| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
| |
tlsext_sni_serverhello_parse(). This also adds a check to ensure that
if we have an existing session, the name matches what we specified via
SNI.
ok doug@
|
|
|
|
|
|
|
|
| |
and the new extension framework.
Feedback from doug@
ok inoguchi@
|
|
|
|
| |
Missed in the original commit.
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Introduce a TLS extension handling framework that has per-extension type
functions to determine if an extension is needed, to build the extension
data and parse the extension data. This is somewhat analogous to BoringSSL,
however these build and parse functions are intentionally symetrical. The
framework is hooked into the existing TLS handling code in such a way that
we can gradual convert the extension handling code.
Convert the TLS Server Name Indication extension to the new framework,
while rewriting it to use CBB/CBS and be more strict in the process.
Discussed with beck@
ok inoguchi@
|
|
|
|
| |
Reported by <dravion at ht-foss dot net>
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
keep these around.
ok beck@
|
|
|
|
|
|
|
|
| |
to the CBB, then doubling, start with an initial size of 64 bytes. Almost
all uses will exceed this size and we avoid multiple small recallocarray()
calls during the initial usage.
ok beck@
|
|
|
|
|
|
|
| |
while we are at it, convert SSLerror to use a function
internally, so that we may later allocate the handshake
structure and check for it
ok jsing@
|
|
|
|
| |
ok jsing@, gcc@, regress@
|
|
|
|
|
|
| |
Rides minor bump.
ok beck@
|
|
|
|
| |
ok jsing@
|
| |
|
|
|
|
|
|
|
| |
gcc4. This should avoid failed builds while transitioning compilers.
While here also make the CFLAGS blocks consistent across makefiles.
Discussed with deraadt@, ok beck@
|
|
|
|
|
| |
previous code was safe since data would always be NULL if data_len was
uninitialised, however compilers cannot know this.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
DTLS cookie validation. This can mask a later failure and result in a
positive return value being returned from ssl3_get_client_hello(), when
it should return a negative value to propagate the error.
Ironically this was introduced in OpenSSL 2e9802b7a7b with the commit
message "Fix DTLS cookie management bugs".
Fix based on OpenSSL.
Issue reported by Nicolas Bouliane <nbouliane at jive dot com>.
ok beck@
|
|
|
|
|
| |
and want to avoid the wrath of theo when he arrives home in a couple
of hours :)
|
| |
|
|
|
|
|
|
| |
We are basically admitting that pthread is everywhere, and
we will be using it for other things too.
ok jsing@
|
| |
|
|
|
|
|
| |
less code, but there is also a potential performance gain since they can be
larger allocations.
|
| |
|
|
|
|
| |
information (such as master keys).
|
|
|
|
| |
have been relaxed.
|
|
|
|
|
|
|
|
| |
into the CBB memory, rather than mallocing and memcpying, which also makes
makes the code more consistent with the client. Add a missing check for the
first EC_POINT_point2oct() call.
ok beck@
|
|
|
|
|
|
| |
Back this out while we investigate and implement a solution.
Found the hard way by sthen@
|
|
|
|
| |
explicit_bzero()/free(). Less code and potentially less overhead.
|
| |
|
| |
|
|
|
|
|
|
| |
In this case the memory allocated can also be significant, in which case
freezero() will have less overhead than explicit_bzero() (munmap instead
of touching all of the memory to write zeros).
|
| |
|
|
|
|
| |
from Matt Caswell <matt@openssl.org>, OpenSSL commit 508fafd8
|
|
|
|
|
| |
from Matt Caswell <matt at openssl dot org>, OpenSSL commit b31db505.
Improve crosslinking while here.
|
|
|
|
| |
to SSL_CTX_ctrl(3) to make ssl(3) slightly more palatable
|
|
|
|
|
| |
from <Jon dot Spillett at oracle dot com>
via OpenSSL commit 8c55c461
|
|
|
|
|
| |
contents needs to be made inaccessible - this is simpler and less error
prone than the current "if not NULL, explicit_bzero(); free()" dance.
|
| |
|
|
|
|
| |
via OpenSSL commit 7bd27895
|
| |
|
|
|
|
|
| |
from Markus Triska <triska at metalevel dot at>
via OpenSSL commit 1f164c6f.
|
|
|
|
|
|
|
| |
documented the function. Merge the more detailed descriptions
and the additional documentation of SSL_renegotiate_abbreviated(3)
and SSL_renegotiate_pending(3).
From Matt Caswell, OpenSSL commit 39820637.
|
| |
|
| |
|
|
|
|
|
|
|
| |
tls1_PRF() so that it matches tls1_P_hash(), use more explicit argument
names and change lengths to size_t.
ok inoguchi@
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
matches the size of the output buffer. This is used in the case where
there are multiple hashes - tls_P_hash() is called with the temporary
buffer and the result is then xored into the output buffer.
Avoid this by simply using a local buffer in tls_P_hash() and then xoring
the result into the output buffer. Overall this makes the code cleaner
and simplifies all of the tls_PRF() callers.
Similar to BoringSSL.
ok inoguchi@
|