summaryrefslogtreecommitdiffstats
path: root/lib/libcrypto (follow)
Commit message (Collapse)AuthorAgeFilesLines
* cherrypick fix for CVE-2012-2110: libcrypto ASN.1 parsing heap overflowdjm2012-04-193-14/+61
| | | | ok miod@ deraadt@
* OpenSSL 1.0.0f: mergedjm2012-01-0510-130/+256
|
* OpenSSL 1.0.0f: import upstream sourcedjm2012-01-053-9/+82
|
* openssl-1.0.0e: resolve conflictsdjm2011-11-0375-461/+822
|
* import OpenSSL 1.0.0edjm2011-11-0339-402/+999
|
* move CRYPTO_VIAC3_MAX out of cryptodev.h and into the onlyjsg2010-12-161-0/+2
| | | | | | file it will be used from. requested by/ok mikeb@
* The VIA ciphers are added to an array of CRYPTO_ALGORITHM_MAX lengthjsg2010-12-161-2/+2
| | | | | | | which should have been declared as CRYPTO_ALGORITHM_MAX + 1, fix this and reserve enough space for the VIA additions as well. ok/comments from mikeb & deraadt
* Disable use of dladdr() on a.out arches, they do not provide it (yet); ok djm@miod2010-10-181-1/+1
|
* More OpenSSL fixes:djm2010-10-063-12/+14
| | | | | | | | | - Update local engines for the EVP API change (len u_int => size_t) - Use hw_cryptodev.c instead of eng_cryptodev.c - Make x86_64-xlate.pl always write to the output file and not stdout, fixing "make -j" builds (spotted by naddy@) ok naddy@
* Retire Skipjackmikeb2010-10-062-2/+0
| | | | | | | | | | | There's not much use for the declassified cipher from the 80's with a questionable license these days. According to the FIPS drafts, Skipjack reaches its EOL in December 2010. The libc portion will be removed after the ports hackathon. djm and thib agree, no objections from deraadt Thanks to jsg for digging up FIPS drafts.
* fix -Wall due to API changedjm2010-10-011-3/+3
|
* add missing; yay for cvs!djm2010-10-012-0/+205
|
* resolve conflicts, fix local changesdjm2010-10-01562-53821/+21730
|
* import OpenSSL-1.0.0adjm2010-10-01256-6013/+35115
|
* Oracle has re-licensed sunrpc under a three-clause BSD license.millert2010-09-011-27/+29
| | | | Update our sources appropriately. OK deraadt@ jsg@
* AES-NI engine support for OpenSSL.thib2010-07-019-3/+1592
| | | | | | | | | | This is code mostly picked up from upstream OpenSSL, or to be more exact a diff from David Woodhouse <dwmw2 at infradead dot org>. Remember to make includes before doing a build! no objections from djm@ OK deraadt@, reyk@ (AES is about 4.25x faster on his x201 now)
* VIA xcrypt for amd64, simpler version of a diff from deraadtjsg2010-06-291-6/+19
| | | | | | | | | with suggestions from miod. The codepath doesn't seem to be called yet, this will be investigated later. looks good miod@, ok deraadt@
* When running in pic mode we don't have enough general registers for alljsg2010-05-031-1/+1
| | | | | | | | | | | | the xcrypt inputs, hence the dance which is done to make this work. The constraint for the key however was "mr" which is both from memory and from a general register, it seems gcc3 went with the former and gcc4 went with the later in the pic case, so change the constraint for the key to just "m" which gives us more efficient code that both gcc3 and gcc4 are happy with. ok kettenis@
* cherrypick patch from OpenSSL 0.9.8m:djm2010-03-043-6/+9
| | | | | *) Always check bn_wexpend() return values for failure. (CVE-2009-3245) [Martin Olsson, Neel Mehta]
