard. OK deraadt@ jsing@ inoguchi@
2019-03-03Wake all waiters when unlocking an rwlock. This fixes a hangVisa Hankala
that could happen if there was more than one writer waiting for a read-locked rwlock. Problem found by semarie@. OK semarie@ tedu@