summaryrefslogtreecommitdiffstats
path: root/lib/libcrypto/objects
AgeCommit message (Collapse)AuthorFilesLines
2021-02-03Add OID for draft-ietf-opsawg-finding-geofeedsjob2-0/+2
https://tools.ietf.org/html/draft-ietf-opsawg-finding-geofeeds describes a mechanism to authenticate RFC 8805 Geofeed data files through the RPKI. OpenSSL counterpart https://github.com/openssl/openssl/pull/14050 OK tb@ jsing@
2021-02-02Add a bunch of RPKI OIDsjob2-1/+26
RFC6482 - A Profile for Route Origin Authorizations (ROAs) RFC6484 - Certificate Policy (CP) for the RPKI RFC6493 - The RPKI Ghostbusters Record RFC8182 - The RPKI Repository Delta Protocol (RRDP) RFC8360 - RPKI Validation Reconsidered draft-ietf-sidrops-rpki-rta - A profile for RTAs Also in OpenSSL: https://github.com/openssl/openssl/commit/d3372c2f35495d0c61ab09daf7fba3ecbbb595aa OK sthen@ tb@ jsing@
2020-06-05Add OIDs for HMAC using Streebog (GOST R 34.11-2012) hash function.jsing2-0/+4
Diff from Dmitry Baryshkov <dbaryshkov@gmail.com> Sponsored by ROSA Linux ok inoguchi@ tb@
2020-06-05Add support for additional GOST curves.jsing2-4/+16
These GOST curves are defined in RFC 7836 and draft-deremin-rfc4491-bis. Add aliases for 256-bit GOST curves (see draft-smyshlyaev-tls12-gost-suites) and rename the 512-bit curve ids to follow names defined in tc26 OID registry. Diff from Dmitry Baryshkov <dbaryshkov@gmail.com> Sponsored by ROSA Linux. ok inoguchi@
2019-11-01Provide NID for pSpecified.jsing2-0/+2
ok tb@
2019-09-05Add objects for ECDH schemes in RFC 5753.jsing2-0/+32
Based on OpenSSL 1.1.1b. ok inoguchi@ tb@
2019-07-03snprintf/vsnprintf return < 0 on error, rather than -1.deraadt1-3/+3
2019-04-19Allocate fixed NIDs for SM3/SM4.jsing1-0/+12
2019-03-17Add the SM4 block cipher from the Chinese standard GB/T 32907-2016.tb1-0/+16
This is an ISC licensed version based on the sources by Ribose Inc that were ported to OpenSSL in 2017. Patch from Daniel Wyatt with minor tweaks. ok inoguchi, jsing
2019-03-02Fix OID for sm3WithRSAEncryption which was apparently mixed uptb1-1/+1
with the OID for SM2 signing with SM3. From Daniel Wyatt
2018-11-11Add Ribose Inc's implementation of the SM3 hashing function withtb1-0/+5
tweaks from jsing and myself. The SM2/SM3/SM4 algorithms are mandatory for legal use of cryptography within China and [are] widely applied in the country, covering identification/financial cards, contactless, TPM 2.0 and PKI. ok beck inoguchi jsing
2018-09-08ASN1_OBJECTs should be freed with ASN1_OBJECT_free(3), not with free(3).tb1-2/+2
ok inoguchi, jsing
2018-09-08indent labelstb2-8/+8
2018-09-08missing word & a couple of typostb1-3/+3
2018-03-17Provide object identifier for chacha20-poly1305.jsing2-0/+3
2018-03-17Provide object identifiers for TLS cipher suite key exchange andjsing2-0/+20
authentication.
2017-05-25Add definitions for three OIDs used in EV certificates.jsing2-0/+9
From Kyle J. McKay <mackyle at gmail dot com>
2017-02-28Fix typo in issuingDistributionPoint description.jsing1-1/+1
2017-01-29Send the function codes from the error functions to the bit bucket,beck4-23/+17
as was done earlier in libssl. Thanks inoguchi@ for noticing libssl had more reacharounds into this. ok jsing@ inoguchi@
2017-01-21Place {DECLARE,IMPLEMENT}_OBJ_BSEARCH{_GLOBAL,}_CMP_FN macros undefjsing1-1/+5
LIBRESSL_INTERNAL.
2017-01-21Expand DECLARE_OBJ_BSEARCH_CMP_FN and IMPLEMENT_OBJ_BSEARCH_CMP_FN macros.jsing2-12/+92
No change to generated assembly excluding line numbers.
