Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | sk_pop_free() checks for NULL so do not bother doing it from the callers. | jsing | 2017-01-24 | 7 | -50/+31 | |
| | ||||||
* | Within libssl a SSL_CTX * is referred to as a ctx - fix this for | jsing | 2017-01-24 | 1 | -29/+29 | |
| | | | | SSL_CTX_free(). | |||||
* | correct usage format; ok beck claudio benno | deraadt | 2017-01-24 | 1 | -2/+3 | |
| | ||||||
* | in resolver(3), document that _EDNS0 and _DNSSEC are no ops; | jmc | 2017-01-24 | 1 | -6/+17 | |
| | | | | | | | diff from kirill miazine while here, bump all the no op texts to one standard blurb; help/ok jca | |||||
* | fix mode on open() and ftruncate(), noticed by | beck | 2017-01-24 | 1 | -2/+4 | |
| | | | | bcook@ | |||||
* | #if 0 the ecformats_list and eccurves_list - these are currently unused but | jsing | 2017-01-24 | 1 | -2/+5 | |
| | | | | will be revisited at some point in the near future. | |||||
* | Remove unused cert variable. | jsing | 2017-01-24 | 1 | -3/+1 | |
| | | | | Found by bcook@ | |||||
* | Say no to two line error messages on failure | beck | 2017-01-24 | 1 | -4/+3 | |
| | ||||||
* | s/returns/exits/ | beck | 2017-01-24 | 1 | -2/+2 | |
| | ||||||
* | Break run-on sentence into two. | beck | 2017-01-24 | 1 | -3/+4 | |
| | ||||||
* | string terminator is called a NUL | deraadt | 2017-01-24 | 2 | -5/+5 | |
| | ||||||
* | Actually load the cafile when providede, and error message cleanup | beck | 2017-01-24 | 1 | -4/+4 | |
| | ||||||
* | use warn, I have errno here. noticed by theo | beck | 2017-01-24 | 1 | -1/+1 | |
| | ||||||
* | Yes the "if (const == val" idiom provides some safety, but it grates on | deraadt | 2017-01-24 | 1 | -58/+58 | |
| | | | | | us too much. ok beck jsing | |||||
* | knf | beck | 2017-01-24 | 1 | -1/+2 | |
| | ||||||
* | revert accidental commit of theo diff | beck | 2017-01-24 | 1 | -58/+58 | |
| | ||||||
* | Just don't bother with OpenSSL error strings, they are mostly | beck | 2017-01-24 | 2 | -77/+71 | |
| | | | | irrelevant and look gross here anyway.. we don't need them | |||||
* | various cleanup; | jmc | 2017-01-24 | 2 | -29/+28 | |
| | ||||||
* | Bump libssl and libtls minors due to symbol additions. | jsing | 2017-01-24 | 2 | -2/+2 | |
| | ||||||
* | slight cleanups | deraadt | 2017-01-24 | 1 | -4/+3 | |
| | ||||||
* | Add a -groups option to openssl s_client, which allows supported EC curves | jsing | 2017-01-24 | 1 | -7/+17 | |
| | | | | | | to be specified as a colon separated list. ok beck@ | |||||
* | Update client tests for changes in default EC formats/curves. | jsing | 2017-01-24 | 1 | -52/+31 | |
| | ||||||
* | Add support for setting the supported EC curves via | jsing | 2017-01-24 | 7 | -26/+197 | |
| | | | | | | | | | | | | | SSL{_CTX}_set1_groups{_list}() - also provide defines for the previous SSL{_CTX}_set1_curves{_list} names. This also changes the default list of EC curves to be X25519, P-256 and P-384. If you want others (such a brainpool) you need to configure this yourself. Inspired by parts of BoringSSL and OpenSSL. ok beck@ | |||||
* | s/exit/exist/ typo | beck | 2017-01-24 | 1 | -2/+2 | |
| | ||||||
* | New ocspcheck utility to validate a certificate against its ocsp responder | beck | 2017-01-24 | 5 | -0/+1634 | |
| | | | | | | and save the reply for stapling ok deraadt@ jsing@ | |||||
* | Correct bounds checks used when generating the EC curves extension. | jsing | 2017-01-24 | 1 | -3/+3 | |
| | | | | ok beck@ | |||||
* | accross -> across; | jmc | 2017-01-24 | 1 | -2/+2 | |
| | ||||||
* | Use prime256v1 for tests unless otherwise specified. | jsing | 2017-01-24 | 1 | -4/+0 | |
| | ||||||
* | Fix typo in brainpool curve name within a comment. | jsing | 2017-01-24 | 1 | -2/+2 | |
| | ||||||
* | There is no point returning then breaking... | jsing | 2017-01-24 | 1 | -2/+1 | |
| | ||||||
* | unifdef OPENSSL_NO_BIO - we do not support this in any form. | jsing | 2017-01-24 | 1 | -15/+1 | |
