| Commit message (Collapse) | Author | Files | Lines |
|
|
|
This requires adding DHE support to tls_key_share. In doing so,
tls_key_share_peer_public() has to lose the group argument and gains
an invalid_key argument. The one place that actually needs the group
check is tlsext_keyshare_client_parse(), so add code to do this.
ok inoguchi@ tb@
|
|
This brings the code more in line with the tls12_record_layer and reduces
the effort needed to make EVP_AEAD_CTX opaque.
Prompted by and ok tb@
|
|
|
|
|
|
ok inoguchi@ tb@
|
|
|
|
|
|
Prompted by and ok tb@
|
|
Adjust a comment to reality, zap a stray empty line and fix whitespace
before comment after #endif
|
|
is now an unexpected pass, so remove it from the expected failures.
|
|
CID 313263 313301 313322
|
|
|
|
|
|
Found via a crash on bluhm's i386 regress test box
|
|
Of note, the public APIs for this mean that the only way you can add a
CTLOG is by reading a configuration file from disk - there is no
programmatic way to do this.
|
|
which was an implementation detail and has been deleted, so
delete the test
|
|
Used by Qt5 and Qt6 and slightly reduces the patching in there.
ok inoguchi jsing
|
|
Needed by freerdp.
ok inoguchi jsing
|
|
This adds RSA_get0_{n,e,d,p,q,dmp1,dmq1,iqmp,pss_params}() which will
be exposed in the upcoming bump.
ok inoguchi jsing
|
|
ok inoguchi jsing
|
|
Will be needed by openssl(1) dhparam.
ok inoguchi jsing
|
|
ok inoguchi jsing
|
|
These are accessors that allow getting one specific DH member. They are
less error prone than the current getters DH_get0_{pqg,key}(). They
are used by many ports and will also be used in base for this reason.
Who can remember whether the pub_key or the priv_key goes first in
DH_get0_key()?
ok inoguchi jsing
|
|
This will be needed in libssl and freerdp after the next bump.
ok inoguchi jsing
|
|
as well as the X509_STORE_CTX_verify_cb and X509_STORE_CTX_verify_fn types
This will fix the X509_STORE_set_verify_func macro which is currently
broken, as pointed out by schwarze.
ok inoguchi jsing
|
|
|
|
|
|
|
|
suggested by jsing
|
|
suggested by jsing
|
|
more readable.
Repeated complaints by jsing
|
|
sk_find + sk_value into something easier to follow and swallow.
ok inoguchi jsing
|
|
ok inoguchi jsing
|
|
|
|
various loops in addr_validate_path_internal().
|
|
what it is.
|
|
validation_err() is an ugly macro with side effects and a goto in it.
At the cost of a few lines of code we can turn this into a function
where the side effects are explicit and ret is now explicitly set in
the main body of addr_validate_path_internal().
We get to a point where it is halfway possible to reason about the
convoluted control flow in this function.
ok inoguchi jsing
|
|
the function and unindent some code.
ok inoguchi jsing
|
|
|
|
In preparation to use the key share code in both the TLSv1.3 and legacy
stacks, rename tls13_key_share to tls_key_share, moving it into the shared
handshake struct. Further changes will then allow the legacy stack to make
use of the same code for ephemeral key exchange.
ok inoguchi@ tb@
|
|
|
|
|
|
|
|
suggested by tb@
|
|
suggested by tb@
|
|
Just applying new option handling and no functional changes.
Referred to verify.c and using 'verify_shared_options'.
ok and comments from jsing@ and tb@
|
|
This will largely test curly and inconsistent APIs that are not covered by
other regress tests. Currently, this tests the wonder that is
SSL_get_peer_cert_chain().
|
|
|
|
range_should_be_prefix() currently always fails. The reason for this
is that OpenSSL commit 42d7d7dd incorrectly moved a memcmp() out of
an assertion. As a consequence, the library emits and accepts
incorrectly encoded ipAddrBlock extensions since it will never detect
ranges that MUST be encoded as a prefix according to RFC 3779, 2.2.3.7.
The return -1 from this memcmp() indicates to the callers that the
range should be expressed as a range, so callers must check beforehand
that min <= max to be able to fail. Thus, remove this memcmp() and
add a check to make_addressRange(), the only caller that didn't already
ensure that min <= max.
This fixes the noisy output in regress/lib/libcrypto/x509/rfc3779.
ok inoguchi jsing
|