summaryrefslogtreecommitdiffstats
path: root/util
AgeCommit message (Collapse)Author
2005-05-16ecc api cleanup; summary:Nils Larsch
- hide the EC_KEY structure definition in ec_lcl.c + add some functions to use/access the EC_KEY fields - change the way how method specific data (ecdsa/ecdh) is attached to a EC_KEY - add ECDSA_sign_ex and ECDSA_do_sign_ex functions with additional parameters for pre-computed values - rebuild libeay.num from 0.9.7
2005-05-16rebuild to synchronize with additions to 0.9.7 branchBodo Möller
2005-05-15Make update.Dr. Stephen Henson
2005-05-11Fix more error codes.Bodo Möller
(Also improve util/ck_errf.pl script, and occasionally fix source code formatting.)
2005-05-10give EC_GROUP_new_by_nid a more meanigful name:Nils Larsch
EC_GROUP_new_by_nid -> EC_GROUP_new_by_curve_name
2005-05-09Update util/ck_errf.pl script, and have it run automaticallyBodo Möller
during "make errors" and thus during "make update". Fix lots of bugs that util/ck_errf.pl can detect automatically. Various others of these are still left to fix; that's why "make update" will complain loudly when run now.
2005-05-09rebuild (starting with state from 0.9.7-stable branch) to avoid clutterBodo Möller
2005-05-08give EC_GROUP_*_nid functions a more meaningful nameNils Larsch
EC_GROUP_get_nid -> EC_GROUP_get_curve_name EC_GROUP_set_nid -> EC_GROUP_set_curve_name
2005-04-27Lots of Win32 fixes for DTLS.Dr. Stephen Henson
1. "unsigned long long" isn't portable changed: to BN_ULLONG. 2. The LL prefix isn't allowed in VC++ but it isn't needed where it is used. 2. Avoid lots of compiler warnings about signed/unsigned mismatches. 3. Include new library directory pqueue in mk1mf build system. 4. Update symbols.
2005-04-27get rid of Makefile.ssl in util/Nils Larsch
2005-04-27no Makefile.ssl anymoreNils Larsch
2005-04-26there's no such thing as Makefile.ssl anymoreBodo Möller
2005-04-26some updates for the blinding code; summary:Nils Larsch
- possibility of re-creation of the blinding parameters after a fixed number of uses (suggested by Bodo) - calculatition of the rsa::e in case it's absent and p and q are present (see bug report #785) - improve the performance when if one rsa structure is shared by more than a thread (see bug report #555) - fix the problem described in bug report #827 - hide the definition ot the BN_BLINDING structure in bn_blind.c
2005-04-26Fix various incorrect error function codes.Bodo Möller
("perl util/ck_errf.pl */*.c */*/*.c" still reports many more.)
2005-04-26take OPENSSL_NO_DGRAM into accountBodo Möller
(via make update)
2005-04-26let mkdef.pl know about OPENSSL_NO_DGRAMBodo Möller
(which appears in the new file crypto/bio/bss_dgram.c)
2005-04-26make updateBodo Möller
2005-04-26fix SSLerr stuff for DTLS1 code;Bodo Möller
move some functions from exported header <openssl/dtl1.h> into "ssl_locl.h"; fix silly indentation (a TAB is *not* always 4 spaces)
2005-04-24Oops...Dr. Stephen Henson
2005-04-24Recognize zlib and krb5 options in mk1mf.plDr. Stephen Henson
2005-04-22make updateNils Larsch
2005-04-21Don't use standard kerberos library locations in MK1MF builds.Dr. Stephen Henson
Fix typo in mk1mf.pl
2005-04-20Process MINFO file earlier in mk1mf.pl so it can modify variables like CFLAGS.Dr. Stephen Henson
Process kerberos include and library options.
2005-04-20Handle similar mk1mf.pl options with a hash table.Dr. Stephen Henson
2005-04-19Fix logic in mkdef.pl function is_valid.Dr. Stephen Henson
Update symbols
2005-04-19Stop perl warning.Dr. Stephen Henson
2005-04-19New "algorithm define" OPENSSL_NO_GMP. Update mkdef.pl and Configure scriptDr. Stephen Henson
to use it.
2005-04-19Ignore TYPEDEF_OF in mkdef.plDr. Stephen Henson
2005-04-19Various Win32 and other fixes for warnings and compilation errors.Dr. Stephen Henson
Fix Win32 build system to use 'Makefile' instead of 'Makefile.ssl'.
2005-04-17Fix from stable branch.Dr. Stephen Henson
2005-04-13Makefile.ssl -> MakefileNils Larsch
2005-04-12Include error library value in C error source files instead of fixing upDr. Stephen Henson
at runtime.
2005-04-11Add emacs cache files to .cvsignore.Richard Levitte
2005-03-30Take account of Makefile.ssl removal.Ben Laurie
2005-02-06Make util/shlib_wrap.sh [Open]BSD-friendly.Andy Polyakov
2005-02-05In mkdef.pl ignore trailing whitespace in #ifdef linesDr. Stephen Henson
2005-02-01Address run-time linker problems: LD_PRELOAD issue on multi-ABI platformsAndy Polyakov
and SafeDllSearchMode in Windows. Submitted by: Richard Levitte
2005-01-17Changes concering RFC 3820 (proxy certificates) integration:Richard Levitte
- Enforce that there should be no policy settings when the language is one of id-ppl-independent or id-ppl-inheritAll. - Add functionality to ssltest.c so that it can process proxy rights and check that they are set correctly. Rights consist of ASCII letters, and the condition is a boolean expression that includes letters, parenthesis, &, | and ^. - Change the proxy certificate configurations so they get proxy rights that are understood by ssltest.c. - Add a script that tests proxy certificates with SSL operations. Other changes: - Change the copyright end year in mkerr.pl. - make update.
