| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
|
|
| |
SSLv2 and export ciphers are no longer supported, delete related text.
Sync SSL_CIPHER_description(3) return values with the source code.
Wording simplifications from OpenSSL.
Delete empty RETURN VALUES section.
|
|
|
|
|
| |
to libcrypto and parts belonging to libssl. Extract the parts
relevant for our libssl and import them with some tweaks.
|
|
|
|
|
|
|
|
| |
excluding interface changes that don't apply to LibreSSL,
except that i left the confusing discussion of RETURN VALUES
completely unchanged, to warn users that this is a mess:
OpenSSL first published this interface, then later changed
its syntax and semantics in multiple ways.
|
|
|
|
|
|
| |
cleanup, including the removal of a dead code path.
ok beck@
|
| |
|
|
|
|
|
| |
In the SYNOPSIS, show function prototypes rather than macro definitions.
Delete the useless NOTES section header.
|
|
|
|
| |
majors appropriately
|
|
|
|
|
|
|
|
| |
constraints, in order to force the union to have the same constraint,
use the actual type instead of `double'. And add a comment explaining why we
want such an alignment in there.
ok beck@
|
|
|
|
|
|
| |
From Markus Uhlin <markus.uhlin at bredband dot net>
ok beck@ bcooK@
|
|
|
|
| |
ok beck@
|
|
|
|
|
|
| |
this code path.
ok beck@ bcook@
|
|
|
|
|
|
| |
ssl3_send_server_key_exchange().
ok beck@ bcook@
|
|
|
|
|
|
| |
MEDIUM.
ok beck@ bcook@
|
|
|
|
|
|
| |
this.
ok beck@ bcook@
|
|
|
|
| |
ok beck@
|
| |
|
|
|
|
|
|
| |
Simply return since there is nothing more to do.
Spotted by coverity. ok jsing@ beck@
|
|
|
|
|
|
| |
make it easier to do further clean up.
ok beck@ miod@
|
|
|
|
|
| |
libraries, in particular considering that there are unrelated
files in doc/; requested by jsing@ and beck@
|
| |
|
| |
|
|
|
|
|
|
|
| |
in the process. This also fixes a long standing bug where
tls1_ec_curve_id2nid() is called with only one byte of the curve ID.
ok beck@ miod@
|
|
|
|
| |
ok guenther@
|
|
|
|
|
|
| |
that's what it really is.
ok miod@
|
|
|
|
| |
ok beck@
|
|
|
|
| |
ok jsing@ beck@
|
|
|
|
| |
ok jsing@
|
|
|
|
|
|
|
| |
declared in the public headers, and use __{BEGIN,END}_HIDDEN_DECLS
in the internal headers to optimize internal functions
ok jsing@
|
|
|
|
|
|
| |
functions.. document with a man page.
bump majors on libtls, libssl, libcrypto
ok jsing@ guenther@
|
|
|
|
|
|
| |
three functions that were removed a while ago
ok jsing@
|
|
|
|
| |
ok jsing@
|
|
|
|
|
|
|
| |
addresses two 2038 related issues and also adds support for allocation in
the i2d function, which will allow for simplification in the callers.
ok beck@ miod@
|
|
|
|
| |
ok beck@
|
|
|
|
|
|
|
|
| |
records, otherwise a peer can potentially cause us to loop indefinately.
Return with an SSL_ERROR_WANT_READ instead, so that the caller can choose
when they want to handle further processing for this connection.
ok beck@ miod@
|
|
|
|
| |
ok beck@ (who was struggling to keep lunch down while reviewing the diff)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
code for improved readability, however it also address two issues.
The first of these is a hard-to-hit double free that will occur if
EVP_DigestInit_ex() fails. To avoid this and to be more robust, ensure
that tls1_digest_cached_records() either completes successfully and sets
up all of the necessary digests, or it cleans up and frees everything
that was allocated.
The second issue is that EVP_DigestUpdate() can fail - detect and handle
this in tls1_finish_mac() and change the return type to an int so that a
failure can be propagated to the caller (the callers still need to be
fixed to handle this, in a later diff).
The double-free was reported by Matthew Dillon.
ok beck@ doug@ miod@
|
|
|
|
| |
macros. Only change in generated assembly is due to line numbering.
|
| |
|
| |
|
| |
|
|
|
|
| |
change to generated assembly results from a difference in line numbers.
|
| |
|
|
|
|
|
|
|
|
|
| |
and more importantly they do not provide PFS (if you want to use ECDH, use
ECDHE instead).
With input from guenther@.
ok deraadt@ guenther@
|
|
|
|
|
| |
based on openssl commit a5184a6c89ff954261e73d1e8691ab73b9b4b2d4
ok bcook@
|
|
|
|
|
|
|
| |
fails or the HMAC check fails.
Noted independently by jsing@ and Kurt Cancemi (kurt (at) x64architecture.com)
ok bcook@
|
|
|
|
| |
ok bcook@
|
|
|
|
|
|
| |
repeatedly renegotiating and sending OCSP Status Request TLS extensions.
Fix based on OpenSSL.
|
|
|
|
|
|
|
|
|
|
|
| |
Flip pointer comparison logic to avoid beyond-end-of-buffer pointers
to make it less likely a compiler will decide to screw you.
Based on parts of openssl commits
6f35f6deb5ca7daebe289f86477e061ce3ee5f46 and
89c2720298f875ac80777da2da88a64859775898
ok jsing@
|
|
|
|
|
|
|
|
|
|
|
| |
chooses a different HMAC algorithm.
Avert memory leaks if the callback preps the HMAC in some way.
Based on openssl commit 1bbe48ab149893a78bf99c8eb8895c928900a16f
but retaining a pre-callback length check to guarantee the callback
is provided the buffer that the API claims.
ok bcook@ jsing@
|
|
|
|
|
|
|
|
|
|
|
| |
from OpenSSL:
SSL_set_SSL_CTX is normally called for SNI after ClientHello has
received and the digest to use for each certificate has been decided.
The original ssl->cert contains the negotiated digests and is now
copied to the new ssl->cert.
noted by David Benjamin and Kinichiro Inoguchi
|