Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Nuke openssl/e_os2.h, since nothing should be using it. | jsing | 2015-09-13 | 1 | -84/+0 | |
| | | | | ok deraadt@ "hurray! finally!" miod@ "Yay!" sthen@ | |||||
* | Provide ECDH_size(). | jsing | 2015-09-13 | 3 | -4/+11 | |
| | | | | "jajaja" miod@ | |||||
* | Check ECDH output buffer length and avoid truncation. | jsing | 2015-09-13 | 3 | -6/+16 | |
| | | | | | | | | | Currently, if you call ECDH_compute_key() it will silently truncate the resulting key if the output buffer is less than the key size. Instead, detect this condition and return an error. If the buffer provided is larger than the key length, zero the remainder. ok beck@ miod@ "+ shivers" | |||||
* | Lob a style(9) grenade in here. | jsing | 2015-09-13 | 6 | -181/+176 | |
| | ||||||
* | Mechanical minor bump to follow libcrypto. | miod | 2015-09-13 | 2 | -2/+2 | |
| | ||||||
* | Add a new interface, OPENSSL_cpu_caps(), to return the currently running | miod | 2015-09-13 | 2 | -2/+17 | |
| | | | | | | | | | | | | | cpu's specific hardware capabilities users of libcrypto might be interested in, as an integer value. This deprecates the existing OPENSSL_ia32cap() macro and the OPENSSL_ia32cap_loc() function (which returns the pointer so that you can mess with stuff you shouldn't mess with). Interpreting the value returned by OPENSSL_cpu_caps() is, of course, machine-dependent. Minor version bump for libcrypto. ok beck@ jsing@ | |||||
* | The *_accept() functions increment in_handshake at the start of the function, | jsing | 2015-09-13 | 4 | -38/+60 | |
| | | | | | | | | then decrement it and call a callback on exit from the function. As such, these functions should not return in the middle, otherwise in_handshake is never decremented and the callback never called. ok beck@ "with many sighs" miod@ | |||||
* | If we have hardware acceleration for AES, prefer AES as a symmetric cipher | jsing | 2015-09-13 | 2 | -14/+60 | |
| | | | | | | over CHACHA20. Otherwise, prefer CHACHA20 with AES second. ok beck@ miod@ | |||||
* | Split ssl3_send_client_key_exchange() (387 lines of code) into five | jsing | 2015-09-12 | 2 | -654/+702 | |
| | | | | | | | | | functions. The original was written as a huge if/else if chain - split out the handling for each key exchange type. This allows us to reduce two levels of indentation, make the code far more readable and have single return paths so that we can simplify clean up. ok beck@ | |||||
* | Fix function name. | jsing | 2015-09-12 | 2 | -4/+4 | |
| | ||||||
* | Sync handling of cached record digests with s3_srvr.c. | jsing | 2015-09-12 | 2 | -2/+46 | |
| | ||||||
* | explicit_bzero() the GOST premaster secret. | jsing | 2015-09-12 | 2 | -4/+14 | |
| | | | | ok miod@ | |||||
* | Unwrap a bunch of lines. | jsing | 2015-09-12 | 2 | -74/+38 | |
| | ||||||
* | Remove most of the SSLv3 version checks and a few TLS v1.0. | doug | 2015-09-12 | 14 | -236/+114 | |
| | | | | | | | We can now assume >= TLS v1.0 since SSL2_VERSION, SSL3_VERSION and DTLS1_BAD_VER support was removed. "reads ok" miod@ | |||||
* | Uncopy and unpaste dtls1_send_newsession_ticket() - another 111 lines of | jsing | 2015-09-12 | 4 | -222/+6 | |
| | | | | code deduped. | |||||
* | Move handshake message header length determination into a separate | jsing | 2015-09-12 | 8 | -46/+54 | |
| | | | | | | | ssl3_handshake_msg_hdr_len() function. Use this to correct several places that have magic numbers with header lengths hardcoded as '4'. ok beck@ | |||||
* | Uncopy and unpaste dtls1_send_certificate_request() - removes another 80 | jsing | 2015-09-12 | 4 | -160/+6 | |
| | | | | lines of code, while gaining SIGALGs support. | |||||
* | Uncopy and unpaste dtls1_send_server_key_exchange(). Removes another 329 | jsing | 2015-09-12 | 4 | -658/+6 | |
| | | | | lines of code, while gaining bug fixes and SIGALGs support. | |||||
* | Uncopy and unpaste dtls1_send_server_done(). | jsing | 2015-09-12 | 4 | -36/+6 | |
| | ||||||
* | Uncopy and unpaste dtls1_send_server_hello(). | jsing | 2015-09-12 | 4 | -136/+6 | |
| | ||||||
* | Uncopy and unpaste dtls1_send_hello_request(). | jsing | 2015-09-12 | 4 | -36/+6 | |
| | ||||||
* | Convert the rest of the server handshake functions to ssl3_handshake_msg_*. | jsing | 2015-09-12 | 2 | -88/+70 | |
| | | | | ok beck@ | |||||
* | Uncopy and unpaste dtls1_send_client_verify() - the | jsing | 2015-09-12 | 4 | -148/+6 | |
