summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_transcript.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2022-07-02Rename uses 'curve' to 'group' and rework tls1 group API.tb12-162/+204
This reworks various tls1_ curve APIs to indicate success via a boolean return value and move the output to an out parameter. This makes the caller code easier and more consistent. Based on a suggestion by jsing ok jsing
2022-07-02Fix off-by-one in length check.tb1-3/+3
Spotted by jsing
2022-07-02Make tls1_ec_curve_id2nid() return explicit NID_undef instead of 0 on errortb2-5/+5
and adjust the only caller that didn't check for NID_undef already. ok beck jsing
2022-06-30To figure our whether a large allocation can be grown into theguenther1-12/+2
following page(s) we've been first mquery()ing for it, mmapp()ing w/o MAP_FIXED if available, and then munmap()ing if there was a race. Instead, just try it directly with mmap(MAP_FIXED | __MAP_NOREPLACE) tested in snaps for weeks ok deraadt@
2022-06-30Remove redundant commentstb1-30/+30
discussed with jsing
2022-06-30Check security level for supported groups.tb4-35/+179
ok jsing
2022-06-30Rename variable from tls_version to version since it could also betb1-3/+3
a DTLS version at this point.
2022-06-30Check whether the security level allows session tickets.tb1-2/+6
ok beck jsing
2022-06-30Add checks to ensure we do not initiate or negotiate handshakes withtb5-7/+34
versions below the minimum required by the security level. input & ok jsing
2022-06-30Replace obj_mac.h with object.htb6-15/+17
Pointed out by and ok jsing
2022-06-30Add valid time test from ruby regress, and check ASN1_time_to_tmbeck1-1/+27
against recorded time value.
2022-06-30Rename use_* to ssl_use_* for consistency.tb1-9/+10
discussed with jsing
2022-06-30add valid utc time that should fail to parse as generalizedbeck1-2/+6
2022-06-30Add tests for times missing seconds, and to be able to testbeck1-3/+43
invalid generalized times specifically
2022-06-30whitespace nittb1-2/+2
2022-06-30Remove obj_mac.h include. Requested by jsingtb1-2/+1
2022-06-29Don't check the signature if a cert is self signed.tb1-2/+7
ok beck jsing
2022-06-29Make ssl_cert_add{0,1}_chain_cert() take ssl/ctxtb4-22/+30
ok beck jsing
2022-06-29ssl_cert_set{0,1}_chain() take ssl/ctxtb4-19/+36
ok beck jsing
2022-06-29Add a security check to ssl_set_cert()tb1-1/+7
ok beck jsing
2022-06-29Make ssl_set_{cert,pkey} take an ssl/ctxtb1-12/+20
ok beck jsing
2022-06-29Refactor use_certificate_chain_* to take ssl/ctx instead of a certtb3-21/+45
ok beck jsing
2022-06-29Add functions that check security level in certs and cert chains.tb2-2/+147
ok beck jsing
2022-06-29Make sure the verifier checks the security level in cert chainstb1-2/+9
ok beck jsing
2022-06-29Remove a confusing commenttb1-7/+2
discussed with jsing
2022-06-29Parse the @SECLEVEL=n annotation in cipher stringstb3-15/+28
To this end, hand the SSL_CERT through about 5 levels of indirection to set an integer on it. ok beck jsing
2022-06-29Add support for sending QUIC transport parametersbeck8-8/+466
This is the start of adding the boringssl API for QUIC support, and the TLS extensions necessary to send and receive QUIC transport data. Inspired by boringssl's https://boringssl-review.googlesource.com/24464 ok jsing@ tb@
2022-06-29Use relative paths so beck can run regress in his git tree and havetb4-8/+12
the correct ssl_local.h etc be picked up.
2022-06-29whitespace nittb1-2/+2
2022-06-29missing blank linetb1-1/+2
2022-06-29Refactor asn1 time parsing to use CBS - enforce valid times in ASN.1 parsing.beck3-68/+155
While we're here enforce valid days for months and leap years. Inspired by same in boringssl. ok jsing@
2022-06-29Also check the security level in SSL_get1_supported_cipherstb1-2/+5
ok beck jsing
2022-06-29Check security level when convertin a cipher list to bytestb1-1/+4
ok beck jsing
2022-06-29Also check the security level when choosing a shared ciphertb1-1/+5
ok beck jsing
2022-06-29There's tentacles, tentacles everywheretb1-1/+7
ok beck jsing
2022-06-29Also check the security level of the 'tmp dh'tb3-3/+24
ok beck jsing
2022-06-29Check the security of DH key sharestb6-6/+42
ok beck, looks good to jsing
2022-06-29Rename one s to ssl for consistencytb1-2/+2
2022-06-29Check sigalg security level when selecting them.tb1-1/+4
ok beck jsing
2022-06-29Check the security bits of the sigalgs' pkeytb1-1/+7
ok beck jsing
2022-06-29Check the security level when building sigalgstb4-12/+20
ok beck jsing
2022-06-29Annotate sigalgs with their security level.tb2-2/+23
ok beck jsing
2022-06-28Add prototypes for ssl{_ctx,}_security()tb1-1/+5
ok beck jsing sthen
2022-06-28Add error code definstb1-1/+6
ok beck jsing sthen
2022-06-28Add a period to a commenttb1-2/+2
Pointed out by jsing
2022-06-28Security level >= 3 requires a ciphersuite with PFStb1-3/+4
ok beck jsing sthen
2022-06-28Add a secop handler for tmp_dhtb1-1/+19
This disallows DHE keys weaker than 1024 bits at level 0 to match OpenSSL behavior. ok beck jsing sthen
2022-06-28Add security level related error codes.tb1-1/+6
ok beck jsing sthen
2022-06-28Sort error stringstb1-3/+3
ok beck jsing sthen
2022-06-28Implement ssl{,_ctx}_security()tb1-1/+15
ok beck jsing sthen