summaryrefslogtreecommitdiffstats
path: root/lib/libssl (follow)
Commit message (Collapse)AuthorAgeFilesLines
* avoid spurious ld evil string func warning, spotted by david@;djm2005-05-251-3/+3
| | | | feedback & ok avsm@
* no need to byteswap for AES_ASM, from tom@markus2005-05-231-1/+9
|
* import i386 AES asm code from openssl.org; ok and help with testing djm@markus2005-05-103-3/+1557
|
* kill strcpy; ok hshoexer@, prodded by david@djm2005-05-102-2/+2
|
* typo; from grunk AT pestilenz.org via markus@djm2005-04-291-2/+1
|
* remove this junk that snuck in the import; spotted by markus@djm2005-04-291-0/+0
|
* crankdjm2005-04-293-3/+3
|
* adjust for new files in 0.9.7gdjm2005-04-291-6/+22
|
* increase EVP_MAX_MD_SIZE to something sane (big enough for SHA512)djm2005-04-291-1/+1
|
* resolve conflictsdjm2005-04-29332-1928/+5751
|
* import of openssl-0.9.7g; tested on platforms from alpha to zaurus, ok deraadt@djm2005-04-29200-111/+45939
|
* typomiod2005-04-251-2/+2
|
* fix lies about snprintfderaadt2005-04-231-2/+3
|
* re-enable DSO_DLFCN on shared lib architectures; ok deraadtmarkus2005-04-011-2/+7
|
* Add a reasonably sane CA bundle to /etc/ssl/cert.pem, the defaultbeck2005-04-012-1/+3310
| | | | | | location for libssl, this makes lynx not bitch when seeing sites with certificates signed by these issuers. We should probably think carefully about adding a few more in here too.
* backout last commit for now..markus2005-03-301-2/+2
|
* enable openssl DSO (typo, it's -DDSO_DLFCN not -DSO_DLFCN); Douglas Santosmarkus2005-03-303-7/+7
|
* belive -> believemiod2005-03-293-4/+4
|
* For amd64, build the bn routines in libcrypto with the amd64 specificbeck2005-02-071-2/+9
| | | | | | x86_64-gcc.c replacement for the generic bn_asm.c. Seems to give a two to threefold speedup for rsa on amd64. ok millert@, hshoexer@
* adjust comment, open_dev_crypto() returns -1 on error.hshoexer2005-01-291-1/+1
| | | | ok markus@
* on error set correct pointer to NULL.hshoexer2005-01-261-2/+2
| | | | | | From phk@freebsd.org ok markus@
* mips is now 64 bits so use a 64 bit configpefo2004-09-071-6/+6
|
* mips->mips64pefo2004-08-111-0/+0
|
* cleanup mipspefo2004-08-061-5/+1
|
* errno changes, lib major version bumps, and general flag daymarc2004-07-133-4/+4
| | | | | | | To build you must: cd /usr/src && make obj && make includes cd lib/libc && make depend && make && NOMAN=1 sudo make install cd /usr/src && make build
* machdep.xcrypt now has a different meaning: Instead of > 0 indicatingderaadt2004-06-151-14/+16
| | | | | | that AES is there, we now have 3 flag bits: C3_HAS_AES, C3_HAS_SHA (SHA1 & SHA256), and C3_HAS_MM (RSA). Change this code to only look at C3_HAS_AES for now.
* do not link ssltest.c into libssl, stops main/doit symbols from beingavsm2004-04-271-2/+2
| | | | exported. no bump needed since nothing should use them, markus@ ok
* update missing pieces from 0.9.7d; ok henningmarkus2004-04-254-12/+68
| | | | crank minor for API extensions
* avoid NULL deref; from danh@markus2004-04-251-2/+5
|
* from openssl, 1.50.2.9, make S/MIME encrypt work again.markus2004-04-251-4/+9
|
* backout for nowmarkus2004-04-083-67/+11
|
* merge 0.9.7dmarkus2004-04-08120-1433/+1864
|
* import openssl-0.9.7dmarkus2004-04-0722-29/+852
|
* support IPv6 connections in "openssl s_client", adding -4 and -6 options todjm2004-03-313-96/+45
| | | | force protocol; ok itojun@
* Unbreak rmd160. Was broken on sparc64 when compiled with gcc3. Fix and reporthshoexer2004-03-221-2/+2
| | | | | | | | | | by Simon Kellner. XXX This is only a temporary work-around and we still need a REAL fix for XXX this issue. Testing on different archs by marc@ tdvall@ millert@ otto@ ho@ miod@ hshoexer@ ok deraadt@
* Insert missing ABORT if EC_GROUP_copy() fails.tom2004-03-211-1/+1
| | | | ok markus@
* return(00); -> return(0); markus@ okaaron2004-03-171-2/+2
|
* out-of-bounds read in (unused) kerberos ciphersuites (CAN-2004-0112)markus2004-03-172-0/+32
|
* avoid null-pointer deref (aka CAN-2004-0079)markus2004-03-172-0/+16
| | | | see http://www.openssl.org/news/secadv_20040317.txt
* change amd64's MACHINE_ARCH from x86_64 to amd64. There are many manyderaadt2004-02-272-182/+2
| | | | | | reasons for this, quite a few of them technical, and not all of them in response to Intel's broken ia32e crud. The gcc toolchain stays at x86_64 for now.
* Cleanup and shrink ACSS_KEY a bit. Thus crank library minor.hshoexer2004-02-134-20/+25
| | | | | | Change cipher modes to more generic names and add an additional mode. ok deraadt@ markus@
* simpler ssl manpages, using --name=.espie2004-02-091-117/+33
| | | | okay markus@
* remove some debug code and cleanup..deraadt2004-02-041-18/+6
|
* OK, this time the AES soft keys work with ssh and such. I spent over 3deraadt2004-02-031-16/+63
| | | | | hours learning that OpenSSL's internal functions for AES extended keys generate screwy byte order swapped data..
* oops, software key gen bugderaadt2004-02-031-35/+10
|
* Switch to using software generated extended keys (because the cpu cannotderaadt2004-02-031-10/+35
| | | | | | | | | | yet generate 192 & 256 bit keys). Ensure that 192 and 256 are in the nids table. This also accelerates performance for 128 a tiny bit: type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes aes-128-cbc 34921.48k 129617.82k 362059.93k 623649.81k 790397.77k aes-192-cbc 26227.43k 99215.33k 283242.84k 509881.15k 665323.22k aes-256-cbc 26133.22k 97458.06k 265990.84k 457824.69k 579835.09k
* config for arm, copied from powerpc/sparc ok markus@drahn2004-02-031-0/+180
|
* If on an i386, detect existance of the VIA C3 xcrypt-* using sysctl ofderaadt2004-02-031-4/+174
| | | | | | | | the machdep.xcrypt node. If they exist, use the xcrypt-cbc instruction to accelerate aes-{128,192,256}-cbc, for more than 100x performance increase. This code has no effect on any cpu... Tested thus far using openssl speed command, and of course, ssh. 778MB/sec AES-128-CBC performance at 8192 byte block size.
* cleanup byte order detection per arch a bit; mickey okderaadt2004-01-291-14/+4
|
* the rest of the libs stuff; from art@ againmickey2004-01-282-0/+360
|