summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_ciph.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Remove the handshake digests and related code, replacing remaining usesjsing2017-03-101-21/+1
| | | | | | | with the handshake hash. For now tls1_digest_cached_records() is retained to release the handshake buffer. ok beck@ inoguchi@
* Provide a rolling handshake hash that commences as soon as the cipherjsing2017-03-051-1/+29
| | | | | | | | | | suite has been selected, and convert the final finish MAC to use this handshake hash. This is a first step towards cleaning up the current handshake buffer/digest code. ok beck@ inoguchi@
* Remove STREEBOG 512 as a TLS MAC since there are currently no cipher suitesjsing2017-02-211-22/+4
| | | | | | that make use of it. ok bcook@ inoguchi@
* Change SSLerror() back to taking two args, with the first one being an SSL *.beck2017-02-071-6/+6
| | | | | | | | | Make a table of "function codes" which maps the internal state of the SSL * to something like a useful name so in a typical error in the connection you know in what sort of place in the handshake things happened. (instead of by arcane function name). Add SSLerrorx() for when we don't have an SSL * ok jsing@ after us both being prodded by bluhm@ to make it not terrible
* Finish the fallout of the SSLerr->SSLerror cleanup to get rid of the uglybeck2017-01-261-5/+3
| | | | line wraps that resulted
* Send the error function codes to rot in the depths of hell where they belongbeck2017-01-261-6/+6
| | | | | | | We leave a single funciton code (0xFFF) to say "SSL_internal" so the public API will not break, and we replace all internal use of the two argument SSL_err() with the internal only SSL_error() that only takes a reason code. ok jsing@
* sk_SSL_CIPHER_free() checks for NULL so do not bother doing the same fromjsing2017-01-241-5/+3
| | | | the callers.
* Remove the single IDEA cipher suite. There is no good reason to supportjsing2016-11-061-6/+1
| | | | | | this. ok beck@ bcook@
* unifdef -m -UOPENSSL_NO_CHACHA -UOPENSSL_NO_POLY1305jsing2016-11-061-3/+1
| | | | ok beck@
* Remove support for fixed ECDH cipher suites - these is not widely supportedjsing2016-10-191-30/+2
| | | | | | | | | and more importantly they do not provide PFS (if you want to use ECDH, use ECDHE instead). With input from guenther@. ok deraadt@ guenther@
* Implement the IETF ChaCha20-Poly1305 cipher suites.jsing2016-04-281-6/+16
| | | | | | | | | Rename the existing ChaCha20-Poly1305 cipher suites with an "-OLD" suffix, effectively replaces the original Google implementation. We continue to support both the IETF and Google versions, however the existing names now refer to the ciphers from draft-ietf-tls-chacha20-poly1305-04. Feedback from doug@
* Rename EVP_aead_chacha20_poly1305() to EVP_aead_chacha20_poly1305_old()jsing2016-04-281-2/+2
| | | | | | | and replace with EVP_aead_chacha20_poly1305_ietf(). The IETF version will become the standard version. Discussed with many.
* decipher comment. ok bcook@mmcc2015-12-121-2/+2
|
* Switch to miod's shiny new OPENSSL_cpu_caps() and we can now also enablejsing2015-09-131-3/+3
| | | | | | the AES acceleration checking for i386. ok beck@ miod@
* If we have hardware acceleration for AES, prefer AES as a symmetric cipherjsing2015-09-131-7/+30
| | | | | | over CHACHA20. Otherwise, prefer CHACHA20 with AES second. ok beck@ miod@
* Provide a SSL_CIPHER_get_by_value() function that allows a cipher to bejsing2015-02-071-1/+19
| | | | | | | | | | | | | | retrieved via its cipher suite value. A corresponding SSL_CIPHER_by_value() function returns the cipher suite value for a given SSL_CIPHER. These functions should mean that software does not need to resort to put_cipher_by_char()/get_cipher_by_char() in order to locate a cipher. Begrudgingly also provide a SSL_CIPHER_get_by_id() function that locates a cipher via the internal cipher identifier. Unfortunately these have already been leaked outside the library via SSL_CIPHER_by_id() and the various SSL3_CK_* and TLS1_CK_* defines in the ssl3.h/tls1.h headers. ok beck@ miod@
* Add AEAD as a "MAC alias" so that it is possible to identify/select ciphersjsing2015-01-261-1/+5
| | | | | | | | that use AEAD instead of a MAC. This allows for TLSv1.2 AEAD ciphers (effectively the only ciphers that are still considered to be secure) to be selected using TLSv1.2+AEAD as a cipher string. ok bcook@ doug@ miod@
* Remove trailing whitespace.jsing2014-12-141-20/+20
|
* Remove support for GOST R 34.10-94 signature authentication, along withjsing2014-12-101-13/+4
| | | | | | | the two ciphersuites that use it. GOST94 public/private keys have been long obsoleted and libcrypto does not have support for them anyway. Discussed with Dmitry Eremin-Solenikov.
