| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
| |
|
| |
|
|
|
|
|
|
| |
as readlink() will tell you that more cheaply.
ok millert@
|
|
|
|
|
|
| |
Based on a diff from Kinichiro Inoguchi.
ok beck@
|
|
|
|
| |
ok deraadt@
|
|
|
|
|
|
|
|
|
| |
In particular, rename tls_free_conninfo() to tls_conninfo_free() and make
it a real free function. Rename tls_get_conninfo() to
tls_conninfo_populate() and have it allocate the struct tls_conninfo (after
freeing any existing one).
ok beck@
|
|
|
|
| |
ok beck@
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
provide additional keypairs (via tls_config_add_keypair_{file,mem}()) and
allow the server to determine what servername the client requested (via
tls_conn_servername()).
ok beck@
|
|
|
|
|
|
|
|
|
| |
that is required for certificate switching with libssl and the certificate
itself so that we can match against the subject and SANs. Hook up the
servername callback and switch to the appropriate SSL_CTX if we find a
matching certificate.
ok beck@
|
|
|
|
|
|
| |
that it can be reused to allocate the additional SSL_CTXs needed for SNI.
ok reyk@
|
|
|
|
|
|
|
| |
information related functions under their own heading and dedup the text
relating to when these functions can be called.
With input from and ok jmc@
|
| |
|
| |
|
|
|
|
| |
sort and remove unused fingerprint.
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
instead of assuming that they should use the one associated with the TLS
context. This allows these functions to be used with the additional
SSL contexts that are needed to support server-side SNI.
Also rename tls_configure_keypair() to tls_configure_ssl_keypair(), so that
these functions have a common prefix.
ok reyk@
|
|
|
|
|
|
| |
functions out the way of the main body;
ok guenther
|
|
|
|
|
|
| |
Merge the manual pages and call them deprecated there.
ok and manpage tweak jmc@, ok natano@
|
|
|
|
| |
(this was in the original commit, but got reverted in the recommit).
|
|
|
|
|
|
|
|
|
|
| |
tls_config_set_*_file() function is called. This allows us to immediately
propagate useful error messages, play more nicely with privsep/pledge and
have a single code path. Instead of always loading the default CA when
tls_config_new() is called, defer and only load the default CA when
tls_configure() is invoked, if a CA has not already been specified.
ok beck@ bluhm@
|
| |
|
|
|
|
| |
ok beck@ doug@
|
|
|
|
| |
ok deraadt@
|
|
|
|
| |
ok bcook
|
|
|
|
|
|
|
|
| |
* Add missing .Dv, .Ev, and .Fa macros.
* Delete deprecated .Tn macros.
* Mark up global variable names with .Va, not with .Fa or .Li.
* Mark up config file commands with .Ic, not with .Fa.
* Fix HISTORY, trivial to verify from the CSRG archive CD.
|
|
|
|
|
|
| |
resolver(3).
OK jmc@
|
|
|
|
| |
Requested by deraadt@
|
| |
|
|
|
|
| |
ok beck@ doug@
|
| |
|
| |
|
| |
|
|
|
|
| |
ok tedu@
|
|
|
|
| |
ok beck@
|
|
|
|
|
|
| |
- Return on first failure rather than continuing.
- Don't compare times by comparing strings that possibly were not parsable as a time.
ok deraadt@
|
|
|
|
|
| |
used if TLS 1.0 is enabled. Sugessted/discussed with jsing@ and bcook@.
ok guenther@ sthen@
|
|
|
|
|
|
|
|
|
|
|
|
| |
"secure" (TLSv1.2+AEAD+PFS)
"compat" (HIGH:!aNULL)
"legacy" (HIGH:MEDIUM:!aNULL)
"insecure" (ALL:!aNULL:!eNULL)
This allows for flexibility and finer grained control, rather than having
two extremes (an issue raised by Marko Kreen some time ago).
ok beck@ tedu@
|
|
|
|
| |
ok beck
|
| |
|
|
|
|
| |
ok beck@
|
|
|
|
|
| |
with a little help from jmc@ for the man page bits
ok jca@ and a reluctant tedu@
|
|
|
|
|
|
| |
at least one matching cipher suite.
ok doug@
|
|
|
|
|
|
|
|
|
|
| |
function is called. This simplifies code and results in a single memory
based code path being used to provide data to libssl. Errors that occur
when accessing the specified file are now detected and propagated
immediately. Since the file access now occurs when the configuration
function is called, we now play nicely with privsep/pledge.
ok beck@ bluhm@ doug@
|
|
|
|
|
|
| |
Reported by Vasily Kolobkov, based on a diff from Marko Kreen.
ok beck@
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
BN_mod_word() can return incorrect results if the supplied modulus is
too big, so we need to fall back to BN_div_word.
Now that BN_mod_word may fail, handle errors properly update the man page.
Thanks to Brian Smith for pointing out these fixes from BoringSSL:
https://boringssl.googlesource.com/boringssl/+/67cb49d045f04973ddba0f92fe8a8ad483c7da89
https://boringssl.googlesource.com/boringssl/+/44bedc348d9491e63c7ed1438db100a4b8a830be
ok beck@
|
|
|
|
|
|
| |
certificates provided in the response. - makes our newly added
ocsp regress test pass too..
ok bcook@
|
|
|
|
|
|
|
|
|
|
| |
implementations.
In the event of a failure in _rs_allocate for rsx, we still have a reference to
freed memory for rs on return. Not a huge deal since we subsequently abort in
_rs_init, but it looks strange on its own.
ok deraadt@
|