* add a fix from OpenSSL CVS for SA38200.jasper2010-01-311-10/+7
| | | | | | | | "Modify compression code so it avoids using ex_data free functions. This stops applications that call CRYPTO_free_all_ex_data() prematurely leaking memory." looks ok to markus@
* s/Mhz/MHz/, MHz is a multiple of the SI unit hertz (whose symbol is Hz).sobrado2009-10-311-2/+2
|
* pull string for memcpy; ok hshoexer@martynas2009-08-071-1/+2
|
* resolve conflictsdjm2009-04-0627-69/+122
|
* import of OpenSSL 0.9.8kdjm2009-04-0631-120/+15289
|
* convert a strdup (into a purpose-allocated buffer) in libcrypto to adjm2009-01-121-2/+3
| | | | memcpy to avoid linker deprecation warnings; pointed out by dkrause@
* resolve conflictsdjm2009-01-09230-3000/+3581
|
* import openssl-0.9.8jdjm2009-01-0996-926/+5811
|
* update to openssl-0.9.8i; tested by several, especially krw@djm2009-01-0554-343/+1083
|
* fix some cause of bad TEXTREL on i386 and amd64otto2008-09-195-14/+64
| | | | | | | - global function calls in .init sections (diff makes them via PLT) - calls to global functions in aes-586.S (made static or local) - global variable accesses in rc4-x86_64.S (now made via GOT) from djm@large; ok miod@
* use one call to arc4random_buf() instead of lots of arc4random()djm2008-09-101-8/+2
|
* Fix merge botch.kettenis2008-09-071-3/+0
| | | | ok miod@
* remove duplicate definition of OPENSSL_DSA_MAX_MODULUS_BITS spotteddjm2008-09-061-2/+0
| | | | by dtucker@
* remerge local tweaks, update per-arch configuration headers, updatedjm2008-09-065-20/+25
| | | | Makefiles, crank shlib_version
* resolve conflictsdjm2008-09-06462-9480/+23096
|
* import of OpenSSL 0.9.8hdjm2008-09-06237-5906/+52522
|
* fix memory leak (in one case of unaligned buffers); from Markus Kvetterderaadt2008-02-261-2/+3
| | | | ok markus
* Proper use of fseek/fseeko macros.tobias2007-09-101-1/+1
| | | | OK joris@, otto@
* http://openssl.org/news/patch-CVE-2007-3108.txt; ok pval, deraadtmarkus2007-08-211-13/+65
|
* Add proper checks against fgets failure. From Charles Longeau.ray2007-04-061-1/+2
| | | | OK moritz@, millert@, and jaredy@.
* remove some bogus *p tests from charles longeautedu2007-03-203-5/+5
| | | | ok deraadt millert
* openssl security fixes, diff from markus@, ok & "commit it" djm@pvalchev2006-10-0410-0/+81
| | | | http://www.openssl.org/news/secadv_20060928.txt for more
* fix RSA signature padding vulnerability in OpenSSL libcrypto CVE-2006-4339;djm2006-09-091-0/+17
| | | | ok beck@ miod@
* resolve conflictsdjm2006-06-27121-1641/+3298
|
* import of openssl-0.9.7jdjm2006-06-2750-178/+1631
|
* potential fd leak (we will fix this before we move to cloning)deraadt2006-06-081-1/+3
|
* backport checks for degenerate Diffie-Hellman public exponents fromdjm2006-05-044-0/+36
| | | | | OpenSSL-0.9.8a, where they were added without a corresponding patch to 0.9.7 or an advisory! ok theo@ markus@
* make BN_is_prime() realise that 2 is, in fact, a prime number.djm2006-03-141-1/+3
| | | | from OpenSSL CVS; ok otto@ deraadt@
* no need to byteswap for AES_ASM, from tom@markus2005-05-231-1/+9
|
* import i386 AES asm code from openssl.org; ok and help with testing djm@markus2005-05-102-1/+1550
|
* increase EVP_MAX_MD_SIZE to something sane (big enough for SHA512)djm2005-04-291-1/+1
|