2016-12-22OBJ_obj2txt() should return the total amount of space requiredinoguchi1-5/+1
reported by @rhenium on GitHub ok jsing@
2016-12-21Explicitly export a list of symbols from libcrypto.jsing1-1/+4
Move the "internal" BN functions from bn.h to bn_lcl.h and stop exporting the bn_* symbols. These are documented as only being intended for internal use, so why they were placed in a public header is beyond me... This hides 363 previously exported symbols, most of which exist in headers that are not installed and were never intended to be public. This also removes a few crusty old things that should have died long ago (like _ossl_old_des_read_pw). But don't worry... there are still 3451 symbols exported from the library. With input and testing from inoguchi@. ok beck@ inoguchi@
2016-11-05Add objects for X25519, X448, Ed25519 and Ed448.jsing2-0/+15
ok miod@
2016-07-17remove unused OPENSSL_NO_OBJECT casebcook1-14/+1
ok tedu@
2015-10-14better fix for overrun reported by Qualys Security.tedu1-4/+1
buf is at all times kept nul terminated, so there is no need to enforce this again upon exit. (no need to move buf around after we exahust space.) ok beck miod
2015-10-14Bail out early if we have no buf_lenbeck1-1/+5
ok miod@
2015-10-14fix a memory leak reported by Qualys Security.tedu1-3/+4
move the bndec variable in tighter since it's not used elsewhere in the loop, then always free it after use. ok bcook miod
2015-10-14Ensure we don't write a 0 byte past end of the buffer in the error case.beck1-3/+3
ok bcook@ deraadt@
2015-07-18Coverity ID 78910 - Yet another stupid API designed to not show failures. do thebeck1-6/+8
lease worst alternative and do nothing rather than dereference NULL, but having a function with fundamentally broken API to simply make a list of strings, sort them, and call a function with each string as an argument is really quite silly.... and of course it was exposed API that the ecosystem uses that we can't delete.. yet. ok miod@ doug@
2015-02-10Remove more IMPLEMENT_STACK_OF noops that have been hiding for the lastjsing1-2/+1
15 years.
2014-11-09GOST crypto algorithms (well, most of them), ported from the removed GOSTmiod4-1/+34
engine to regular EVP citizens, contributed by Dmitry Eremin-Solenikov; libcrypto bits only for now. This is a verbatim import of Dmitry's work, and does not compile in this state; the forthcoming commits will address these issues. None of the GOST code is enabled in libcrypto yet, for it still gets compiled with OPENSSL_NO_GOST defined. However, the public header gost.h will be installed.
2014-10-28Check the result of sk_*_push() operations for failure.miod1-2/+6
ok doug@ jsing@
2014-10-07Use strdup() instead of malloc() + memcpy().miod1-8/+3
ok doug@ jsing@
2014-08-08Fix CVE-2014-3508, pretty printing and OID validation:guenther1-2/+7
- make sure the output buffer is always NUL terminated if buf_len was initially greater than zero. - reject OIDs that are too long, too short, or not in proper base-127 Based on https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87 ok bcook@
2014-07-11Fix OID encoding for single components. OpenSSL PR #2556 via OpenSSL trunk.miod1-1/+1
(be sure to make cleandir and make includes before building)
2014-07-11Only import cryptlib.h in the four source files that actually need it.jsing2-7/+7
Remove the openssl public includes from cryptlib.h and add a small number of includes into the source files that actually need them. While here, also sort/group/tidy the includes. ok beck@ miod@
2014-07-10Explicitly include <openssl/opensslconf.h> in every file that referencesjsing2-2/+7
an OPENSSL_NO_* define. This avoids relying on something else pulling it in for us, plus it fixes several cases where the #ifndef OPENSSL_NO_XYZ is never going to do anything, since OPENSSL_NO_XYZ will never defined, due to the fact that opensslconf.h has not been included. This also includes some miscellaneous sorting/tidying of headers.
2014-07-10Stop including standard headers via cryptlib.h - pull in the headers thatjsing2-3/+7
are needed in the source files that actually require them. ok beck@ miod@
2014-06-12tags as requested by miod and teduderaadt7-5/+7
2014-06-07Remove various test stubs. The good ones have been moved by jsingderaadt1-28/+0
and others to the regress framework. These remaining ones just muddle us up when re-reading code repeatedly. ok jsing
2014-06-07malloc() result does not need a cast.deraadt2-7/+7
ok miod
2014-06-01Clean up some of the nightmare of string and pointer arithmatic inbeck1-52/+36
this nasty function. This gets rid of the nasty tmp variables used to hold temporary strings and the DECIMAL_SIZE hack. it gets rid of the rather pointless null checks for buf (since the original code dereferences it before checking). It also gets rid of the insane possibility this could return -1 when stuff is using the return values to compute lengths All the failure cases now return 0 and an empty string like the first error case in the original code. ok miod@ tedu@
2014-05-30more: no need for null check before freederaadt2-14/+7
ok tedu guenther
2014-05-29ok, next pass after review: when possible, put the reallocarray argumentsderaadt1-1/+1
in the "size_t nmemb, size_t size"
2014-05-29convert 53 malloc(a*b) to reallocarray(NULL, a, b). that is 53deraadt2-2/+3
potential integer overflows easily changed into an allocation return of NULL, with errno nicely set if need be. checks for an allocations returning NULL are commonplace, or if the object is dereferenced (quite normal) will result in a nice fault which can be detected & repaired properly. ok tedu
2014-05-25Turn off MemCheck_on and MemCheck_off. These calls are pointless since thejsing1-13/+3
crypto memory debugging code has been castrated. ok miod@ "kill it" beck@
2014-05-24Almost nothing actually needs to include <openssl/e_os2.h>, however byjsing1-1/+2
including it they get <openssl/opensslconf.h>. So instead of pulling in <openssl/e_os2.h>, just pull in <openssl/opensslconf.h>. "go ahead" miod@
2014-05-01Update with recently added objects.jsing1-0/+18
ok miod@
2014-05-01Provide an EVP implementation for ChaCha.jsing1-0/+4
ok miod@