#
73530852 |
| 31-Aug-2024 |
tb <tb@openbsd.org> |
Nuke the whrlpool (named after the galaxy) from orbit
It's just gross. Only used by a popular disk encryption utility on an all-too-popular OS one or two decades back.
ok beck jsing
|
#
df8006fe |
| 31-Aug-2024 |
tb <tb@openbsd.org> |
Remove EVP_PKEY_*check again
This API turned out to be a really bad idea. OpenSSL 3 extended it, with the result that basically every key type had its own DoS issues fixed in a recent security relea
Remove EVP_PKEY_*check again
This API turned out to be a really bad idea. OpenSSL 3 extended it, with the result that basically every key type had its own DoS issues fixed in a recent security release. We eschewed these by having some upper bounds that kick in when keys get insanely large.
Initially added on tobhe's request who fortunately never used it in iked, this was picked up only by ruby/openssl (one of the rare projects doing proper configure checks rather than branching on VERSION defines) and of course xca, since it uses everything it can. So it was easy to get rid of this again.
ok beck jsing
show more ...
|
#
0ba1462e |
| 09-Jul-2024 |
tb <tb@openbsd.org> |
Add EVP_PKEY_TLS1_PRF as alias for NID_tls1_prf
ok jsing
|
#
4a6a63a6 |
| 14-Apr-2024 |
tb <tb@openbsd.org> |
Delete a few more GOST remnants
When I unifdefed GOST support, the tree wasn't fully unlocked, so I didn't want to touch a public header. All this code is in #ifndef OPENSSL_NO_GOST, which we define
Delete a few more GOST remnants
When I unifdefed GOST support, the tree wasn't fully unlocked, so I didn't want to touch a public header. All this code is in #ifndef OPENSSL_NO_GOST, which we define.
ok jsing
show more ...
|
#
676c1ec4 |
| 10-Apr-2024 |
beck <beck@openbsd.org> |
Hide deprecated functions in evp.h
use LCRYPTO_UNUSED and remove the LIBRESSL_INTERNAL guard around them.
ok tb@
|
#
e8fb5058 |
| 02-Mar-2024 |
tb <tb@openbsd.org> |
Garbage collect CUSTOM_KEY_LENGTH/SET_KEY_LENGTH
These are unused defines that used to add unwanted complications in EVP_CIPHER_CTX_set_key_lenght().
ok jsing
|
#
fccc7e89 |
| 02-Mar-2024 |
tb <tb@openbsd.org> |
Remove more PBE stuff from the public API
This is still needed internally for CMS and its predecessors. This removal will enable disentangling some of its innards.
ok jsing
|
#
c34ae6d7 |
| 02-Mar-2024 |
tb <tb@openbsd.org> |
Remove RC4-HMAC-MD5 and AES-{128,256}-CBC-HMAC-SHA-1
"Stitched" mode AEADs were removed from libssl a long time ago. Nothing uses these CIPHERs anymore.
ok jsing
|
#
0659516d |
| 02-Mar-2024 |
tb <tb@openbsd.org> |
Make legacy cipher methods internal
These are ASN.1 handlers for CIPHERs, still used by CMS and its predecessors. They should never have been public.
ok jsing
|
#
573bb26a |
| 02-Mar-2024 |
tb <tb@openbsd.org> |
Remove EVP_PBE_* API from public visibility
You can no longer add your custom PBE algorithm. Pity. EVP_PBE_CipherInit() stays for internal use, the rest goes away copmletely.
ok jsing
|
#
6b049bbc |
| 02-Mar-2024 |
tb <tb@openbsd.org> |
Remove EVP_PKEY_meth_*() API
After ameth, the second bit of custom EVP_PKEY API removal.
ok jsing
|
#
10725ce6 |
| 02-Mar-2024 |
tb <tb@openbsd.org> |
Remove the ameth lib
This is accessor API for ASN.1 methods needed for custom PKEYs. Nothing has ever used this. This has been neutered for months. The EVP_PKEY_asn1_* API that needs to stay was mov
Remove the ameth lib
This is accessor API for ASN.1 methods needed for custom PKEYs. Nothing has ever used this. This has been neutered for months. The EVP_PKEY_asn1_* API that needs to stay was moved elsewhere.
ok jsing
show more ...
|
#
0947de58 |
| 02-Mar-2024 |
tb <tb@openbsd.org> |
Remove EVP_MD_meth* again
Erlang upstream disabled the otp_test_engine for LibreSSL >= 3.5 without explanation. It was the only reason we added this garbage API in the first place. Meanwhile libfido
Remove EVP_MD_meth* again
Erlang upstream disabled the otp_test_engine for LibreSSL >= 3.5 without explanation. It was the only reason we added this garbage API in the first place. Meanwhile libfido2 started using it for a mock up of OpenSSL 3's broken fetch design with old API. This is pointless, so all this garbage goes away again (in particular we can remove the absolutely horrifying EVP_MD_meth_set_app_datasize() again).
ok jsing
show more ...
|
#
b3f18280 |
| 02-Mar-2024 |
tb <tb@openbsd.org> |
Fix signature and semantics of EVP_{CIPHER,MD}_CTX_init()
When the EVP_CIPHER_CTX and the EVP_MD_CTX were still expected to live on the stack, these initialization APIs were wrappers around memset.
