|  | Commit message (Collapse) | Author | Age | Files | Lines | 
|---|
| | 
| 
| 
| 
| | throw it away and create a new one. This simplifies the code and also
allows ASR to do its thing. | 
| | 
| 
| 
| | ssl3_change_cipher_state(). | 
| | 
| 
| 
| | up in the wrong order when the code was refactored. | 
| | 
| 
| 
| | Also use c rather than &c[0]. | 
| | 
| 
| 
| | This also brings it inline with tls1_change_cipher_state_cipher(). | 
| | 
| 
| 
| 
| 
| | Based on Adam Langley's chromium patches.
Tested by and ok sthen@ | 
| | |  | 
| | 
| 
| 
| | EVP_CIPH_FLAG_AEAD_CIPHER into the same if/else block. | 
| | 
| 
| 
| | do it properly. | 
| | 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| | those that use EVP_AEAD instead ov EVP_CIPHER. This means being able to
change cipher state with an EVP_AEAD and being able to encrypt/decrypt
TLS using the EVP_AEAD. This has no change on existing
non-SSL_CIPHER_ALGORITHM2_AEAD ciphers.
Based on Adam Langley's chromium patches.
Rides the recent libssl bump.
Tested by sthen@ | 
| | 
| 
| 
| 
| 
| 
| 
| 
| | Read and write contexts are also added to the SSL_CTX, along with
supporting code.
Based on Adam Langley's chromium diffs.
Rides the recent SSL library bump. | 
| | 
| 
| 
| 
| 
| 
| 
| | 7 years ago and never made it into an RFC. That code wasn't compiled in
anyway unless one would define the actual on-the-wire extension id bytes;
crank libssl major.
With help and enlightenment from Brendan MacDonell. | 
| | 
| 
| 
| | ok deraadt, jmc, tedu | 
| | 
| 
| 
| 
| | timingsafe_memcmp tests are disabled for now, pending its addition to
libc. | 
| | |  | 
| | 
| 
| 
| 
| 
| 
| 
| 
| | manual page strictly.  Return -2 if the strings are not strict numbers.
The numbers remain in the range of "int".  Range checking for these parameters
is done later in the pkey_*_ctl() functions, or sometimes in functions much
further downstream... but not always!!!
ok millert miod mikeb | 
| | |  | 
| | 
| 
| 
| | behavior for certain inputs.  From NetBSD.  OK tedu@ | 
| | 
| 
| 
| | which just emptied the file but didn't remove it. | 
| | 
| 
| 
| 
| 
| | They are obsoleted by the RFC3542 api.
ok mpi@ | 
| | 
| 
| 
| 
| 
| | OpenSSL 1.0.0.
ok miod@ (a little while back) | 
| | |  | 
| | 
| 
| 
| 
| 
| 
| 
| | Just kidding!
unifdef OPENSSL_NO_TLS since we will never want to actually do that.
ok deraadt@ | 
| | 
| 
| 
| | ok beck | 
| | |  | 
| | 
| 
| 
| 
| 
| | (From Jonas Maebe)
OK from beck@ | 
| | |  | 
| | 
| 
| 
| 
| 
| 
| 
| | to avoid potential null pointer dereference.
Based on david ramos work.
OK from miod@ and jsing@ | 
| | 
| 
| 
| 
| | atomicio writing out 64k in one direction will cause traffic in the other
direction to stall until it's complete. discussion with deraadt | 
| | 
| 
| 
| | from John-Mark Gurney | 
| | 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| | collateral damage.
The syncronous nature of this mechanism has hampered performance for
symmetric crypto relative to brute-force cpu. The assymetric crypto
support never really materialized in drivers.
So abandon the complexity.
ok tedu beck mikeb
some disagrement from djm but if he wants to test /dev/crypto ciphers
he should do it without this this gigantic API in the way | 
| | |  | 
| | |  | 
| | 
| 
| 
| 
| 
| | thing for an unsigned char array.
ok deraadt@ | 
| | 
| 
| 
| 
| 
| 
| 
| 
| | to avoid a possible NULL function call on ctx.final(). None of the callers
currently check the return value of calls to cert_verify_mac(), however
the function already returns 0 in another case and the MAC comparison will
later fail.
Issue reported by David Ramos. | 
| | 
| 
| 
| 
| 
| | protect from future field reordering/removal.
No difference in generated assembly. | 
| | |  | 
| | 
| 
| 
| 
| 
| 
| 
| 
| 
| | the return value of EVP_MD_CTX_copy_ex(). If the copy fails early then
EVP_DigestUpdate() will invoke md_ctx.update(), which will be a NULL
function pointer.
Analysis and patch from David Ramos.
ok deraadt@ | 
| | 
| 
| 
| 
| 
| 
| 
| 
| | fails, the NULL check will add an error but it does not abort. This will
result in EVP_DigestInit_ex() being called with a NULL context.
Also ensure that we check the return values from EVP_DigestInit_ex() and
EVP_DigestUpdate().
ok deraadt@ miod@ | 
| | 
| 
| 
| 
| 
| 
| 
| 
| | handshake MAC calculation fails. Currently, the result from both
ssl3_handshake_mac() calls is added together. This means that unless both
MD5 and SHA1 fail, a positive value will be returned to the caller,
indicating success rather than failure.
ok deraadt@ miod@ sthen@ | 
| | |  | 
| | |  | 
| | |  | 
| | |  | 
| | 
| 
| 
| 
| | using EVP_AEAD. Also provide an EVP_AEAD-only equivalent of
ssl_cipher_get_evp(). | 
| | 
| 
| 
| 
| 
| | magic numbers around.
ok deraadt@ | 
| | 
| 
| 
| 
| 
| | do some other clean up while here.
ok deraadt@ | 
| | 
| 
| 
| 
| 
| 
| 
| | check, so do not duplicate it here. Make the error handling consistent
by always using 'goto err' rather than returning in certain cases. Also
add a missing BIO_free(ssl) in BIO_new_ssl_connect().
ok deraadt@ | 
| | |  | 
| | 
| 
| 
| | discussed with tedu, ok jsing |