| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
| |
|
| |
|
| |
|
|
|
|
| |
with one s/M_ASN1_VISIBLESTRING_new/ASN1_VISIBLESTRING_new/.
|
|
|
|
| |
ASN1_GENERALIZEDTIME_(new|free).
|
| |
|
|
|
|
|
|
|
| |
different from the macro expansion, but the result is the same. Also
replace some ASN1_STRING_dup() with ASN1_INTEGER_dup().
ok beck@ doug@
|
|
|
|
|
|
| |
the type to V_ASN1_INTEGER.
ok doug@
|
|
|
|
|
|
|
| |
This ifdef was introduced 15 years ago and was known to cause problems
with STACK_OF() back then.
ok jsing@, beck@, jca@
|
|
|
|
|
|
| |
ASN1_BIT_STRING_(new|free).
ok beck@ doug@
|
| |
|
|
|
|
| |
ok sthen@ bcook@
|
| |
|
|
|
|
| |
ok bcook@
|
|
|
|
|
|
| |
already in the code).
ok beck@ miod@
|
|
|
|
| |
ok miod@
|
|
|
|
| |
now, it has a NULL deref. Segfault reported by Mikolaj Kucharski, ok bcook
|
|
|
|
| |
noted by Bernard Spil
|
|
|
|
|
|
| |
Loosely based on changes in OpenSSL.
ok beck@
|
| |
|
|
|
|
|
|
|
|
| |
MD4 should have been removed a long time ago. Also, RFC 6150 moved it to
historic in 2011. Rides the major crank from removing SHA-0.
Discussed with many including beck@, millert@, djm@, sthen@
ok jsing@, input + ok bcook@
|
|
|
|
|
|
|
| |
SHA-0 was withdrawn shortly after publication 20 years ago and replaced
with SHA-1. This will require a major crank.
ok bcook@, jsing@
|
|
|
|
|
| |
OPENSSL_ia32cap_loc; nothing in ports uses them besides embedded copies of
OpenSSL. This opens the `all hell gets loose' window.
|
|
|
|
| |
ok miod
|
| |
|
|
|
|
|
|
|
| |
BN_bn2hex() had a 1-byte overflow when creating "-0\0". Reported to
me a while back by unknown person -- did not have enough experience
to push this through then.
advice from jsing, ok miod
|
|
|
|
| |
ok beck@ miod@
|
|
|
|
|
|
| |
four line function and a tonne of license text.
ok beck@
|
|
|
|
| |
"jajaja" miod@
|
|
|
|
|
|
|
|
|
| |
Currently, if you call ECDH_compute_key() it will silently truncate the
resulting key if the output buffer is less than the key size. Instead,
detect this condition and return an error. If the buffer provided is larger
than the key length, zero the remainder.
ok beck@ miod@ "+ shivers"
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
cpu's specific hardware capabilities users of libcrypto might be interested
in, as an integer value. This deprecates the existing OPENSSL_ia32cap()
macro and the OPENSSL_ia32cap_loc() function (which returns the pointer so
that you can mess with stuff you shouldn't mess with).
Interpreting the value returned by OPENSSL_cpu_caps() is, of course,
machine-dependent.
Minor version bump for libcrypto.
ok beck@ jsing@
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
only define them if not building for the "openbsd" flavour.
This way, non-obfuscated output can still be generated for analysis, by using
the "openbsd" flavour (which OpenBSD HEAD will do), and obfuscated output,
compatible with older as(1), will be generated for other platforms.
The portable version of LibreSSL can then use "openbsd-portable" as the
flavour for OpenBSD/amd64 so that generated files can be compiled with
OpenBSD 5.7 and other older versions stuck with as(1) 2.15.
|
|
|
|
|
|
|
|
|
|
| |
Fixes builds gcc + Apple's assembler, working on reenabling builds with older
OpenBSD releases.
based on OpenSSL commit:
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=902b30df193afc3417a96ba72a81ed390bd50de3
ok miod@
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
perform some consistency checks on its `p' and `q' values, and return an
error if the checks failed.
Thanks for Georgi Guninski (guninski at guninski dot com) for mentioning
the possibility of a weak (non prime) q value and providing a test case.
See https://cpunks.org/pipermail/cypherpunks/2015-September/009007.html
for a longer discussion.
ok bcook@ beck@
|
| |
|
|
|
|
|
|
|
|
|
| |
noops, so neuter the CRYPTO_malloc_init and CRYPTO_malloc_debug_init
macros.
With input from miod@
ok beck@ bcook@ miod@
|
|
|
|
| |
ok miod@
|
|
|
|
| |
ok "captain obvious"
|
|
|
|
|
|
|
| |
This is not the same as the macro expansion, however the ASN1_STRING_*
functions do match the macro expansions.
ok doug@ miod@
|
|
|
|
|
|
| |
From Matt Caswell's OpenSSL commit "RT3192: spurious error in DSA verify".
https://github.com/openssl/openssl/commit/eb63bce040d1cc6147d256f516b59552c018e29b
|
|
|
|
| |
ok doug@
|
|
|
|
|
|
|
|
|
|
| |
This is the first wave of SSLv3 removal which removes the main SSLv3
functions. Future commits will remove the rest of the SSLv3 support.
Discussed the plan at c2k15. Input from jsing@, beck@, miod@, bcook@,
sthen@, naddy@, and deraadt@.
ok jsing@, beck@
|
| |
|
| |
|
|
|
|
| |
reasons) - only change in generated assembly is due to line numbering.
|
|
|
|
|
|
| |
assembly.
ok bcook@
|
|
|
|
|
|
| |
and drop an unnecessary return from a void function.
ok bcook@ doug@
|