summaryrefslogtreecommitdiff
path: root/usr.bin/openssl
AgeCommit message (Collapse)Author
2024-08-31sync x509v3_add_value with x509_utl.cTheo Buehler
2024-08-30Add and use local copy of X509V3_add_value()Theo Buehler
The public API will be removed. This fixes its only consumer.
2024-08-30zap line missed in previous removal; ok tbJason McIntyre
2024-08-29Adjust documentation for check/pubcheck removalTheo Buehler
ok beck
2024-08-29Remove check and pubcheck from openssl pkey and pkeyparamTheo Buehler
The underlying API will be removed, so these commands have to go. ok beck
2024-08-29ocsp.c: zap trailing whitespaceTheo Buehler
2024-08-26ts.c: typo flaf -> flagTheo Buehler
2024-08-22openssl: adjust manual for LMK and CSP removalTheo Buehler
2024-08-22openssl pkcs12: remove support for LMK and CSP attributesTheo Buehler
Documentation on what the Microsoft-specific local machine keyset and the cryptographic service provider are actually good for is hard to find. For some reason (perhaps one million and two arguments for PKCS12_create() was considered two too many) these hang off the EVP_PKEY in the attributes member, which serves no other purpose. Every use of EVP_PKEY (of which there are far too many) pays extra memory taxes for this fringe use case. This complication is not worth it. ok miod
2024-08-18Use OPENSSL_config() instead of OPENSSL_load_builtin_modules()Theo Buehler
2024-08-12Add -CRLfile option to 'cms' sub commandJob Snijders
This option allows to verify certs in a CMS object against additional CRLs. Ported from work by Tom Harrison from APNIC OK tb@
2024-07-13Move the sigaction next to multiTheo Buehler
Reduces diff in -portable
2024-07-12use sigaction() to setup SIGARLM so we can set SA_RESTART, andTheo de Raadt
remove the re-arming in the handler. Better than using siginterrupt(), and avoids the errno saving requirement in the handler also. ok guenther millert
2024-07-09do not need to force bss values to 0Theo de Raadt
2024-07-09KNF a pile of else if blocks; ok tbTheo de Raadt
2024-07-08Adjust manpage for SPKAC removalTheo Buehler
ok jsing
2024-07-08Remove spkac subcommandTheo Buehler
Google killed efforts to have SPKAC in html5 by zapping it from chrome a decade ago. This effort doesn't look like it's going anywhere: https://datatracker.ietf.org/doc/draft-leggett-spkac/ Unfortunately, PHP and Ruby still support NETSCAPE_SPKI, so we can't kill that code, but I see no real reason we need to support this in our openssl command. If the need should arise we can write a somewhat less poor version of this. ok jsing
2024-07-08Remove spkac handling from openssl(1) caTheo Buehler
This is very poorly written code and now the only consumer of some public API that should not have survived the turn of the millenium. ok jsing
2024-07-01signal handler must use the save_errno dance, and massage a variableTheo de Raadt
of type 'volatile sig_atomic_t' ok tb
2024-06-23openssl ca: avoid double free for spkac files without default sectionTheo Buehler
ok jsing
2024-05-27openssl x509: rename pub_key to dsa_pub_keyTheo Buehler
suggested by jsing
2024-05-27openssl: enable -Wshadow for clangTheo Buehler
ok job jsing
2024-05-27openssl: avoid shadowed pkeys in x509.cTheo Buehler
ok job jsing
2024-05-21remove prototypes with no matching function and externs with no varJonathan Gray
partly checked by millert@
2024-05-18remove extern with no matching var; ok tb@Jonathan Gray
2024-05-18remove prototypes with no matching function; ok tb@Jonathan Gray
2024-05-07openssl: toolkit implementing the TLS v1 protocol is weirdTheo Buehler
Well, it's a toolkit alright, and a terrible one at that, but TLS v1 (which is this beloved toolkit's name for TLS v1.0) is a thing firmly from the past, so drop the v1.
