summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Move handshake message header length determination into a separatejsing2015-09-128-46/+54
| | | | | | | ssl3_handshake_msg_hdr_len() function. Use this to correct several places that have magic numbers with header lengths hardcoded as '4'. ok beck@
* Uncopy and unpaste dtls1_send_certificate_request() - removes another 80jsing2015-09-124-160/+6
| | | | lines of code, while gaining SIGALGs support.
* Uncopy and unpaste dtls1_send_server_key_exchange(). Removes another 329jsing2015-09-124-658/+6
| | | | lines of code, while gaining bug fixes and SIGALGs support.
* Uncopy and unpaste dtls1_send_server_done().jsing2015-09-124-36/+6
|
* Uncopy and unpaste dtls1_send_server_hello().jsing2015-09-124-136/+6
|
* Uncopy and unpaste dtls1_send_hello_request().jsing2015-09-124-36/+6
|
* Convert the rest of the server handshake functions to ssl3_handshake_msg_*.jsing2015-09-122-88/+70
| | | | ok beck@
* Uncopy and unpaste dtls1_send_client_verify() - thejsing2015-09-124-148/+6
| | | | | ssl3_send_client_verify() is different, but it correctly supports things like SIGALGS. Another 74 lines of code bites the dust.
* Uncopy and unpaste dtls1_send_client_key_exchange() - thejsing2015-09-124-538/+10
| | | | | | | | ssl3_send_client_key_exchange() is effectively identical, in fact it has a number of bug fixes and improvements that never got merged into the DTLS copy of the code. Flenses another 264 lines of code. ok beck@
* Use explicit_bzero() instead of memset() when clearing private keys.jsing2015-09-122-6/+8
| | | | ok bcook@ beck@ miod@
* Pull variable assignment out from function call, fix indentation and setjsing2015-09-122-16/+14
| | | | state after calling ssl3_handshake_msg_finish().
* style(9) and whitespace cleanups.jsing2015-09-122-58/+50
|
* Remove workaround for old SIMICS toolchain.miod2015-09-121-45/+1
|
* Remove horribly old and outdated `documentation' for the assembly code.miod2015-09-126-326/+0
|
* Rename functions that moved to t1_enc.c, with a tls1_ prefix instead of ajsing2015-09-1124-130/+130
| | | | | | ssl3_ prefix. ok beck@
* Merge the remnants of s3_enc.c into t1_enc.c.jsing2015-09-114-269/+248
| | | | ok beck@
* Nuke ssl_set_peer_cert_type().jsing2015-09-114-20/+4
| | | | ok "flensing knife"
* Nuke ssl_bad_method().jsing2015-09-114-22/+4
| | | | ok "flensing knife"
* Nuke ssl3_default_timeout().jsing2015-09-114-26/+4
| | | | ok "flensing knife"
* Nuke ssl_replace_hash().jsing2015-09-114-46/+4
| | | | ok "flensing knife"
* Nuke ssl3_cbc_remove_padding().jsing2015-09-114-68/+4
| | | | ok "flensing knife"
* Nuke ssl3_alert_code().jsing2015-09-113-76/+3
| | | | ok "flensing knife"
* Nuke ssl3_cert_verify_mac() and ssl3_handshake_mac().jsing2015-09-113-86/+3
| | | | | | We also no longer need the ssl3_pad_1 and ssl3_pad_2 arrays... ok "flensing knife"
* Nuke ssl3_final_finish_mac().jsing2015-09-113-22/+3
| | | | ok "flensing knife"
* Nuke ssl3_change_cipher_state().jsing2015-09-113-113/+3
| | | | ok "flensing knife"
* Nuke ssl3_generate_master_secret().jsing2015-09-113-39/+3
| | | | ok "flensing knife"
* Nuke ssl3_setup_key_block() and ssl3_generate_key_block().jsing2015-09-113-122/+3
| | | | ok "flensing knife"
* Nuke n_ssl3_mac().jsing2015-09-113-103/+3
| | | | ok "flensing knife"
* Nuke ssl3_enc().jsing2015-09-113-76/+3
| | | | ok "flensing knife"
* Nuke SSLv3_enc_data.jsing2015-09-114-48/+6
| | | | ok "flensing knife"
* Shuffle the code in ssl3_send_finished() to make it more logical/readable.jsing2015-09-112-18/+14
| | | | ok beck@
* Replace dtls1_send_finished() with ssl3_send_finished() - they're nowjsing2015-09-118-96/+12
| | | | | | | both essentially the same (in fact DTLS benefits from improvements previously made to the ssl3_send_finished() function). ok beck@
* style(9), fix comments, wrap long lines and tweak whitespace.jsing2015-09-112-62/+118
|
* Convert dtls1_send_finished() and ssl3_send_finished() tojsing2015-09-114-44/+20
| | | | | | ssl3_handshake_msg_start()/ssl3_handshake_msg_finish(). ok beck@
* Bring back the expansion-into-.byte-sequences routines removed in r1.9, butmiod2015-09-111-12/+67
| | | | | | | | | | | | only define them if not building for the "openbsd" flavour. This way, non-obfuscated output can still be generated for analysis, by using the "openbsd" flavour (which OpenBSD HEAD will do), and obfuscated output, compatible with older as(1), will be generated for other platforms. The portable version of LibreSSL can then use "openbsd-portable" as the flavour for OpenBSD/amd64 so that generated files can be compiled with OpenBSD 5.7 and other older versions stuck with as(1) 2.15.
