aboutsummaryrefslogtreecommitdiffstats
path: root/util/libeay.num
Commit message (Collapse)AuthorAgeFilesLines
* Remove more unused things.Rich Salz2016-03-181-4735/+0
| | | | | | Moved doc/standards.txt to the web. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Rename EVP_CIPHER_CTX_cipher_data to EVP_CIPHER_CTX_get_cipher_dataMatt Caswell2016-03-071-0/+4735
| | | | | | | | We had the function EVP_CIPHER_CTX_cipher_data which is newly added for 1.1.0. As we now also need an EVP_CIPHER_CTX_set_cipher_data it makes more sense for the former to be called EVP_CIPHER_CTX_get_cipher_data. Reviewed-by: Tim Hudson <tjh@openssl.org>
* Remove the old ordinalsRichard Levitte2016-03-051-4806/+0
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* make updateDr. Stephen Henson2016-03-021-0/+1
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* make updateDr. Stephen Henson2016-03-021-0/+2
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* CT policy validationRob Percival2016-03-011-0/+13
| | | | | | | | Specifies a callback that will, in the future, be used by the SSL code to decide whether to abort a connection on Certificate Transparency grounds. Reviewed-by: Ben Laurie <ben@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
* Verify SCT signaturesRob Percival2016-03-011-0/+22
| | | | | | | Tests included in future commit, which adds CT policy validation. Reviewed-by: Ben Laurie <ben@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
* Refactor the async wait fd logicMatt Caswell2016-02-291-3/+11
| | | | | | | | | | | | | | | | | | | Implementation experience has shown that the original plan for async wait fds was too simplistic. Originally the async logic created a pipe internally and user/engine code could then get access to it via API calls. It is more flexible if the engine is able to create its own fd and provide it to the async code. Another issue is that there can be a lot of churn in the fd value within the context of (say) a single SSL connection leading to continually adding and removing fds from (say) epoll. It is better if we can provide some stability of the fd value across a whole SSL connection. This is problematic because an engine has no concept of an SSL connection. This commit refactors things to introduce an ASYNC_WAIT_CTX which acts as a proxy for an SSL connection down at the engine layer. Reviewed-by: Richard Levitte <levitte@openssl.org>
* make updateDr. Stephen Henson2016-02-281-0/+1
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Emilia Käsper <emilia@openssl.org>
* Public API for Certificate TransparencyRob Percival2016-02-261-0/+31
| | | | | Reviewed-by: Ben Laurie <ben@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
* Implement new multi-threading APIAlessandro Ghedini2016-02-261-0/+13
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org>
* CVE-2016-0798: avoid memory leak in SRPEmilia Kasper2016-02-251-1/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | The SRP user database lookup method SRP_VBASE_get_by_user had confusing memory management semantics; the returned pointer was sometimes newly allocated, and sometimes owned by the callee. The calling code has no way of distinguishing these two cases. Specifically, SRP servers that configure a secret seed to hide valid login information are vulnerable to a memory leak: an attacker connecting with an invalid username can cause a memory leak of around 300 bytes per connection. Servers that do not configure SRP, or configure SRP but do not configure a seed are not vulnerable. In Apache, the seed directive is known as SSLSRPUnknownUserSeed. To mitigate the memory leak, the seed handling in SRP_VBASE_get_by_user is now disabled even if the user has configured a seed. Applications are advised to migrate to SRP_VBASE_get1_by_user. However, note that OpenSSL makes no strong guarantees about the indistinguishability of valid and invalid logins. In particular, computations are currently not carried out in constant time. Reviewed-by: Rich Salz <rsalz@openssl.org>
* Remove JPAKERich Salz2016-02-171-21/+0
| | | | Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
* Correct deprecation of OPENSSL_configRichard Levitte2016-02-151-1/+1
| | | | | | Reported in GH#684 Reviewed-by: Matt Caswell <matt@openssl.org>