2024-04-17openssl req: plug obvious leakTheo Buehler
CID 492603
2024-03-25Clean up create_digest()Theo Buehler
The ts code is its own kind of special. I only sent this diff out to hear beck squeal. This diff doesn't actually fix anything, apart from (maybe) appeasing some obscure static analyzer. It is decidedly less bad than a similar change in openssl's issue tracker. ok beck
2024-02-28Expand only ever user of PBEPARAM_free() outside of libcryptoTheo Buehler
2024-02-04Zap a useless comment followed by a stray semicolonTheo Buehler
Noticed by Christian Andersen
2024-02-03Remove GOST and STREEBOG support from libssl.Bob Beck
This version of GOST is old and not anywhere close to compliant with modern GOST standards. It is also very intrusive in libssl and makes a mess everywhere. Efforts to entice a suitably minded anyone to care about it have been unsuccessful. At this point it is probably best to remove this, and if someone ever showed up who truly needed a working version, it should be a clean implementation from scratch, and have it use something closer to the typical API in libcrypto so it would integrate less painfully here. This removes it from libssl in preparation for it's removal from libcrypto with a future major bump ok tb@
2024-01-26Add 'openssl x509 -new' functionality to the libcrypto CLI utilityJob Snijders
The ability to generate a new certificate is useful for testing and experimentation with rechaining PKIs. While there, alias '-key' to '-signkey' for compatibility. with and OK tb@
2024-01-12Add -force_pubkey -multivalue-rdn -set_issuer -set_subject -utf8 to x509 appJob Snijders
The -set_issuer, -set_subject, and -force_pubkey features can be used to 'rechain' PKIs, for more information see https://labs.apnic.net/nro-ta/ and https://blog.apnic.net/2023/12/14/models-of-trust-for-the-rpki/ OK tb@
2023-12-29Garbage collect the last users of SSL_set_debug(3)Theo Buehler
This undocumented, incomplete public function has never done anything useful. It will be removed from libssl. Removing it from openssl(1) clears the way for this. ok jsing
2023-12-29s_client: pause hasn't worked in ages. Just ignore itTheo Buehler
ok jsing
2023-11-21Make a few purpose things constTheo Buehler
This should allow us to constify a sizable table in libcrypto in an upcoming bump.
2023-11-19openssl pkcs12: rewrite without reaching into X509_ALGORTheo Buehler
We can call ASN1_item_unpack() which will end up stuffing the same arguments into ASN1_item_d2i() as d2i_PBEPARAM(). This eliminates the last struct access into X509_ALGOR outside libcrypto in the base tree. ok jsing
2023-11-19openssl ts: convert to X509_ALGOR_set0()Theo Buehler
ok jsing
2023-11-13Kill last user of ASN1_time_parse() in the treeTheo Buehler
ASN1_time_parse() was useful while OpenSSL didn't have something sort of equivalent, but now they do. Let's retire ASN1_time_parse() to internal. This will require some patching in ports, but shrug. ok beck
2023-11-13Check notBefore/notAfter validity with ASN1_TIME_to_tm(3)Theo Buehler
ok beck
2023-07-29Drop unused conf, pem, and x509 headers, add unistd for pledgeTheo Buehler
2023-07-27Remove antiquated options outputTheo Buehler
This is uninteresting and rather meaningless except for the implementer. No need to have several hundred lines of code backing half a dozen symbols in the public API for this. ok jsing
2023-07-23sprinkle some void between () in function definitionsTheo Buehler
2023-07-23Remove -stats option from openssl(1) errstr.Theo Buehler
This is the only consumer of ERR_get_string_table(), which will go away. ok jsing
2023-07-03some minor fix up;Jason McIntyre
2023-07-03Bring back no_tls1 and no_tls1_1 as undocumented silently discarded opitonsBob Beck
While I'm here, change the no_ssl2 and no_ssl3 options to use OPTION_DISCARD as well instead of continuing to set a no-op option flag. ok jsing@ tb@
2023-07-03Remove the tls1.0 and 1.1 related options from the openssl(1) toolkitBob Beck
ok tb@
2023-07-02Teach openssl ca about Ed25519 certificatesTheo Buehler
This adds a few logic curlies to end up setting the EVP_MD to EVP_md_null() as required by the API. This way ASN1_item_sign() now knows how to behave. "ok = (rv == 2);" beck
2023-07-02Teach openssl req about EdDSA certsTheo Buehler
After a few things in libcrypto were adjusted, this diff makes issuing certificate requests with Ed25519 work. ok beck