|  | Commit message (Collapse) | Author | Age | Files | Lines | 
|---|
| ... |  | 
| | 
| 
| 
| | ok beck@ | 
| | 
| 
| 
| 
| | the server child could be delayed.  In this case wait a second and
check again. | 
| | |  | 
| | |  | 
| | 
| 
| 
| | ok beck inoguchi | 
| | 
| 
| 
| | ok beck inoguchi | 
| | |  | 
| | 
| 
| 
| 
| 
| 
| | Used by unbound's DNS over TLS implementation to do server name
verification.
ok jsing | 
| | 
| 
| 
| 
| 
| 
| 
| 
| | tweaks from jsing and myself.  The SM2/SM3/SM4 algorithms are mandatory
for legal use of cryptography within China and [are] widely applied in
the country, covering identification/financial cards, contactless,
TPM 2.0 and PKI.
ok beck inoguchi jsing | 
| | |  | 
| | 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| | This implements automatic thread support initialization in libcrypto.
This does not remove any functions from the ABI, but does turn them into
no-ops. Stub implementations of pthread_mutex_(init|lock|unlock) are
provided for ramdisks.
This does not implement the new OpenSSL 1.1 thread API internally,
keeping the original CRYTPO_lock / CRYPTO_add_lock functions for library
locking. For -portable, crypto_lock.c can be reimplemented with
OS-specific primitives as needed.
ok beck@, tb@, looks sane guenther@ | 
| | 
| 
| 
| 
| | Regression found by Perl module p5-IO-Socket-SSL tests.
with beck@ tb@ | 
| | |  | 
| | 
| 
| 
| 
| 
| | lightly tested, but will need sanity checks and regress test changes
before being added to any sigalgs list for real
ok jsing@ tb@ | 
| | 
| 
| 
| 
| 
| | to allow for adding PSS, Nuke the now unneejded guard around the PSS
algorithms in the sigalgs table
ok jsing@ tb@ | 
| | 
| 
| 
| 
| | directory.  Keep all log files for easier debugging.  Name regress
target names consistently. | 
| | 
| 
| 
| | ok jsing@ | 
| | |  | 
| | 
| 
| 
| 
| | all combinations of LibreSSL, OpenSSL 1.0.2, and OpenSSL 1.1.  It
is currently disabled for TLS 1.3 as this needs more setup. | 
| | 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| | - Provide a tls13_handshake_active_action() function to reduce code
  duplication and replace tls13_handshake_get_sender().
- Add an INVALID message_type, so we can explicitly detect invalid
  conditions.
- Implement skeletons for the tls13_handshake_send_action() and
  tls13_handshake_recv_action() functions.
- OR in the NEGOTIATED value at the end of recving or sending a server
  hello so that we switch to the next chain in the state table.
ok tb@ | 
| | |  | 
| | 
| 
| 
| | From Ben L <bobsayshilol at live dot co dot uk>. | 
| | |  | 
| | |  | 
| | |  | 
| | 
| 
| 
| | Reported by Ben L <bobsayshilol at live dot co dot uk> | 
| | 
| 
| 
| 
| 
| | just keep the sigalg around so we can remember what we actually
decided to use.
ok jsing@ | 
| | |  | 
| | 
| 
| 
| | ok jsing | 
| | 
| 
| 
| | ok jsing@ | 
| | |  | 
| | 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| | When the RFC refers to ("") for key derivation, it is referring to the
transcript hash of an empty string, not an empty string. Rename
tls13_secrets_new() to tls13_secrets_create(), make it take an EVP_MD *
and calculate the hash of an empty string so that we have it available
for the "derived" and other steps. Merge tls13_secrets_init() into
the same function, remove the EVP_MD * from other functions and use the
empty string hash at the appropriate places.
ok beck@ tb@ | 
| | 
| 
| 
| 
| 
| | and "write". Use self-documenting C99 initializers.
ok bcook, jsing | 
| | 
| 
| 
| 
| 
| | While there, eliminate a flag that was only used once.
ok beck jsing mestre | 
| | 
| 
| 
| | ok beck jsing mestre | 
| | 
| 
| 
| 
| 
| 
| 
| | LibreSSL as crypto provider.  When we run their regression tests,
we are actually testing our library.  This is far from perfect.  A
lot of LibreSSL features have not been implemented as Botan provider.
Even if provider openssl is specified, botan-test runs a lot of
non-openssl tests.  This can be improved later. | 
| | 
| 
| 
| 
| 
| | CID 184282
ok beck jsing mestre | 
| | |  | 
| | 
| 
| 
| | line continuations. | 
| | 
| 
| 
| 
| 
| 
| 
| | effectively use pledge(2) in some programs.
approval from many, thanks!
idea by & ok deraadt@ | 
| | 
| 
| 
| 
| 
| | Found the hard way by jmc@
ok tb@ | 
| | 
| 
| 
| 
| 
| | Having the three libraries, client and server certificates, missing
or invalid CA or certificates, and enforcing peer certificate results
in 1944 new test cases. | 
| | 
| 
| 
| | ok jsing@ | 
| | 
| 
| 
| 
| | Add a priority list for tls 1.2
ok jsing@ | 
| | 
| 
| 
| | ok tb@ | 
| | 
| 
| 
| | ok tb@ | 
| | 
| 
| 
| 
| 
| | setting it.
From Ben L <bobsayshilol () live ! co ! uk>. | 
| | 
| 
| 
| | From Ben L <bobsayshilol () live ! co ! uk> | 
| | 
| 
| 
| 
| | From Ben L bobsayshilol () live ! co ! uk
Similar fixes in BoringSSL and OpensSSL. | 
| | 
| 
| 
| 
| 
| | call has finished.  This allows to write race free scripts as they
can check that the server is up and running.
OK sthen@ tb@ |