| | | | | ok beck@ | |||||
* | Introduce ticket support. To enable them it is enough to set a positive | claudio | 2017-01-24 | 6 | -14/+251 | |
| | | | | | | | | | | | | | | | | | | | | lifetime with tls_config_set_session_lifetime(). This enables tickets and uses an internal automatic rekeying mode for the ticket keys. If multiple processes are involved the following functions can be used to make tickets work accross all instances: - tls_config_set_session_id() sets the session identifier - tls_config_add_ticket_key() adds an encryption and authentication key For now only the last 4 keys added will be used (unless they are too old). If tls_config_add_ticket_key() is used the caller must ensure to add new keys regularly. It is best to do this 4 times per session lifetime (which is also the ticket key lifetime). Since tickets break PFS it is best to minimize the session lifetime according to needs. With a lot of help, input and OK beck@, jsing@ | |||||
* | ssl_cert_free() checks for NULL itself. | jsing | 2017-01-24 | 1 | -10/+5 | |
| | ||||||
* | Remove a "free up if allocated" comment that exists before code that frees | jsing | 2017-01-24 | 1 | -2/+1 | |
| | | | | | | things if they are allocated. ok captainobvious@ | |||||
* | sk_SSL_CIPHER_free() checks for NULL so do not bother doing the same from | jsing | 2017-01-24 | 4 | -27/+16 | |
| | | | | the callers. | |||||
* | ssl_sess_cert_free() checks for NULL, so do not bother doing it at the | jsing | 2017-01-24 | 2 | -6/+8 | |
| | | | | call sites. | |||||
* | There is no point in zeroing fields that exist within a struct that is | jsing | 2017-01-24 | 1 | -3/+1 | |
| | | | | about to be explicit_bzero'd and freed. | |||||
* | Add missing documentation for tls_config_set_verify_depth | claudio | 2017-01-24 | 1 | -1/+5 | |
| | | | | Done together with jsing@ | |||||
* | Shuffle the deck chairs to bring them back in order. | claudio | 2017-01-24 | 1 | -9/+9 | |
| | ||||||
* | tls_config_add_keypair_mem is the function to add additional keypairs and | claudio | 2017-01-24 | 1 | -5/+5 | |
| | | | | | | ocsp_staple functions set the OCSP response they don't add them (which implies you can call them multiple times). Discussed with jsing@ beck@ | |||||
* | move default_passwd_cb and default_passwd_cb_userdata back into | beck | 2017-01-23 | 4 | -30/+35 | |
| | | | | | | | the ssl_ctx from internal - these are used directly by python and openvpn and a few other things - we have the set accessors but the get accessors were added in 1.1 and these roll their own caveat OPENSSL_VERSION chickenpluckery | |||||
* | Move options and mode from SSL_CTX and SSL to internal, since these can be | jsing | 2017-01-23 | 12 | -66/+70 | |
| | | | | set and cleared via existing functions. | |||||
* | Split most of SSL_METHOD out into an internal variant, which is opaque. | jsing | 2017-01-23 | 23 | -303/+378 | |
| | | | | Discussed with beck@ | |||||
* | hook malloc_general to the tests | otto | 2017-01-23 | 1 | -2/+2 | |
| | ||||||
* | test malloc/realloc/free with some flag combo's | otto | 2017-01-23 | 2 | -0/+122 | |
| | ||||||
* | Remove ssl_ctrl, ssl_ctx_ctrl, ssl_callback_ctrl and ssl_ctx_callback_ctrl | jsing | 2017-01-23 | 8 | -76/+14 | |
| | | | | | | | from SSL_METHOD, replacing usage with direct calls to the appropriate functions. ok beck@ | |||||
* | send state and rstate from ssl_st into internal. There are accessors | beck | 2017-01-23 | 16 | -295/+296 | |
| | | | | | so these should not be diddled with directly ok jsing@ | |||||
* | move back read_hash and enc_read_ctx into ssl_st. wpa_supplicant and | beck | 2017-01-23 | 8 | -52/+57 | |
| | | | | other perversions touches them sickly and unnaturally. | |||||
* | Fix regress to handle movement of ssl structures to internal | beck | 2017-01-23 | 1 | -2/+4 | |
| | ||||||
* | Move a large part of ssl_st into internal, so we can see what squeals. | beck | 2017-01-23 | 22 | -888/+892 | |
| | | | | ok jsing@ |