Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Call certificate variables cert and certs, rather than x and sk | jsing | 2022-07-02 | 1 | -6/+6 | |
| | | | | ok tb@ | |||||
* | Use ASN1_INTEGER to parse/build (Z)LONG_it | jsing | 2022-07-02 | 1 | -69/+67 | |
| | | | | | | | Rather than having yet another (broken) ASN.1 INTEGER content builder and parser, use {c2i,i2c}_ASN1_INTEGER(). ok beck@ | |||||
* | Remove references to openssl/obj_mac.h | jsing | 2022-07-02 | 3 | -12/+11 | |
| | | | | Consumers should include openssl/objects.h instead. | |||||
* | Stop using ssl{_ctx,}_security() outside of ssl_seclevel.c | tb | 2022-07-02 | 7 | -23/+60 | |
| | | | | | | | | | The API is ugly and we can easily abstract it away. The SSL_SECOP_* stuff is now confined into ssl_seclevel.c and the rest of the library can make use of the more straightforward wrappers, which makes it a lot easier on the eyes. ok beck jsing | |||||
* | Adjust to new tls1_ec_nid2group_id API. | tb | 2022-07-02 | 1 | -7/+13 | |
| | ||||||
* | Rename uses 'curve' to 'group' and rework tls1 group API. | tb | 2022-07-02 | 12 | -162/+204 | |
| | | | | | | | | | | This reworks various tls1_ curve APIs to indicate success via a boolean return value and move the output to an out parameter. This makes the caller code easier and more consistent. Based on a suggestion by jsing ok jsing | |||||
* | Fix off-by-one in length check. | tb | 2022-07-02 | 1 | -3/+3 | |
| | | | | Spotted by jsing | |||||
* | Make tls1_ec_curve_id2nid() return explicit NID_undef instead of 0 on error | tb | 2022-07-02 | 2 | -5/+5 | |
| | | | | | | and adjust the only caller that didn't check for NID_undef already. ok beck jsing | |||||
* | To figure our whether a large allocation can be grown into the | guenther | 2022-06-30 | 1 | -12/+2 | |
| | | | | | | | | | | | following page(s) we've been first mquery()ing for it, mmapp()ing w/o MAP_FIXED if available, and then munmap()ing if there was a race. Instead, just try it directly with mmap(MAP_FIXED | __MAP_NOREPLACE) tested in snaps for weeks ok deraadt@ | |||||
* | Remove redundant comments | tb | 2022-06-30 | 1 | -30/+30 | |
| | | | | discussed with jsing | |||||
* | Check security level for supported groups. | tb | 2022-06-30 | 4 | -35/+179 | |
| | | | | ok jsing | |||||
* | Rename variable from tls_version to version since it could also be | tb | 2022-06-30 | 1 | -3/+3 | |
| | | | | a DTLS version at this point. | |||||
* | Check whether the security level allows session tickets. | tb | 2022-06-30 | 1 | -2/+6 | |
| | | | | ok beck jsing | |||||
* | Add checks to ensure we do not initiate or negotiate handshakes with | tb | 2022-06-30 | 5 | -7/+34 | |
| | | | | | | versions below the minimum required by the security level. input & ok jsing | |||||
* | Replace obj_mac.h with object.h | tb | 2022-06-30 | 6 | -15/+17 | |
| | | | | Pointed out by and ok jsing | |||||
* | Add valid time test from ruby regress, and check ASN1_time_to_tm | beck | 2022-06-30 | 1 | -1/+27 | |
| | | | | against recorded time value. | |||||
* | Rename use_* to ssl_use_* for consistency. | tb | 2022-06-30 | 1 | -9/+10 | |
| | | | | discussed with jsing | |||||
* | add valid utc time that should fail to parse as generalized | beck | 2022-06-30 | 1 | -2/+6 | |
| | ||||||
* | Add tests for times missing seconds, and to be able to test | beck | 2022-06-30 | 1 | -3/+43 | |
| | | | | invalid generalized times specifically | |||||
* | whitespace nit | tb | 2022-06-30 | 1 | -2/+2 | |
| | ||||||
* | Remove obj_mac.h include. Requested by jsing | tb | 2022-06-30 | 1 | -2/+1 | |
| | ||||||
* | Don't check the signature if a cert is self signed. | tb | 2022-06-29 | 1 | -2/+7 | |
