Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | BUF_MEM_grow_clean() returns an int, not a size_t. Humourously, on success | jsing | 2017-05-08 | 1 | -3/+3 |
| | | | | it returns "len", which is a size_t value, as an int... | ||||
* | Revise cipher suites in regress to match DSS cipher suite removal. | jsing | 2017-05-07 | 1 | -96/+82 |
| | |||||
* | Drop cipher suites with DSS authentication - there is no good reason to | jsing | 2017-05-07 | 1 | -197/+1 |
| | | | | | | keep these around. ok beck@ | ||||
* | Instead of starting a 'zero-sized' CBB at the size of the first addition | jsing | 2017-05-07 | 1 | -5/+8 |
| | | | | | | | | to the CBB, then doubling, start with an initial size of 64 bytes. Almost all uses will exceed this size and we avoid multiple small recallocarray() calls during the initial usage. ok beck@ | ||||
* | Move state from ssl->internal to the handshake structure. | beck | 2017-05-07 | 15 | -256/+267 |
| | | | | | | | while we are at it, convert SSLerror to use a function internally, so that we may later allocate the handshake structure and check for it ok jsing@ | ||||
* | Limit -Werror to gcc4 as was done in libcrypto/libssl/libtls to avoid | jsg | 2017-05-07 | 2 | -6/+14 |
| | | | | | | failed builds with different compilers. ok jsing@ | ||||
* | Ensure that a client context has been connected before attempting to | jsing | 2017-05-07 | 2 | -4/+12 |
| | | | | complete a TLS handshake. | ||||
* | Add a (currently failing) call to tls_handshake() on a client context that | jsing | 2017-05-07 | 1 | -1/+8 |
| | | | | | has not yet been connected. We expect this to fail, but it should fail gracefully. | ||||
* | Also test calling tls_handshake() on a server connection context that has | jsing | 2017-05-07 | 1 | -1/+7 |
| | | | | already completed a TLS handshake. | ||||
* | Return an error if tls_handshake() is called on a TLS context that has | jsing | 2017-05-07 | 1 | -1/+6 |
| | | | | already completed a TLS handshake. | ||||
* | Add a test that calls tls_handshake() on a connection that has already | jsing | 2017-05-07 | 1 | -1/+7 |
| | | | | | completed a TLS handshake. This should return a failure, but currently succeeds (hence the regress currently fails). | ||||
* | An an initial sequencing/ordering test for libtls. | jsing | 2017-05-07 | 1 | -1/+61 |
| | |||||
* | Split TLS client/server handshake and close code into separate functions | jsing | 2017-05-06 | 1 | -4/+27 |
| | | | | so that it can be reused. | ||||
* | Bring in an SSL_HANDSHAKE structure and commence the great shovelling | beck | 2017-05-06 | 12 | -115/+121 |
| | | | | ok jsing@, gcc@, regress@ | ||||
* | Move TLS test code into a function that is called from main, making it | jsing | 2017-05-06 | 2 | -17/+33 |
| | | | | easier for new tests to be added. | ||||
* | Free tls_configs earlier now that we have refcounting. | jsing | 2017-05-06 | 1 | -4/+4 |
| | |||||
* | Use freezero() for the tls_load_file() failure case, since we're | jsing | 2017-05-06 | 1 | -4/+4 |
| | | | | | | potentially dealing with key material. Also switch a calloc to malloc, since we immediately copy the same amount of data to the newly allocated buffer. | ||||
* | BIO_free_all() and EVP_PKEY_free() can be called with NULL. | jsing | 2017-05-06 | 1 | -5/+3 |
| | |||||
* | Add more functions. | jsing | 2017-05-06 | 1 | -1/+5 |
| | |||||
* | Sort/group functions. | jsing | 2017-05-06 | 1 | -5/+10 |
| | |||||
* | Not much point using a failed variable here. | jsing | 2017-05-06 | 1 | -3/+4 |
| | |||||
* | Be explicit about when it is safe to call tls_config_free(). | jsing | 2017-05-06 | 1 | -3/+8 |
| | | | | Discussed with beck@ | ||||
* | Document tls_unload_file(). | jsing | 2017-05-06 | 1 | -3/+14 |
| | |||||
* | Perform reference counting for tls_config. This allows tls_config_free() to | jsing | 2017-05-06 | 4 | -6/+22 |
| | | | | | | | | | be called as soon as it has been passed to the final tls_configure() call, simplifying lifetime tracking for the application. Requested some time ago by tedu@. ok beck@ | ||||
* | Provide a tls_unload_file() function, that frees the memory returned from | jsing | 2017-05-06 | 3 | -2/+10 |
| | | | | | | | | a tls_load_file() call, ensuring that it the contents become inaccessible. This is specifically needed on platforms where the library allocators may be different from the application allocator. ok beck@ | ||||
