summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
...
* Ensure that we clear the libssl error stack before we make a function calljsing2015-09-123-5/+12
| | | | | | | | | | that we will pass the result through tls_ssl_error() on failure. Otherwise we can end up reporting spurious errors due to their being unrelated errors already on the error stack. Spotted by Marko Kreen. ok beck@
* Unwrap a bunch of lines.jsing2015-09-122-74/+38
|
* Nuke SSLEAY_CONF -- a backwards compatibility environment variable thatlteo2015-09-124-14/+5
| | | | | | | | | | has been superseded by OPENSSL_CONF and discouraged from use for almost 16 years. "Definately ok" jsing@ "burn it" deraadt@ "Kill it with fire" miod@ "KILL IT WITH FIRE!!! BURN!!!!" beck@
* __strsignal() is now declared in hidden/signal.hguenther2015-09-121-2/+0
|
* Put tls_peer_cert* functions in the same place.jsing2015-09-121-6/+6
|
* Wrap <inttypes.h> and finish wrapping of <wchar.h> so that calls go directguenther2015-09-1224-24/+51
| | | | and the symbols not in the C standard are weak
* Remove most of the SSLv3 version checks and a few TLS v1.0.doug2015-09-1214-236/+114
| | | | | | | We can now assume >= TLS v1.0 since SSL2_VERSION, SSL3_VERSION and DTLS1_BAD_VER support was removed. "reads ok" miod@
* Add openssl(1) speed support for AEAD algorithms.bcook2015-09-121-17/+96
| | | | | | | This adds aes-128-gcm aes-256-gcm chacha20-poly1305 from Adam Langley's original patch for OpenSSL ok beck@ jsing@
* Cleanup enginetest a bit.bcook2015-09-121-104/+84
| | | | | It was the only thing preventing -Werror from building on some systems due to the unchecked asprintf's.
* Uncopy and unpaste dtls1_send_newsession_ticket() - another 111 lines ofjsing2015-09-124-222/+6
| | | | code deduped.
* Fix the openssl(1) prime command: When checking a decimal number forlteo2015-09-121-3/+2
| | | | | | | | | primality, do not unnecessarily convert the original decimal number to hex in the output. Hex numbers explicitly specified with -hex remain unchanged. ok beck@ deraadt@ jsing@ miod@
* Move handshake message header length determination into a separatejsing2015-09-128-46/+54
| | | | | | | ssl3_handshake_msg_hdr_len() function. Use this to correct several places that have magic numbers with header lengths hardcoded as '4'. ok beck@
* Wrap <unistd.h> so that internal calls go direct and they're all weak symbolsguenther2015-09-126-4/+12
| | | | Delete unused 'fd' argument from internal function oldttyname()
* Wrap <getopt.h> to make the functions weak and make access to the initializedguenther2015-09-121-1/+6
| | | | variables go direct. (Common variables cannot be aliased.)
* Uncopy and unpaste dtls1_send_certificate_request() - removes another 80jsing2015-09-124-160/+6
| | | | lines of code, while gaining SIGALGs support.
* Uncopy and unpaste dtls1_send_server_key_exchange(). Removes another 329jsing2015-09-124-658/+6
| | | | lines of code, while gaining bug fixes and SIGALGs support.
* Uncopy and unpaste dtls1_send_server_done().jsing2015-09-124-36/+6
|
* Uncopy and unpaste dtls1_send_server_hello().jsing2015-09-124-136/+6
|
* Uncopy and unpaste dtls1_send_hello_request().jsing2015-09-124-36/+6
|
* Convert the rest of the server handshake functions to ssl3_handshake_msg_*.jsing2015-09-122-88/+70
| | | | ok beck@
* Uncopy and unpaste dtls1_send_client_verify() - thejsing2015-09-124-148/+6
| | | | | ssl3_send_client_verify() is different, but it correctly supports things like SIGALGS. Another 74 lines of code bites the dust.
* Uncopy and unpaste dtls1_send_client_key_exchange() - thejsing2015-09-124-538/+10
| | | | | | | | ssl3_send_client_key_exchange() is effectively identical, in fact it has a number of bug fixes and improvements that never got merged into the DTLS copy of the code. Flenses another 264 lines of code. ok beck@
* Use explicit_bzero() instead of memset() when clearing private keys.jsing2015-09-122-6/+8
| | | | ok bcook@ beck@ miod@
* Pull variable assignment out from function call, fix indentation and setjsing2015-09-122-16/+14
| | | | state after calling ssl3_handshake_msg_finish().
* style(9) and whitespace cleanups.jsing2015-09-122-58/+50
|
* Remove workaround for old SIMICS toolchain.miod2015-09-122-90/+2
|
* Remove horribly old and outdated `documentation' for the assembly code.miod2015-09-1212-652/+0
|
* use SOCK_CLOEXEC instead of fnctl; ok guenther beck jsingderaadt2015-09-121-12/+16
|
* fix previous;jmc2015-09-122-31/+48
|
* spaces found during a readderaadt2015-09-111-19/+18
|
* Add TLS suppport to nc. Provides a useful little test and script tool.beck2015-09-113-45/+346
| | | | ok jsing@ bluhm@
* unifdef -DOPENSSL_NO_RC5jsing2015-09-112-42/+2
|
* kill evil commentbeck2015-09-111-3/+1
| | | | ok deraadt@
* Rename functions that moved to t1_enc.c, with a tls1_ prefix instead of ajsing2015-09-1124-130/+130
| | | | | | ssl3_ prefix. ok beck@
* fix unchecked mallocs - coverity 130454 and 130455beck2015-09-111-6/+15
| | | | ok jsing@
* Merge the remnants of s3_enc.c into t1_enc.c.jsing2015-09-114-269/+248
| | | | ok beck@
* Nuke ssl_set_peer_cert_type().jsing2015-09-114-20/+4
| | | | ok "flensing knife"
* Nuke ssl_bad_method().jsing2015-09-114-22/+4
| | | | ok "flensing knife"
* Nuke ssl3_default_timeout().jsing2015-09-114-26/+4
| | | | ok "flensing knife"
* Nuke ssl_replace_hash().jsing2015-09-114-46/+4
| | | | ok "flensing knife"
* Nuke ssl3_cbc_remove_padding().jsing2015-09-114-68/+4
| | | | ok "flensing knife"
* Nuke ssl3_alert_code().jsing2015-09-113-76/+3
| | | | ok "flensing knife"
* Nuke ssl3_cert_verify_mac() and ssl3_handshake_mac().jsing2015-09-113-86/+3
| | | | | | We also no longer need the ssl3_pad_1 and ssl3_pad_2 arrays... ok "flensing knife"
* Nuke ssl3_final_finish_mac().jsing2015-09-113-22/+3
| | | | ok "flensing knife"
* Nuke ssl3_change_cipher_state().jsing2015-09-113-113/+3
| | | | ok "flensing knife"
* Nuke ssl3_generate_master_secret().jsing2015-09-113-39/+3
| | | | ok "flensing knife"
* Nuke ssl3_setup_key_block() and ssl3_generate_key_block().jsing2015-09-113-122/+3
| | | | ok "flensing knife"
* Nuke n_ssl3_mac().jsing2015-09-113-103/+3
| | | | ok "flensing knife"
* Nuke ssl3_enc().jsing2015-09-113-76/+3
| | | | ok "flensing knife"
* Nuke SSLv3_enc_data.jsing2015-09-114-48/+6
| | | | ok "flensing knife"