* make updateRichard Levitte2016-02-141-7/+7
| | | | Reviewed-by: Andy Polyakov <appro@openssl.org>
* Hide OPENSSL_INIT_SETTINGS.Rich Salz2016-02-111-0/+3
| | | | | Make OPENSSL_INIT_SETTINGS an opaque structure. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Rename INIT funtions, deprecate old ones.Rich Salz2016-02-101-4/+4
| | | | | | Man, there were a lot of renamings :) Reviewed-by: Richard Levitte <levitte@openssl.org>
* clean away old VMS cruftRichard Levitte2016-02-101-145/+58
| | | | | | | | | | | | The old building scripts get removed, they are hopelessly gone in bit rot by now. Also remove the old symbol hacks. They were needed needed to shorten some names to 31 characters, and to resolve other symbol clashes. Because we now compile with /NAMES=(AS_IS,SHORTENED), this is no longer required. Reviewed-by: Rich Salz <rsalz@openssl.org>
* Remove store.Rich Salz2016-02-101-5/+5
| | | | | | | Rebased and merged by me, with Ben's approval. Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Ben Laurie <ben@openssl.org>
* Updates for auto init/deinit review commentsMatt Caswell2016-02-091-0/+1
| | | | | | Fixes for the auto-init/deinit code based on review comments Reviewed-by: Richard Levitte <levitte@openssl.org>
* Auto init/deinit libcryptoMatt Caswell2016-02-091-25/+25
| | | | | | | This builds on the previous commit to auto initialise/deinitialise libcrypto. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Provide framework for auto initialise/deinitialise of the libraryMatt Caswell2016-02-091-0/+3
| | | | | | | | | | | | This commit provides the basis and core code for an auto initialisation and deinitialisation framework for libcrypto and libssl. The intention is to remove the need (in many circumstances) to call explicit initialise and deinitialise functions. Explicit initialisation will still be an option, and if non-default initialisation is needed then it will be required. Similarly for de-initialisation (although this will be a lot easier since it will bring all de-initialisation into a single function). Reviewed-by: Richard Levitte <levitte@openssl.org>
* make updateDr. Stephen Henson2016-02-081-6/+18
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* rename old functions names in libeay.numDr. Stephen Henson2016-02-081-6/+6
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Add BIO_ADDR_clear to libeay.numKurt Roeckx2016-02-061-0/+1
| | | | | | Reviewed-by: Matt Caswell <matt@openssl.org> MR: #1874
* make updateDr. Stephen Henson2016-02-051-0/+4
| | | | Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
* make updateRichard Levitte2016-02-031-5/+11
| | | | Reviewed-by: Kurt Roeckx <kurt@openssl.org>
* Refactoring BIO: add error macros & text, and make updateRichard Levitte2016-02-031-0/+17
| | | | Reviewed-by: Kurt Roeckx <kurt@openssl.org>
* make updateDr. Stephen Henson2016-02-021-0/+3
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Add EC_GROUP_order_bits, EC_GROUP_get0_order and EC_GROUP_get0_cofactorDr. Stephen Henson2016-01-311-0/+3
| | | | | | | | New functions to return internal pointer for order and cofactor. This avoids the need to allocate a new BIGNUM which to copy the value to. Simplify code to use new functions. Reviewed-by: Rich Salz <rsalz@openssl.org>
* Add function to return internal enoding of X509_NAME.Dr. Stephen Henson2016-01-301-0/+1
| | | | | | PR#4280 Reviewed-by: Tim Hudson <tjh@openssl.org>
* Add CRYPTO_secure_zallocRich Salz2016-01-271-0/+1
| | | | | | Also turn B<foo> into foo() in the pod page. Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
* Move pqueue into sslRich Salz2016-01-241-12/+12
| | | | | | | | | | | This is an internal facility, never documented, not for public consumption. Move it into ssl (where it's only used for DTLS). I also made the typedef's for pqueue and pitem follow our style: they name structures, not pointers. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Remove the GOST engineMatt Caswell2016-01-191-1/+1
| | | | | | | | | | The GOST engine is now out of date and is removed by this commit. An up to date GOST engine is now being maintained in an external repository. See: https://wiki.openssl.org/index.php/Binaries Reviewed-by: Richard Levitte <levitte@openssl.org>
