summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_methods.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2018-11-11Add support for RSA PSS algorithims being used in sigalgs.beck2-2/+29
lightly tested, but will need sanity checks and regress test changes before being added to any sigalgs list for real ok jsing@ tb@
2018-11-11Convert signatures and verifcation to use the EVP_DigestXXX apibeck3-45/+93
to allow for adding PSS, Nuke the now unneejded guard around the PSS algorithms in the sigalgs table ok jsing@ tb@
2018-11-11Reorganize libssl interop tests. Move netcat tests into separatebluhm9-148/+197
directory. Keep all log files for easier debugging. Name regress target names consistently.
2018-11-10Remove dead codebeck2-16/+2
ok jsing@
2018-11-10Spelingbeck1-2/+2
2018-11-10Regress client and server can do session reuse now. Test this withbluhm6-129/+220
all combinations of LibreSSL, OpenSSL 1.0.2, and OpenSSL 1.1. It is currently disabled for TLS 1.3 as this needs more setup.
2018-11-10Tweak and improve the TLSv1.3 state machine.jsing1-24/+46
- Provide a tls13_handshake_active_action() function to reduce code duplication and replace tls13_handshake_get_sender(). - Add an INVALID message_type, so we can explicitly detect invalid conditions. - Implement skeletons for the tls13_handshake_send_action() and tls13_handshake_recv_action() functions. - OR in the NEGOTIATED value at the end of recving or sending a server hello so that we switch to the next chain in the state table. ok tb@
2018-11-10Make sure the interop test happen last (since they take a long time)beck2-8/+9
2018-11-10Clean up and free objects at the completion of the regress test.jsing1-1/+13
From Ben L <bobsayshilol at live dot co dot uk>.
2018-11-10fix a leak reported by Ben L (bobsayshilol () live ! co ! uk)tb1-1/+3
2018-11-10Fix a leak reported by Ben L bobsayshilol () live ! co ! uk.tb1-1/+3
2018-11-10fix a leak pointed out by Ben L (bobsayshi () live ! co ! uk)tb1-4/+8
2018-11-10Avoid a double allocation and memory leak.jsing1-4/+2
Reported by Ben L <bobsayshilol at live dot co dot uk>
2018-11-10Stop keeping track of sigalgs by guessing it from digest and pkey,beck8-92/+102
just keep the sigalg around so we can remember what we actually decided to use. ok jsing@
2018-11-10More regress all the way to exporter_masterbeck1-4/+44
2018-11-10Use TLS13_HS_{CLIENT,SERVER} instead of using a redundant _SEND{,S}.tb1-30/+28
ok jsing
2018-11-10Fix last of the empty hash nonsensebeck2-32/+6
ok jsing@
2018-11-09Update key schedule regress to match API changes.jsing1-21/+12
2018-11-09Fix the TLSv1.3 key schedule implementation.jsing2-66/+95
When the RFC refers to ("") for key derivation, it is referring to the transcript hash of an empty string, not an empty string. Rename tls13_secrets_new() to tls13_secrets_create(), make it take an EVP_MD * and calculate the hash of an empty string so that we have it available for the "derived" and other steps. Merge tls13_secrets_init() into the same function, remove the EVP_MD * from other functions and use the empty string hash at the appropriate places. ok beck@ tb@
2018-11-09Use "send" and "recv" consistently instead of mixing them with "read"tb1-98/+108
and "write". Use self-documenting C99 initializers. ok bcook, jsing
2018-11-09Initialize priv_key and pub_key on first use instead of at the top.tb1-6/+4
While there, eliminate a flag that was only used once. ok beck jsing mestre
2018-11-09Initialize priv_key and pub_key on first use instead of at the top.tb1-4/+4
ok beck jsing mestre
2018-11-09The Botan library from ports an be configured to use OpenSSL orbluhm2-1/+22
LibreSSL as crypto provider. When we run their regression tests, we are actually testing our library. This is far from perfect. A lot of LibreSSL features have not been implemented as Botan provider. Even if provider openssl is specified, botan-test runs a lot of non-openssl tests. This can be improved later.
