summaryrefslogtreecommitdiff
path: root/lib
AgeCommit message (Collapse)Author
2023-04-30Remove most documentation pertaining to proxy certificates.Theo Buehler
Update EXFLAG_PROXY and X509_V_FLAG_ALLOW_PROXY_CERTS documentation since we need to keep them for the time being.
2023-04-30Remove proxy cert api remmnantsTheo Buehler
2023-04-30Remove documentation of BN_generate_prime(), BN_is_prime{,_fasttest}()Theo Buehler
2023-04-30Remove documentation of BN_zero_ex() and update BN_one() and BN_zero()Theo Buehler
which are no longer macros (and the latter is no longer deprecated and no longer attempts to allocate memory).
2023-04-30Garbage collect BN_zero_ex()Theo Buehler
2023-04-30Remove __dead again. Apparently this causes issues for some upstreams.Theo Buehler
Thanks to orbea for the report
2023-04-30Revert disablement of the encoding cacheJob Snijders
Without the cache, we verify CRL signatures on bytes that have been pulled through d2i_ -> i2d_, this can cause reordering, which in turn invalidates the signature. for example if in the original CRL revocation entries were sorted by date instead of ascending serial number order. There are probably multiple things we can do here, but they will need careful consideration and planning. OK jsing@
2023-04-30Send x509_subject_cmp() to the atticTheo Buehler
This helper has been inside #if 0 for nearly 25 years. Let it go. If we should ever need it, I'm quite confident that we will be able to come up with its one line body on our own.
2023-04-30The policy tree is no moreTheo Buehler
Mop up documentation mentioning it or any of its numerous accessors that almost nothing ever used.
2023-04-30Zap extra blank lineTheo Buehler
2023-04-30Make the descriptions of BIO_get_retry_BIO(3) and BIO_get_retry_reason(3)Ingo Schwarze
more precise. Among other improvements, describe the three BIO_RR_* constants serving as reason codes.
2023-04-30Slightly improve the documentation of the "oper" parameter byIngo Schwarze
explicitly listing the valid arguments, i.e. the BIO_CB_* constants.
2023-04-30Document the eight BIO_CONN_S_* constants that are passed to BIO_info_cb(3)Ingo Schwarze
as the "state" argument. Document them here because connect BIOs are the only built-in BIO type using these constants.
2023-04-30Mark the five BIO_GHBN_* constants as intentionally undocumented.Ingo Schwarze
They are intended to be used by BIO_gethostbyname(), which is deprecated in OpenSSL and already marked as intentionally undocumented in LibreSSL. Besides, these constants are completely unused by anything.
2023-04-30whitespaceTheo Buehler
2023-04-29New manual page written by Ted Bullock,Ingo Schwarze
dropping the empty RETURN VALUES section and adding the missing "#include <stdilib.h>" below EXAMPLES.
2023-04-29Provide function prototypes for macros that take arguments,Ingo Schwarze
rename the "ev" argument to "event" to make some text read better, and get rid of colons at the ends of list tags. OK jmc@ and Ted Bullock.
2023-04-29Mention a few standard BIO_ctrl(3) command constantsIngo Schwarze
that provide type-specific functionality here. While here, fix some wrong return types in the SYNOPSIS.
2023-04-29Mention a few standard BIO_ctrl(3) command constantsIngo Schwarze
that provide type-specific functionality here, and add the missing return type to one function prototype.
2023-04-29Mention the type-specific BIO_ctrl(3) command constantsIngo Schwarze
in the manual pages of the respective BIO types.
2023-04-29Mention the type-specific BIO_ctrl(3) command constantsIngo Schwarze
in the manual pages of the respective BIO type. While here, fix some wrong return types in the SYNOPSIS.
2023-04-28Mark OpenSSLDie() as __deadTheo Buehler
This tells gcc that OPENSSL_assert() will not return and thus avoids a silly warning that triggers scary gentoo QA warnings. From claudio
2023-04-28Too many stupid things whine about these being used uninitializedTheo Buehler
(which they aren't), so appease them.