* | Bring in HKDF, from BoringSSL, with regress tests modified to be | beck | 2017-05-06 | 6 | -2/+496 |
| | | | | | in C. Ride previous minor bump ok tom@ inoguchi@ jsing@ | ||||
* | Add regress coverage for SSL{,_CTX}_set_{min,max}_proto_version(). | jsing | 2017-05-06 | 1 | -12/+304 |
| | |||||
* | Provide SSL{,_CTX}_set_{min,max}_proto_version() functions. | jsing | 2017-05-06 | 6 | -5/+115 |
| | | | | | | Rides minor bump. ok beck@ | ||||
* | space needed between macro arg and punctuation; | jmc | 2017-05-06 | 1 | -2/+2 |
| | |||||
* | Bump minors for symbol addition in libcrypto | beck | 2017-05-06 | 3 | -3/+3 |
| | | | | ok jsing@ | ||||
* | Add ASN1_TIME_set_to to exported symbols | beck | 2017-05-06 | 1 | -0/+4 |
| | | | | ok jsing@ | ||||
* | Add ASN1_TIME_set_tm to set an asn1 from a struct tm * | beck | 2017-05-06 | 3 | -5/+44 |
| | | | | ok jsing@ | ||||
* | Add missing $OpenBSD$ tags. | jsing | 2017-05-06 | 4 | -2/+4 |
| | |||||
* | Fix the ca command so that certs it generates have RFC5280 conformant time. | beck | 2017-05-04 | 1 | -16/+56 |
| | | | | Problem noticed by Harald Dunkel <harald.dunkel@aixigo.de> | ||||
* | Move tls_config_skip_private_key_check() out from under HIDDEN_DECLS. | claudio | 2017-05-04 | 1 | -2/+4 |
| | | | | | | Even though this is not a real public interface we need the symbol in the shared library so that relayd can use it (needed for TLS key privsep) OK beck@ | ||||
* | make the description strings match the code | deraadt | 2017-05-03 | 1 | -10/+10 |
| | |||||
* | the XXXfree functions being called accept NULL, so don't check first. | deraadt | 2017-05-02 | 3 | -26/+14 |
| | | | | ok beck | ||||
* | Add regress for free functions that should be safe with NULL | beck | 2017-05-02 | 2 | -0/+63 |
| | |||||
* | use freezero() instead of memset/explicit_bzero + free. Substantially | deraadt | 2017-05-02 | 38 | -238/+109 |
| | | | | | | | | | | reduces conditional logic (-218, +82). MOD_EXP_CTIME_MIN_CACHE_LINE_WIDTH cache alignment calculation bn/bn_exp.c wasn'tt quite right. Two other tricky bits with ASN1_STRING_FLAG_NDEF and BN_FLG_STATIC_DATA where the condition cannot be collapsed completely. Passes regress. ok beck | ||||
* | No original OpenSSL code remains in this file. Relicense | beck | 2017-04-30 | 1 | -54/+13 |
| | |||||
* | whitespace | beck | 2017-04-30 | 1 | -3/+3 |
| | |||||
* | Make BIO_get_host_ip just yet another getaddrinfo wrapper | beck | 2017-04-30 | 1 | -27/+20 |
| | |||||
* | Rework BIO_accept to be more like modern code. | beck | 2017-04-30 | 1 | -54/+19 |
| | | | | ok jsing@ | ||||
* | Only enable -Werror on libcrypto/libssl/libtls if we are building with | jsing | 2017-04-30 | 3 | -7/+14 |
| | | | | | | | gcc4. This should avoid failed builds while transitioning compilers. While here also make the CFLAGS blocks consistent across makefiles. Discussed with deraadt@, ok beck@ | ||||
* | Switch back to freezero() and explicitly initialise data_len to zero. The | jsing | 2017-04-30 | 1 | -6/+3 |
| | | | | | previous code was safe since data would always be NULL if data_len was uninitialised, however compilers cannot know this. | ||||
* | Microsoft Windows hates BIO_get_accept_socket in portable. Fix it to | beck | 2017-04-30 | 1 | -115/+35 |
| | | | | | | not be awful or have any claims on supporting ipv6 when it does so very badly ok jsing@ | ||||
* | Add missing tls_init() and tls_free() calls. | jsing | 2017-04-30 | 1 | -1/+4 |
| | |||||
* | Add a tls_keypair_clear_key() function that uses freezero() to make key | jsing | 2017-04-30 | 1 | -5/+11 |
| | | | | | | material inaccessible, then call it from the appropriate places. ok beck@ | ||||
* | Fix a bug caused by the return value being set early to signal successful | jsing | 2017-04-29 | 1 | -5/+5 |
| | | | | | | | | | | | | | | | DTLS cookie validation. This can mask a later failure and result in a positive return value being returned from ssl3_get_client_hello(), when it should return a negative value to propagate the error. Ironically this was introduced in OpenSSL 2e9802b7a7b with the commit message "Fix DTLS cookie management bugs". Fix based on OpenSSL. Issue reported by Nicolas Bouliane <nbouliane at jive dot com>. ok beck@ | ||||
* | Revert previous - we still want to do this, but I forgot about the installer | beck | 2017-04-29 | 2 | -14/+6 |
| | | | | | and want to avoid the wrath of theo when he arrives home in a couple of hours :) |