|  | Commit message (Collapse) | Author | Age | Files | Lines | 
|---|
| | 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| | Libcrypto currently has a mess of *_lcl.h, *_locl.h, and *_local.h names
used for internal headers. Move all these headers we inherited from
OpenSSL to *_local.h, reserving the name *_internal.h for our own code.
Similarly, move dtls_locl.h and ssl_locl.h to dtls_local and ssl_local.h.
constant_time_locl.h is moved to constant_time.h since it's special.
Adjust all .c files in libcrypto, libssl and regress.
The diff is mechanical with the exception of tls13_quic.c, where
#include <ssl_locl.h> was fixed manually.
discussed with jsing,
no objection bcook | 
| | 
| 
| 
| 
| 
| 
| 
| | These are no longer necessary due to SSL_CTX and SSL now being fully
opaque. Merge SSL_CTX_INTERNAL back into SSL_CTX and SSL_INTERNAL back
into SSL.
Prompted by tb@ | 
| | 
| 
| 
| 
| 
| 
| 
| 
| | Refactor ssl_security_supported_group() into a wrapper of a new internal
ssl_security_group() which takes a secop as an argument. This allows
adding ssl_security_shared_group() which will be needed in upcoming
commits.
ok jsing | 
| | |  | 
| | 
| 
| 
| 
| 
| 
| 
| | Ciphers using an MD5 HMAC are not allowed on security levels >= 1 and
using a SHA-1 HMAC is disallowed on security levels >= 4. This disables
RC4-MD5 by default.
ok jsing | 
| | 
| 
| 
| 
| 
| | calls.
ok jsing | 
| | 
| 
| 
| 
| 
| 
| | that are no longer needed now that libcrypto exposes the necessary
security-bits API.
ok jsing | 
| | |  | 
| | |  | 
| | |  | 
| | |  | 
| | 
| 
| 
| 
| 
| 
| 
| 
| | The API is ugly and we can easily abstract it away. The SSL_SECOP_* stuff
is now confined into ssl_seclevel.c and the rest of the library can make
use of the more straightforward wrappers, which makes it a lot easier on
the eyes.
ok beck jsing | 
| | 
| 
| 
| 
| 
| 
| 
| 
| 
| | This reworks various tls1_ curve APIs to indicate success via a boolean
return value and move the output to an out parameter. This makes the
caller code easier and more consistent.
Based on a suggestion by jsing
ok jsing | 
| | 
| 
| 
| | ok jsing | 
| | 
| 
| 
| | a DTLS version at this point. | 
| | 
| 
| 
| 
| 
| | versions below the minimum required by the security level.
input & ok jsing | 
| | |  | 
| | 
| 
| 
| | ok beck jsing | 
| | 
| 
| 
| | ok beck jsing | 
| | |  | 
| | 
| 
| 
| | ok beck jsing | 
| | 
| 
| 
| | ok beck, looks good to jsing | 
| | 
| 
| 
| | Pointed out by jsing | 
| | 
| 
| 
| | ok beck jsing sthen | 
| | 
| 
| 
| 
| 
| 
| | This disallows DHE keys weaker than 1024 bits at level 0 to match
OpenSSL behavior.
ok beck jsing sthen | 
| | 
| 
| 
| | ok beck jsing sthen | 
|  | And here is where the fun starts. The tentacles will grow everywhere.
ok beck jsing sthen |