2004-12-28Add functionality needed to process proxy certificates.Richard Levitte
2004-12-20Refine PowerPC platform support.Andy Polyakov
2004-12-13Change libeay.num so it's synchronised with additions in 0.9.7-stable.Richard Levitte
make update
2004-12-05Update year.Dr. Stephen Henson
2004-11-25Allow alternative manual sections to be embedded in .pod file comments.Dr. Stephen Henson
2004-10-04Fix race condition when CRL checking is enabled.Dr. Stephen Henson
2004-09-28usr/doc has recently changed to usr/share/doc on Cygwin.Richard Levitte
Notified by Corinna Vinschen <vinschen@redhat.com>
2004-09-10make updateRichard Levitte
2004-07-22WinCE should always be compiled as UNICODE, even debugging version...Andy Polyakov
2004-07-12make updateRichard Levitte
(incidently, this also tells VMS that there exists a new symbol in the SSL library)
2004-07-12Because it's one of our libraries calling new functions in the other,Richard Levitte
we need to have them among the symbols that should appear in the transfer table, at least on VMS (and it wouldn't surprise me if Windows would whine as well).
2004-06-17Deprecate unused cruft, and "make update".Geoff Thorpe
n class="k">struct KbdintDevice { const char *name; void* (*init_ctx)(Authctxt*); int (*query)(void *ctx, char **name, char **infotxt, u_int *numprompts, char ***prompts, u_int **echo_on); int (*respond)(void *ctx, u_int numresp, char **responses); void (*free_ctx)(void *ctx); }; int auth_rhosts(struct passwd *, const char *); int auth_rhosts2(struct passwd *, const char *, const char *, const char *); int auth_rhosts_rsa(Authctxt *, char *, Key *); int auth_password(Authctxt *, const char *); int auth_rsa(Authctxt *, BIGNUM *); int auth_rsa_challenge_dialog(Key *); BIGNUM *auth_rsa_generate_challenge(Key *); int auth_rsa_verify_response(Key *, BIGNUM *, u_char[]); int auth_rsa_key_allowed(struct passwd *, BIGNUM *, Key **); int auth_rhosts_rsa_key_allowed(struct passwd *, char *, char *, Key *); int hostbased_key_allowed(struct passwd *, const char *, char *, Key *); int user_key_allowed(struct passwd *, Key *); #ifdef KRB5 int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client, krb5_data *); int auth_krb5_tgt(Authctxt *authctxt, krb5_data *tgt); int auth_krb5_password(Authctxt *authctxt, const char *password); void krb5_cleanup_proc(Authctxt *authctxt); #endif /* KRB5 */ #if defined(USE_SHADOW) && defined(HAS_SHADOW_EXPIRE) #include <shadow.h> int auth_shadow_acctexpired(struct spwd *); int auth_shadow_pwexpired(Authctxt *); #endif #include "auth-pam.h" #include "audit.h" void remove_kbdint_device(const char *); void disable_forwarding(void); void do_authentication(Authctxt *); void do_authentication2(Authctxt *); void auth_log(Authctxt *, int, char *, char *); void userauth_finish(Authctxt *, int, char *); void userauth_send_banner(const char *); int auth_root_allowed(char *); char *auth2_read_banner(void); void privsep_challenge_enable(void); int auth2_challenge(Authctxt *, char *); void auth2_challenge_stop(Authctxt *); int bsdauth_query(void *, char **, char **, u_int *, char ***, u_int **); int bsdauth_respond(void *, u_int, char **); int skey_query(void *, char **, char **, u_int *, char ***, u_int **); int skey_respond(void *, u_int, char **); void auth2_jpake_get_pwdata(Authctxt *, BIGNUM **, char **, char **); void auth2_jpake_stop(Authctxt *); int allowed_user(struct passwd *); struct passwd * getpwnamallow(const char *user); char *get_challenge(Authctxt *); int verify_response(Authctxt *, const char *); void abandon_challenge_response(Authctxt *); char *authorized_keys_file(struct passwd *); char *authorized_keys_file2(struct passwd *); char *authorized_principals_file(struct passwd *); FILE *auth_openkeyfile(const char *, struct passwd *, int); FILE *auth_openprincipals(const char *, struct passwd *, int); int auth_key_is_revoked(Key *); HostStatus check_key_in_hostfiles(struct passwd *, Key *, const char *, const char *, const char *); /* hostkey handling */ Key *get_hostkey_by_index(int); Key *get_hostkey_public_by_type(int); Key *get_hostkey_private_by_type(int); int get_hostkey_index(Key *); int ssh1_session_key(BIGNUM *); /* debug messages during authentication */ void auth_debug_add(const char *fmt,...) __attribute__((format(printf, 1, 2))); void auth_debug_send(void); void auth_debug_reset(void); struct passwd *fakepw(void); int sys_auth_passwd(Authctxt *, const char *); #define AUTH_FAIL_MSG "Too many authentication failures for %.100s" #define SKEY_PROMPT "\nS/Key Password: " #if defined(KRB5) && !defined(HEIMDAL) #include <krb5.h> krb5_error_code ssh_krb5_cc_gen(krb5_context, krb5_ccache *); #endif #endif