| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
| |
ok deraadt@
|
|
|
|
| |
ok deraadt@
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
corrected by deraadt@ / guenther@
|
|
|
|
|
|
|
| |
This allows working with buffers and callback functions instead of directly on
sockets or file descriptors.
Original patch from Tobias Pape <tobias_at_netshed.de>.
ok beck@
|
| |
|
|
|
|
|
|
|
|
|
|
| |
noted otherwise. Remove all of the now redundant "client and server"
notations and change the client and server notations to "client only"
and "server only".
With input from jmc@.
ok beck@ jmc@
|
|
|
|
|
| |
right in Mozilla's CA list, rather than relying on IdenTrust cross-signing.
ok beck@ jca@
|
| |
|
|
|
|
|
|
|
| |
from OpenSSL commit 7f98aa7403a1244cf17d1aa489f5bb0f39bae431
CVE-2016-0702
ok beck@
|
|
|
|
|
|
|
|
|
|
| |
Patch based on OpenSSL commit d7a854c055ff22fb7da80c3b0e7cb08d248591d0
"Performance penalty varies from platform to platform, and even
key length. For rsa2048 sign it was observed to reach almost 10%."
CVE-2016-0702
ok beck@
|
|
|
|
|
|
|
| |
Don't dereference d when top is zero.
Original patch from OpenSSL commit d46e946d2603c64df6e1e4f9db0c70baaf1c4c03
ok jsing@
|
|
|
|
| |
from Jacob Berkman, ok beck@
|
|
|
|
|
|
|
|
|
|
| |
This switches EVP_CipherFinal() to work as EVP_EncryptFinal() and
EVP_DecryptFinal() do, always clearing the cipher context on completion.
Indicate that, since it is not possible to tell whether this function will
clear the context (the API has changed over time in OpenSSL), it is better to
use the _ex() variants and explicitly clear instead.
ok beck@
|
|
|
|
|
|
|
| |
Don't dereference |d| when |top| is zero. Also test that various
BIGNUM methods behave correctly on zero/even inputs.
Original patch from OpenSSL commit d46e946d2603c64df6e1e4f9db0c70baaf1c4c03
|
|
|
|
| |
Found with STACK, originally from OpenSSL, ok @beck
|
| |
|
| |
|
|
|
|
| |
ok krw@
|
| |
|
|
|
|
|
|
| |
in X509_check_host, X509_check_email, X509_check_ip, and X509_check_ip_asc,
with some cleanup on the way in by myself and jsing@
ok bcook@
|
| |
|
| |
|
| |
|
|
|
|
| |
tested by many (thanks!) ok tedu, guenther@
|
| |
|
| |
|
|
|
|
|
|
| |
as readlink() will tell you that more cheaply.
ok millert@
|
|
|
|
|
|
| |
Based on a diff from Kinichiro Inoguchi.
ok beck@
|
|
|
|
| |
ok deraadt@
|
|
|
|
|
|
|
|
|
| |
In particular, rename tls_free_conninfo() to tls_conninfo_free() and make
it a real free function. Rename tls_get_conninfo() to
tls_conninfo_populate() and have it allocate the struct tls_conninfo (after
freeing any existing one).
ok beck@
|
|
|
|
| |
ok beck@
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
provide additional keypairs (via tls_config_add_keypair_{file,mem}()) and
allow the server to determine what servername the client requested (via
tls_conn_servername()).
ok beck@
|
|
|
|
|
|
|
|
|
| |
that is required for certificate switching with libssl and the certificate
itself so that we can match against the subject and SANs. Hook up the
servername callback and switch to the appropriate SSL_CTX if we find a
matching certificate.
ok beck@
|
|
|
|
|
|
| |
that it can be reused to allocate the additional SSL_CTXs needed for SNI.
ok reyk@
|
|
|
|
|
|
|
| |
information related functions under their own heading and dedup the text
relating to when these functions can be called.
With input from and ok jmc@
|
| |
|
| |
|
|
|
|
| |
sort and remove unused fingerprint.
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
instead of assuming that they should use the one associated with the TLS
context. This allows these functions to be used with the additional
SSL contexts that are needed to support server-side SNI.
Also rename tls_configure_keypair() to tls_configure_ssl_keypair(), so that
these functions have a common prefix.
ok reyk@
|
|
|
|
|
|
| |
functions out the way of the main body;
ok guenther
|
|
|
|
|
|
| |
Merge the manual pages and call them deprecated there.
ok and manpage tweak jmc@, ok natano@
|
|
|
|
| |
(this was in the original commit, but got reverted in the recommit).
|
|
|
|
|
|
|
|
|
|
| |
tls_config_set_*_file() function is called. This allows us to immediately
propagate useful error messages, play more nicely with privsep/pledge and
have a single code path. Instead of always loading the default CA when
tls_config_new() is called, defer and only load the default CA when
tls_configure() is invoked, if a CA has not already been specified.
ok beck@ bluhm@
|