* Accessor update; fix API, document one.Rich Salz2016-01-171-4/+4
| | | | Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
* Add some accessors.Rich Salz2016-01-171-0/+5
| | | | | | | | | | | | | | | | | Author: Remi Gacogne <rgacogne-github@coredump.fr> GH334: Add an OCSP_SINGLERESP_get0_id() accessor to the OCSP_CERTID of a OCSP_SINGLERESP. It is possible to do it the other way around using OCSP_resp_find(), but this is more efficient when you have a tree indexed by OCSP_CERTID, like haproxy does. (This is also RT4251) Author: Marek Klein <kleinmrk@gmail.com> GH556: OCSP_resp_get_produced_at() accessor to the producedAt of a OCSP_BASICRESP GH555: TS_STATUS_INFO_get_status(), TS_STATUS_INFO_get_text() and TS_STATUS_INFO_get_failure_info() accessors for a TS_STATUS_INFO Signed-off-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
* fix no-engine buildDr. Stephen Henson2016-01-161-2/+2
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org>
* Add a no-egd option to disable EGD-related codeBenjamin Kaduk2016-01-141-3/+3
| | | | | | | | The entropy-gathering daemon is used only on a small number of machines. Provide a configure knob so that EGD support can be disabled by default but re-enabled on those systems that do need it. Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
* Reorder the ordinals in libeay.numRichard Levitte2016-01-131-7/+7
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Add CRYPTO_EX_DATA; remove EC_EXTRA_DATARich Salz2016-01-131-5/+9
| | | | | | | | | | | | Add CRYPTO_EX_DATA add EndC_KEY_[gs]et_method, From Roumen Petrov. Had to add various exdata calls to init/copy/free the exdata. Had to remove const from some EC functions because exdata isn't const-correct. :( Also remove EC_EXTRA_DATA and use a union to hold the possible pre-computed values and an enum to tell which value is in the union. (Rich Salz) Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
* make updateRichard Levitte2016-01-121-3/+31
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* update ordinalsDr. Stephen Henson2016-01-111-0/+3
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* RT41897: Add an CRYPTO_secure_actual_sizeRich Salz2016-01-091-0/+1
| | | | | | This is already documented, I just forgot to include the code :) Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
* update ordinalsDr. Stephen Henson2016-01-091-29/+26
| | | | Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
* Fix no CRYPTO_MDEBUG build (windows)Rich Salz2016-01-081-36/+39
| | | | | | | | | In order for mkdep to find #ifdef'd functions, they must be wrapped (in the header file) with #ifndef OPENSSL_NO_... So do that for various CRYPTO_mem_debug... things. Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
* mem functions cleanupRich Salz2016-01-071-30/+16
| | | | | | | | | | | | | | | | | Only two macros CRYPTO_MDEBUG and CRYPTO_MDEBUG_ABORT to control this. If CRYPTO_MDEBUG is not set, #ifdef out the whole debug machinery. (Thanks to Jakob Bohm for the suggestion!) Make the "change wrapper functions" be the only paradigm. Wrote documentation! Format the 'set func' functions so their paramlists are legible. Format some multi-line comments. Remove ability to get/set the "memory debug" functions at runtme. Remove MemCheck_* and CRYPTO_malloc_debug_init macros. Add CRYPTO_mem_debug(int flag) function. Add test/memleaktest. Rename CRYPTO_malloc_init to OPENSSL_malloc_init; remove needless calls. Reviewed-by: Richard Levitte <levitte@openssl.org>
* DANE make updateViktor Dukhovni2016-01-061-0/+2
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Remove more (rest?) of FIPS build stuff.Rich Salz2016-01-061-1/+1
| | | | Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
* remove duplicates in util/libeay.numRoumen Petrov2015-12-231-13/+0
| | | | | | | Signed-off-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Rich Salz <rsalz@openssl.org> RT: #4195, MR: #1521
* Cleanup CRYPTO_{push,pop}_infoRich Salz2015-12-221-3/+3
| | | | | | | | Rename to OPENSSL_mem_debug_{push,pop}. Remove simple calls; keep only calls used in recursive functions. Ensure we always push, to simplify so that we can always pop Reviewed-by: Richard Levitte <levitte@openssl.org>