Fix signature and semantics of EVP_{CIPHER,MD}_CTX_init()
When the EVP_CIPHER_CTX and the EVP_MD_CTX were still expected to live on the stack, these initialization APIs were wrappers around memset. In OpenSSL 1.1, somebody removed them and carelessly made _init() an alias of _reset() aka _cleanup(). As a consequence, both signature and semantics changed.
Unsurprisingly, there is now code out there that actually uses the new semantics, which causes leaks on LibreSSL and older OpenSSL. This aligns our _init() with OpenSSL 1.1 semantics.
ok jsing
show more ...
|
#
66c7a9c3 |
| 02-Mar-2024 |
tb <tb@openbsd.org> |
Remove EVP_{add,delete}_{cipher,digest}_alias()
These are macro wrappers around the neutered OBJ_NAME_{add,remove}() API (notice the consistency), which will be removed shortly. Only security/xca us
Remove EVP_{add,delete}_{cipher,digest}_alias()
These are macro wrappers around the neutered OBJ_NAME_{add,remove}() API (notice the consistency), which will be removed shortly. Only security/xca used to use this.
ok jsing
show more ...
|
#
6214b2ff |
| 02-Mar-2024 |
tb <tb@openbsd.org> |
Remove EVP_add_{cipher,digest}() from public API
Ciphers and digests are now handled in a static lookup table and no longer by the associative array that used to underlie the OBJ_NAME API. Adding ci
Remove EVP_add_{cipher,digest}() from public API
Ciphers and digests are now handled in a static lookup table and no longer by the associative array that used to underlie the OBJ_NAME API. Adding ciphers is no longer possible. What uses this API does so for historic reasons coming from a time where SHA-2 and some AES variants needed to be enabled explicitly. Ports doing this (PHP and DANE code) were fixed.
ok jsing
show more ...
|
#
2d85471a |
| 18-Feb-2024 |
tb <tb@openbsd.org> |
Hide EVP_{CIPHER,MD}_CTX_init() from internals
ok jsing
|
#
5e9af907 |
| 18-Oct-2023 |
tb <tb@openbsd.org> |
Remove EVP_add_alg_module() prototype
This function was the unfortunate protagonist in a series of tragic merge errors resulting in only a short stint of a year and nine months between OpenSSL 0.9.8
Remove EVP_add_alg_module() prototype
This function was the unfortunate protagonist in a series of tragic merge errors resulting in only a short stint of a year and nine months between OpenSSL 0.9.8j and 1.0.0a actually present in OpenBSD. Then it said good bye for good, but somehow a prototype came back with 1.0.1g, a famous version released when there were slightly more pressing things to be taken care of than a function supporting a config knob whose only purpose was to turn off fips mode or to error.
from schwarze
PS: The mechanism that it was supposed to provide is still documented in openssl.cnf(5). I am going remove the relevant bit at some point, but not today.
show more ...
|
#
51323fa6 |
| 25-Aug-2023 |
schwarze <schwarze@openbsd.org> |
KNF, no assembly change OK tb@ jsing@
|
#
90f7323e |
| 25-Apr-2023 |
tb <tb@openbsd.org> |
Move truncated sha-2 and sha3 out of #ifdef wrappers
|
#
3a50714b |
| 25-Apr-2023 |
tb <tb@openbsd.org> |
Remove X9.31 support
ok jsing
|
#
925de8c6 |
| 16-Apr-2023 |
jsing <jsing@openbsd.org> |
Provide EVP methods for SHA3 224/256/384/512.
ok tb@
|
#
2afadb71 |
| 16-Apr-2023 |
jsing <jsing@openbsd.org> |
Provide EVP methods for SHA512/224 and SHA512/256.
ok tb@
|
#
9afd7501 |
| 10-Mar-2023 |
tb <tb@openbsd.org> |
Expose the EVP_CIPHER_meth_* API (setter only) in evp.h
|
#
f28dc7d0 |
| 01-Mar-2023 |
tb <tb@openbsd.org> |
Add EVP_CIPHER_meth_* prototypes to evp.h
As usual, this will be guarded by LIBRESSL_INTERNAL || LIBRESSL_NEXT_API until the next bump.
ok jsing
|