| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
|
|
|
| |
via OpenSSL commit 1f13ad31 Dec 25 17:50:39 2017 +0800,
but fixing two bugs in his description.
This commit also includes a few minor improvements to the description
of DES_fcrypt(3), also from OpenSSL, tweaked by me.
|
|
|
|
|
|
|
|
| |
These functions constitute an obvious portability nightmare,
but that's no excuse for incorrect documentation.
Pointed out by Nicolas Schodet
via OpenSSL commit b713c4ff Jan 22 14:41:09 2018 -0500.
|
|
|
|
|
| |
from Hubert Kario <hkario at redhat dot com>
via OpenSSL commit 681acb31 Sep 29 13:10:34 2017 +0200.
|
|
|
|
|
|
|
|
| |
from Rich Salz via OpenSSL commit 8162f6f5 Jun 9 17:02:59 2016 -0400.
Merging the RETURN VALUES section really wouldn't make much sense
here, it contains no additional information and i don't see any way
to reorganize the content and make it better.
|
|
|
|
|
|
|
|
|
|
| |
Triggered by OpenSSL commit 1f13ad31 Dec 25 17:50:39 2017 +0800
by Paul Yang, but reworded for intelligibility and precision.
While here, also expand the description of the "ret" argument of
BIO_callback_fn(). That's a fairly complicated and alarmingly
powerful concept, but the description was so brief that is was
barely comprehensible.
|
|
|
|
|
| |
from Paul Yang via OpenSSL commit 1f13ad31 Dec 25 17:50:39 2017 +0800
with tweaks by me.
|
|
|
|
| |
from Paul Yang via OpenSSL commit 1f13ad31 Dec 25 17:50:39 2017 +0800.
|
|
|
|
|
| |
From Paul Yang via OpenSSL commit 1f13ad31 Dec 25 17:50:39 2017 +0800
with one tweak.
|
|
|
|
|
|
|
|
|
|
| |
accordingly. Make some statements more precise, and point out
some dangerous traps in these ill-designed interfaces.
Also do some minor polishing while here.
Triggered by OpenSSL commit 1f13ad31 Dec 25 17:50:39 2017 +0800
by Paul Yang, but not using most of his wording because that is in
part redundant, in part incomplete, and in part outright wrong.
|
|
|
|
|
|
| |
as requested by jsing@, and also document six more related functions
that have already been public before that.
OpenSSL fails to document any of these.
|
|
|
|
|
| |
that jsing@ recently exposed publicly in libcrypto.
Requested by jsing@.
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The keypair pubkey hash was being generated and set in the keypair when the
TLS context was being configured. This code should not be messing around
with the keypair contents, since it is part of the config (and not the
context).
Instead, generate the pubkey hash and store it in the keypair when the
certificate is configured. This means that we are guaranteed to have the
pubkey hash and as a side benefit, we identify bad certificate content
when it is provided, instead of during the context configuration.
ok beck@
|
| |
|
|
|
|
| |
functions require the conninfo passed in to be non-NULL.
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
A libtls client can specify a session file descriptor (a regular file
with appropriate ownership and permissions) and libtls will manage reading
and writing of session data across TLS handshakes.
Discussed at length with deraadt@ and tedu@.
Rides previous minor bump.
ok beck@
|
| |
|
|
|
|
| |
API and are now in use by various libraries and applications.
|
|
|
|
|
|
|
|
|
|
|
| |
The RI logic gets pulled up into ssl3_get_server_hello() and
ssl_parse_serverhello_tlsext() gets replaced by tlsext_client_parse(),
which allows a CBS to be passed all the way down.
This also deduplicates the tlsext_client_build() and tlsext_server_build()
code.
ok beck@
|
|
|
|
|
| |
rolling its own certificate loading. This also means we get better error
reporting on failure.
|
| |
|
| |
|
| |
|
|
|
|
| |
Reported by and fix from Nate Bessette <openbsd at nate dot sh> - thanks.
|
| |
|
|
|
|
|
|
| |
in multiple locations.
ok beck@
|
| |
|
|
|
|
|
|
| |
passed to BIO_get_accept_socket(). This is part of the API and it
fixes "openssl ocsp -port 12345" in server mode.
from markus@; OK jsing@ beck@
|
|
|
|
| |
OK jsing@
|
| |
|
|
|
|
| |
No change to generated assembly.
|
| |
|
| |
|
|
|
|
|
|
|
| |
- Start with a full page of struct region_info's
- Save an mprotect in the init code: allocate 3 pages with none and
make the middle page r/w instead of a r/w allocation and two calls to make the
guard pages none
|
|
|
|
| |
ok jsing@
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This removes ssl_parse_clienthello_tlsext() and allows the CBS to be
passed all the way through from ssl3_get_client_hello(). The renegotation
check gets pulled up into ssl3_get_client_hello() which is where other
such checks exist.
The TLS extension parsing now also ensures that we do not get duplicates
of any known extensions (the old pre-rewrite code only did this for some
extensions).
ok inoguchi@
|
|
|
|
| |
Also reference the knowledge base article instead of a discussion thread.
|
|
|
|
|
|
|
| |
While here make the CBS usage in ssl3_get_cipher_by_char() more consistent
with other code.
ok inoguchi@
|
|
|
|
|
| |
junked
- freezero(): only clear requested size
|
|
|
|
|
|
| |
defined as they rely on unaligned access.
ok joel@
|
|
|
|
|
| |
came also up with this diff. Simple, no bias and benchmarks show the extra
random calls disappear in te measurement noise.
|
|
|
|
|
|
|
| |
but at that time ffs function calls were generated instead of the
compiler inlining the code. Now that ffs is marked protected in
libc this is handled better. Thanks to kshe who prompted me to
look at this again.
|
|
|
|
|
|
|
| |
dance, mark it protected. This works better for both gcc and clang: gcc
blocks overriding of internal calls, while clang permits inlining again.
ok otto@
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
the assembly code in libcrypto assumes unaligned access is allowed for
ARMv7. Make these paths conditional on __STRICT_ALIGNMENT not being
defined and define __STRICT_ALIGNMENT in arm_arch.h for OpenBSD.
ok tom@
|
| |
|
|
|
|
| |
some cleanup; tested by sthen@ on a ports build
|