2023-04-28Remove preservation and use of cached DER/BER encodings in the d2i/i2d pathsJob Snijders
A long time ago a workflow was envisioned for X509, X509_CRL, and X509_REQ structures in which only fields modified after deserialization would need to be re-encoded upon serialization. Unfortunately, over the years, authors would sometimes forget to add code in setter functions to trigger invalidation of previously cached DER encodings. The presence of stale versions of structures can lead to very hard-to-debug issues and cause immense sorrow. Fully removing the concept of caching DER encodings ensures stale versions of structures can never rear their ugly heads again. OK tb@ jsing@
2023-04-28Some wording tweaks to finish the polishing.Ingo Schwarze
While here, also correct the HISTORY section. OK jmc@
2023-04-28Enable policy checking by default now that we are DAG implementation based.Bob Beck
This ensures that we will no longer silently ignore a certificate with a critical policy extention by default. ok tb@
2023-04-28Mark a number of BIO_ctrl(3) command constants as intentionallyIngo Schwarze
undocumented because they are NOOPs or deprecated.
2023-04-28kill the .Xr to BN_nist_mod_521(3) which no longer existsIngo Schwarze
2023-04-28Unifdef LIBRESSL_HAS_POLICY_DAG and remove it from the MakefileTheo Buehler
with beck
2023-04-28Add BIO_C_SET_MD_CTX to the list of command constants.Ingo Schwarze
2023-04-28Take the old policy code behind the barnTheo Buehler
It can go play in the fields with all the other exponential time policy "code". discussed with jsing ok & commit message beck
2023-04-28Document BIO_set_md_ctx(3) and BIO_C_SET_MD_CTX.Ingo Schwarze
Correct the return types of some macros. Improve the RETURN VALUES section.
2023-04-28Enable the new policy checking code in x509_policy.cTheo Buehler
ok beck jsing
2023-04-28Silence gcc-4 warnings about sk_sort()Theo Buehler
Tell it we deliberately ignore the return value, (we really don't care what the old comparison function was).
2023-04-28Remove misinformation, reason had nothing to do with efficiencyJob Snijders
"Failure to re-encode on modification is a bug not a feature." OK jsing@
2023-04-28Remove now no longer needed <assert.h>; sort headersTheo Buehler
ok jsing
2023-04-28Deassert has_explicit_policy()Theo Buehler
The only caller is X509_policy_check() which goes straight to error. with beck ok jsing
2023-04-28Deassert delete_if() callbacksTheo Buehler
Add sk_is_sorted() checks to the callers of sk_X509_POLICY_NODE_delete_if() and add a comment that this is necessary. with beck ok jsing
2023-04-28Deassert x509_policy_level_find()Theo Buehler
Move the check that level->nodes is sorted to the call site and make sure that the logic is preserved and erroring does the right thing. with beck ok jsing
2023-04-28Deassert X509_policy_check()Theo Buehler
Instead of asserting that i == num_certs - 2, simply make that an error check. with beck ok jsing
2023-04-28Deassert x509_policy_level_add_nodes()Theo Buehler
This assert is in debugging code that ensures that there are no duplicate nodes on this level. This is an expensive and unnecessary check. Duplicates already cause failures as ensured by regress. with beck ok jsing
2023-04-28Deassert x509_policy_new()Theo Buehler
Turn the check into an error which will make all callers error. with beck ok jsing
2023-04-28Reorder the text such that every function is discussed only onceIngo Schwarze
instead of discussing some of them at two different places. Also follow a more logical order: initialization first, then reading and writing, then retrieving the digest and reinitialization. Leave context handling and chain duplication at the end because both are rarely needed. While here, also tweak the wording of the shuffled text and add some precision in a few places.
2023-04-28Cleanup pass over x509_check_policy.cTheo Buehler
This hoists variable declarations to the top and compiles with -Wshadow. ok beck
2023-04-27tiny wording tweak from Ted Bullock to make misunderstandings less likely;Ingo Schwarze
OK jmc@
2023-04-27Convert size_t's used in conjuction with sk_X509_num back to int.Bob Beck
The lets the regress in x509/policy pass instead of infinite looping. The changes are necessry because our sk_num() returns an int with 0 for empty and -1 for NULL, wheras BoringSSL's returns a size_t with 0 for both an empty stack and a NULL stack. pair work with tb@ ok tb@ jsing@
2023-04-27various markup tweaks, no content change; OK jmc@Ingo Schwarze
2023-04-27various minor content corrections and improvements;Ingo Schwarze
feedback and OK jmc@ and Ted Bullock
2023-04-27Also list the command constants not associated with any macros,Ingo Schwarze
and point to their documentation.
2023-04-27ssl_tlsext.c: Add an accessor for the tls extension type.Theo Buehler
Needed for the tlsexttest.c ok jsing