| | | | | ok beck jsing | |||||
* | Make ssl_cert_add{0,1}_chain_cert() take ssl/ctx | tb | 2022-06-29 | 4 | -22/+30 | |
| | | | | ok beck jsing | |||||
* | ssl_cert_set{0,1}_chain() take ssl/ctx | tb | 2022-06-29 | 4 | -19/+36 | |
| | | | | ok beck jsing | |||||
* | Add a security check to ssl_set_cert() | tb | 2022-06-29 | 1 | -1/+7 | |
| | | | | ok beck jsing | |||||
* | Make ssl_set_{cert,pkey} take an ssl/ctx | tb | 2022-06-29 | 1 | -12/+20 | |
| | | | | ok beck jsing | |||||
* | Refactor use_certificate_chain_* to take ssl/ctx instead of a cert | tb | 2022-06-29 | 3 | -21/+45 | |
| | | | | ok beck jsing | |||||
* | Add functions that check security level in certs and cert chains. | tb | 2022-06-29 | 2 | -2/+147 | |
| | | | | ok beck jsing | |||||
* | Make sure the verifier checks the security level in cert chains | tb | 2022-06-29 | 1 | -2/+9 | |
| | | | | ok beck jsing | |||||
* | Remove a confusing comment | tb | 2022-06-29 | 1 | -7/+2 | |
| | | | | discussed with jsing | |||||
* | Parse the @SECLEVEL=n annotation in cipher strings | tb | 2022-06-29 | 3 | -15/+28 | |
| | | | | | | | To this end, hand the SSL_CERT through about 5 levels of indirection to set an integer on it. ok beck jsing | |||||
* | Add support for sending QUIC transport parameters | beck | 2022-06-29 | 8 | -8/+466 | |
| | | | | | | | | | | This is the start of adding the boringssl API for QUIC support, and the TLS extensions necessary to send and receive QUIC transport data. Inspired by boringssl's https://boringssl-review.googlesource.com/24464 ok jsing@ tb@ | |||||
* | Use relative paths so beck can run regress in his git tree and have | tb | 2022-06-29 | 4 | -8/+12 | |
| | | | | the correct ssl_local.h etc be picked up. | |||||
* | whitespace nit | tb | 2022-06-29 | 1 | -2/+2 | |
| | ||||||
* | missing blank line | tb | 2022-06-29 | 1 | -1/+2 | |
| | ||||||
* | Refactor asn1 time parsing to use CBS - enforce valid times in ASN.1 parsing. | beck | 2022-06-29 | 3 | -68/+155 | |
| | | | | | | | | While we're here enforce valid days for months and leap years. Inspired by same in boringssl. ok jsing@ | |||||
* | Also check the security level in SSL_get1_supported_ciphers | tb | 2022-06-29 | 1 | -2/+5 | |
| | | | | ok beck jsing | |||||
* | Check security level when convertin a cipher list to bytes | tb | 2022-06-29 | 1 | -1/+4 | |
| | | | | ok beck jsing | |||||
* | Also check the security level when choosing a shared cipher | tb | 2022-06-29 | 1 | -1/+5 | |
| | | | | ok beck jsing | |||||
* | There's tentacles, tentacles everywhere | tb | 2022-06-29 | 1 | -1/+7 | |
| | | | | ok beck jsing | |||||
* | Also check the security level of the 'tmp dh' | tb | 2022-06-29 | 3 | -3/+24 | |
| | | | | ok beck jsing | |||||
* | Check the security of DH key shares | tb | 2022-06-29 | 6 | -6/+42 | |
| | | | | ok beck, looks good to jsing | |||||
* | Rename one s to ssl for consistency | tb | 2022-06-29 | 1 | -2/+2 | |
| | ||||||
* | Check sigalg security level when selecting them. | tb | 2022-06-29 | 1 | -1/+4 | |
| | | | | ok beck jsing | |||||
* | Check the security bits of the sigalgs' pkey | tb | 2022-06-29 | 1 | -1/+7 | |
| | | | | ok beck jsing | |||||
* | Check the security level when building sigalgs | tb | 2022-06-29 | 4 | -12/+20 | |
| | | | | ok beck jsing | |||||
* | Annotate sigalgs with their security level. | tb | 2022-06-29 | 2 | -2/+23 | |
| | | | | ok beck jsing | |||||
* | Add prototypes for ssl{_ctx,}_security() | tb | 2022-06-28 | 1 | -1/+5 | |
| | | | | ok beck jsing sthen | |||||
* | Add error code defins | tb | 2022-06-28 | 1 | -1/+6 | |
| | | | | ok beck jsing sthen | |||||
* | Add a period to a comment | tb | 2022-06-28 | 1 | -2/+2 | |
| | | | | Pointed out by jsing |