* Remove get_optional_pkey_id() - it is a hack that existed due to GOSTjsing2014-12-071-46/+8
| | | | | | | | | | only sometimes being available... and when it was available it was via the crypto engine. GOST is now part of libcrypto proper. Instead of trying to do EVP PKEY lookups via string literals and the ASN1 interfaces, lookup the methods directly using the appropriate NID. ok bcook@
* Remove now bogus comment that got missed in the GOST commit.jsing2014-12-061-5/+2
|
* Fix some horrible style(9) violations...jsing2014-12-061-63/+63
|
* Update the GOST code in libssl, as contributed by Dmitry Eremin-Solenikov.miod2014-11-181-10/+60
| | | | | This causes a libssl major version bump as this affects the layout of some internal-but-unfortunately-made-visible structs.
* Sort and group includes.jsing2014-11-161-1/+4
|
* Clean up more SSLv2 remnants.jsing2014-11-081-17/+5
|
* Remove remnants from RC2 and SEED - there are no longer any cipher suitesjsing2014-11-021-40/+12
| | | | | | | that use these algorithms (and SEED was removed from libcrypto some time ago). ok doug@
* Add cipher aliases for DHE (the correct name for EDH) and ECDHE (thejsing2014-10-151-1/+11
| | | | | correct name for EECDH). The EDH and EECDH aliases remain for backwards compatibility.
* Use string literals in printf style calls so gcc's -Wformat works.doug2014-10-031-3/+3
| | | | ok tedu@, miod@
* Add CHACHA20 as a cipher symmetric encryption alias.jsing2014-09-191-1/+5
| | | | From Ming <gzchenym at 126.com>
* Remove SSL_kDHr, SSL_kDHd and SSL_aDH. No supported ciphersuites use them,jsing2014-09-071-39/+9
| | | | | | nor do we plan on supporting them. ok guenther@
* The correct name for EDH is DHE, likewise EECDH should be ECDHE.jsing2014-07-121-14/+14
| | | | | | Based on changes to OpenSSL trunk. ok beck@ miod@
* Remove remnants from PSK, KRB5 and SRP.jsing2014-07-121-59/+3
| | | | ok beck@ miod@
* Make disabling last cipher work.guenther2014-07-121-9/+9
| | | | | From Thijs Alkemade via OpenSSL trunk ok miod@
* Remove the PSK code. We don't need to drag around thisbeck2014-07-111-3/+1
| | | | | baggage. ok miod@ jsing@
* Remove more compression tendrils.jsing2014-07-101-5/+1
| | | | ok tedu@
* Remove more compression related code.jsing2014-07-101-10/+1
|
* Put back some parts of the public SSL API that should not have beenjsing2014-07-101-1/+19
| | | | completely decompressed.
* decompress libssl. ok beck jsingtedu2014-07-101-173/+2
|
* Clean up and simplify SSL_CIPHER_description by always using asprintf. Ifjsing2014-07-091-54/+54
| | | | | | | a buffer was supplied then we copy the result into it. Also make the failure case return values match the documentation. Joint work with beck@
* tedu the SSL export cipher handling - since we do not have enabled exportjsing2014-07-091-53/+11
| | | | | | ciphers we no longer need the flags or code to support it. ok beck@ miod@
* Remove SSL_FIPS.jsing2014-07-081-8/+1
| | | | ok deraadt@ miod@
* Use asprintf() instead of a fixed 128-byte size in SSL_CIPHER_description()miod2014-06-181-11/+11
| | | | | | when no storage buffer is passed. ok deraadt@ tedu@
* In SSL_COMP_add_compression_method(), make sure error cases actually returnmiod2014-06-181-2/+2
| | | | | | `error' rather than `success'. ok deraadt@
* Add ChaCha20-Poly1305 based ciphersuites.jsing2014-06-131-2/+14
| | | | | | Based on Adam Langley's chromium patches. Tested by and ok sthen@
* tags as requested by miod and teduderaadt2014-06-121-1/+1
|
* Add an SSL_CIPHER_ALGORITHM2_AEAD flag that is used to mark a cipher asjsing2014-06-081-0/+38
| | | | | using EVP_AEAD. Also provide an EVP_AEAD-only equivalent of ssl_cipher_get_evp().
* Use C99 initialisers for cipher_aliases. This improves readability,jsing2014-06-011-92/+332
| | | | | | | | removes the need for zero values to be specified (meaning that we usually specify two fields instead of 12), makes the field names grepable and protects from future field reordering/removal. ok beck@ miod@
* More KNF.jsing2014-05-301-56/+73
|
* unidef DH, ECDH, and ECDSA. there's no purpose to a libssl without them.tedu2014-05-291-11/+0
| | | | ok deraadt jsing
* repair KNF indentderaadt2014-05-291-1/+1
|