| | | | | | ssl3_send_client_verify() is different, but it correctly supports things like SIGALGS. Another 74 lines of code bites the dust. | |||||
* | Uncopy and unpaste dtls1_send_client_key_exchange() - the | jsing | 2015-09-12 | 4 | -538/+10 | |
| | | | | | | | | ssl3_send_client_key_exchange() is effectively identical, in fact it has a number of bug fixes and improvements that never got merged into the DTLS copy of the code. Flenses another 264 lines of code. ok beck@ | |||||
* | Use explicit_bzero() instead of memset() when clearing private keys. | jsing | 2015-09-12 | 2 | -6/+8 | |
| | | | | ok bcook@ beck@ miod@ | |||||
* | Pull variable assignment out from function call, fix indentation and set | jsing | 2015-09-12 | 2 | -16/+14 | |
| | | | | state after calling ssl3_handshake_msg_finish(). | |||||
* | style(9) and whitespace cleanups. | jsing | 2015-09-12 | 2 | -58/+50 | |
| | ||||||
* | Remove workaround for old SIMICS toolchain. | miod | 2015-09-12 | 1 | -45/+1 | |
| | ||||||
* | Remove horribly old and outdated `documentation' for the assembly code. | miod | 2015-09-12 | 6 | -326/+0 | |
| | ||||||
* | Rename functions that moved to t1_enc.c, with a tls1_ prefix instead of a | jsing | 2015-09-11 | 24 | -130/+130 | |
| | | | | | | ssl3_ prefix. ok beck@ | |||||
* | Merge the remnants of s3_enc.c into t1_enc.c. | jsing | 2015-09-11 | 4 | -269/+248 | |
| | | | | ok beck@ | |||||
* | Nuke ssl_set_peer_cert_type(). | jsing | 2015-09-11 | 4 | -20/+4 | |
| | | | | ok "flensing knife" | |||||
* | Nuke ssl_bad_method(). | jsing | 2015-09-11 | 4 | -22/+4 | |
| | | | | ok "flensing knife" | |||||
* | Nuke ssl3_default_timeout(). | jsing | 2015-09-11 | 4 | -26/+4 | |
| | | | | ok "flensing knife" | |||||
* | Nuke ssl_replace_hash(). | jsing | 2015-09-11 | 4 | -46/+4 | |
| | | | | ok "flensing knife" | |||||
* | Nuke ssl3_cbc_remove_padding(). | jsing | 2015-09-11 | 4 | -68/+4 | |
| | | | | ok "flensing knife" | |||||
* | Nuke ssl3_alert_code(). | jsing | 2015-09-11 | 3 | -76/+3 | |
| | | | | ok "flensing knife" | |||||
* | Nuke ssl3_cert_verify_mac() and ssl3_handshake_mac(). | jsing | 2015-09-11 | 3 | -86/+3 | |
| | | | | | | We also no longer need the ssl3_pad_1 and ssl3_pad_2 arrays... ok "flensing knife" | |||||
* | Nuke ssl3_final_finish_mac(). | jsing | 2015-09-11 | 3 | -22/+3 | |
| | | | | ok "flensing knife" | |||||
* | Nuke ssl3_change_cipher_state(). | jsing | 2015-09-11 | 3 | -113/+3 | |
| | | | | ok "flensing knife" | |||||
* | Nuke ssl3_generate_master_secret(). | jsing | 2015-09-11 | 3 | -39/+3 | |
| | | | | ok "flensing knife" | |||||
* | Nuke ssl3_setup_key_block() and ssl3_generate_key_block(). | jsing | 2015-09-11 | 3 | -122/+3 | |
| | | | | ok "flensing knife" | |||||
* | Nuke n_ssl3_mac(). | jsing | 2015-09-11 | 3 | -103/+3 | |
| | | | | ok "flensing knife" | |||||
* | Nuke ssl3_enc(). | jsing | 2015-09-11 | 3 | -76/+3 | |
| | | | | ok "flensing knife" | |||||
* | Nuke SSLv3_enc_data. | jsing | 2015-09-11 | 4 | -48/+6 | |
| | | | | ok "flensing knife" | |||||
* | Shuffle the code in ssl3_send_finished() to make it more logical/readable. | jsing | 2015-09-11 | 2 | -18/+14 | |
| | | | | ok beck@ | |||||
* | Replace dtls1_send_finished() with ssl3_send_finished() - they're now | jsing | 2015-09-11 | 8 | -96/+12 | |
| | | | | | | | both essentially the same (in fact DTLS benefits from improvements previously made to the ssl3_send_finished() function). ok beck@ | |||||
* | style(9), fix comments, wrap long lines and tweak whitespace. | jsing | 2015-09-11 | 2 | -62/+118 | |
| | ||||||
* | Convert dtls1_send_finished() and ssl3_send_finished() to | jsing | 2015-09-11 | 4 | -44/+20 | |
| | | | | | | ssl3_handshake_msg_start()/ssl3_handshake_msg_finish(). ok beck@ | |||||
* | Bring back the expansion-into-.byte-sequences routines removed in r1.9, but | miod | 2015-09-11 | 1 | -12/+67 | |
| | | | | | | | | | | | | only define them if not building for the "openbsd" flavour. This way, non-obfuscated output can still be generated for analysis, by using the "openbsd" flavour (which OpenBSD HEAD will do), and obfuscated output, compatible with older as(1), will be generated for other platforms. The portable version of LibreSSL can then use "openbsd-portable" as the flavour for OpenBSD/amd64 so that generated files can be compiled with OpenBSD 5.7 and other older versions stuck with as(1) 2.15. |