2018-11-09Avoid dereferencing eckey before checking it for NULL.tb1-5/+6
CID 184282 ok beck jsing mestre
2018-11-09remove the not yet implemented "handshake" subdirectorytb1-2/+1
2018-11-09Add subdirectires with SUBDIR += instead of a single assignment withtb3-67/+65
line continuations.
2018-11-09Remove ethers(5) YP support bits from libc as it makes it difficult tobrynet2-70/+8
effectively use pledge(2) in some programs. approval from many, thanks! idea by & ok deraadt@
2018-11-09Ensure we free the handshake transcript upon session resumption.jsing1-1/+4
Found the hard way by jmc@ ok tb@
2018-11-09The cert subdir is testing all combinations of certificate validation.bluhm11-48/+244
Having the three libraries, client and server certificates, missing or invalid CA or certificates, and enforcing peer certificate results in 1944 new test cases.
2018-11-09Ensure we only choose sigalgs from our prefernce list, not the whole listbeck4-10/+19
ok jsing@
2018-11-09Add the ability to have a separate priority list for sigalgs.beck4-12/+43
Add a priority list for tls 1.2 ok jsing@
2018-11-09Correct defines for writer tests in connect/accept loops.jsing1-3/+3
ok tb@
2018-11-09Correct function naming for tls13_handshake_advance_state_machine().jsing1-4/+2
ok tb@
2018-11-09Avoid leak: free existing SRTP connection profiles beforetb1-1/+2
setting it. From Ben L <bobsayshilol () live ! co ! uk>.
2018-11-09Avoid leaking memory that was already allocated in ASN1_item_new().tb1-5/+1
From Ben L <bobsayshilol () live ! co ! uk>
2018-11-09Fix a buffer overrun in asn1_parse2().tb1-4/+7
From Ben L bobsayshilol () live ! co ! uk Similar fixes in BoringSSL and OpensSSL.
2018-11-09In verbose mode netcat reports to stderr when the listen systembluhm1-16/+29
call has finished. This allows to write race free scripts as they can check that the server is up and running. OK sthen@ tb@
2018-11-09Add const to the data argument of ASN1_set{,_int}_octetstring().tb2-6/+6
From Ben L bobsayshilol () live ! co ! uk ok jsing
2018-11-09Add header guards and hidden declarations.jsing2-2/+19
2018-11-09Add header guards and hidden declarations.jsing1-1/+10
2018-11-09Reimplement the sigalgs processing code into a new implementationbeck9-253/+340
that will be usable with TLS 1.3 with less eye bleed. ok jsing@ tb@
2018-11-08First skeleton of the TLS 1.3 state machine. Based on RFC 8446 andtb3-4/+607
inspired by s2n's state machine. Lots of help and input from jsing. ok beck, jsing
2018-11-08KNFbeck1-3/+4
2018-11-08Clean up and simplify the handshake transcript code.jsing10-166/+144
This provides a cleaner, simpler and more readable API, with code that uses a BUF_MEM instead of a BIO. ok beck@ ("hurry up") and tb@.
2018-11-08Add missing NULL checks on allocation, style(9) and consistently usejsing1-35/+34
goto err instead of handrolling.
2018-11-08Add missing BN_free() calls.jsing1-1/+3
From Ben L <bobsayshilol at live dot co dot uk>.
2018-11-08Use ASN1_TYPE_new()/ASN1_TYPE_free() to avoid leaking memory.jsing1-12/+17
From Ben L <bobsayshilol at live dot co dot uk>.
2018-11-08Stop pretending that a cert member in a SSL and SSL_CTX can be NULL.jsing8-121/+18
ok beck@ tb@
2018-11-08Move #include <openssl/evp.h> to the header.tb2-3/+4
discussed with beck and jsing
2018-11-08Ensure the handshake transcript is cleaned up.jsing2-3/+20
Add a check at the completion of the client/server handshake to ensure that the handshake transcript has been freed. Fix the case where a server asks the client for a certificate, but it does not have one, resulting in the handshake transcript being left around post-handshake. ok bcook@ tb@