* Put the *method* data structures and functions in the same place.jsing2015-09-114-155/+122
| | | | | | | We can also now nuke ssl23_get_method() since it is the same as tls1_get_method(). And the empty file can bite the dust. ok bcook@ miod@
* Put the *server_method* data structures and functions in the same place.jsing2015-09-114-148/+122
| | | | | | | We can also now nuke ssl23_get_server_method() since it is the same as tls1_get_server_method(). ok miod@
* Put the *client_method* data structures and functions in the same place.jsing2015-09-114-148/+122
| | | | | | | We can also now nuke ssl23_get_client_method() since it is the same as tls1_get_client_method(). ok bcook@ miod@
* Fixup inter-bank movq/movd operations, emit bytes for pclmulqdq again.bcook2015-09-113-13/+27
| | | | | | | | | | Fixes builds gcc + Apple's assembler, working on reenabling builds with older OpenBSD releases. based on OpenSSL commit: https://git.openssl.org/?p=openssl.git;a=commitdiff;h=902b30df193afc3417a96ba72a81ed390bd50de3 ok miod@
* When loading a DSA key from an raw (without DH parameters) ASN.1 serialization,miod2015-09-101-2/+48
| | | | | | | | | | | | | perform some consistency checks on its `p' and `q' values, and return an error if the checks failed. Thanks for Georgi Guninski (guninski at guninski dot com) for mentioning the possibility of a weak (non prime) q value and providing a test case. See https://cpunks.org/pipermail/cypherpunks/2015-September/009007.html for a longer discussion. ok bcook@ beck@
* delete empty SYNOPSIS sectionschwarze2015-09-102-6/+4
|
* Remove support for DTLS_BAD_VER. We do not support non-standard andjsing2015-09-1020-98/+46
| | | | | | | incomplete implementations just so that we can interoperate with products from vendors who have not bothered to fix things in the last ~10 years. ok bcook@ miod@
* Put OPENSSL_cleanse under #ifndef LIBRESSL_INTERNAL.jsing2015-09-101-1/+4
|
* CRYPTO_set_mem_debug_functions() and CRYPTO_set_mem_functions() are alreadyjsing2015-09-101-18/+3
| | | | | | | | | noops, so neuter the CRYPTO_malloc_init and CRYPTO_malloc_debug_init macros. With input from miod@ ok beck@ bcook@ miod@
* Correct spelling of OPENSSL_cleanse.jsing2015-09-1077-220/+232
| | | | ok miod@
* Remove pointless comments.jsing2015-09-103-6/+6
| | | | ok "captain obvious"
* Replace remaining M_ASN1_STRING_* macros with calls to ASN1_STRING_*.jsing2015-09-103-18/+18
| | | | | | | This is not the same as the macro expansion, however the ASN1_STRING_* functions do match the macro expansions. ok doug@ miod@
* Fix an incorrect error check in DSA verify.bcook2015-09-101-4/+2
| | | | | | From Matt Caswell's OpenSSL commit "RT3192: spurious error in DSA verify". https://github.com/openssl/openssl/commit/eb63bce040d1cc6147d256f516b59552c018e29b
* Check handshake_func against NULL rather than 0, since it is a functionjsing2015-09-092-14/+14
| | | | | | pointer. ok bcook@ miod@
* Replace dtls1_client_hello() with ssl3_client_hello() - both are basicallyjsing2015-09-026-212/+58
| | | | | | | | | | | the same code, with two slight differences for DTLS handling. Also, make use of send_cookie to determine if the client random needs to be preserved, rather than testing if it is zeroed (hopefully your random number generator never returned all zeros, since the existing code would break). Inspired by BoringSSL. ok doug@