Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | with new defaults, test-fuzzed-plaintext.py is no longer slow | tb | 2021-04-13 | 1 | -3/+2 | |
| | ||||||
* | move a few tests to the unsupported group and fix two comments | tb | 2021-04-13 | 1 | -15/+15 | |
| | ||||||
* | annotate test-ecdhe-rsa-key-exchange-with-bad-messages.py with expected | tb | 2021-04-13 | 1 | -2/+3 | |
| | | | | alerts and where to add them. | |||||
* | Update a stale comment and fix a typo. | tb | 2021-04-11 | 1 | -3/+3 | |
| | ||||||
* | An extra internal consistency check and a missing stats adjustment. ok tb@ | otto | 2021-04-09 | 1 | -1/+4 | |
| | ||||||
* | Cache implementation has changed, we do not hold on to an exact number | otto | 2021-04-09 | 1 | -3/+4 | |
| | | | | of pages anymore, but also cache larger regions; ok tb@ | |||||
* | Enable test-cve-2016-6309.py | tb | 2021-04-08 | 1 | -3/+2 | |
| | ||||||
* | Avoid clobbering the error code when sending an alert | tb | 2021-04-07 | 1 | -2/+3 | |
| | | | | | | | | | | | | In order to fail gracefully on encountering a self-signed cert, curl looks at the top-most error on the stack and needs specific SSL_R_ error codes. This mechanism was broken when the tls13_alert_sent_cb() was added after people complained about unhelpful unknown errors. Fix this by only setting the error code from a fatal alert if no error has been set previously. Issue reported by Christopher Reid ok jsing | |||||
* | Use ERR_print_error_fp() to avoid leaking a BIO in fatal() | tb | 2021-04-07 | 1 | -2/+2 | |
| | ||||||
* | Check function return value in openssl(1) x509.c | inoguchi | 2021-04-07 | 1 | -24/+71 | |
| | | | | input from bcook@, ok and comments from tb@ | |||||
* | Avoid leak in error path | inoguchi | 2021-04-07 | 1 | -3/+7 | |
| | | | | ok and input from tb@ | |||||
* | use errx() instead of err() | tb | 2021-04-06 | 1 | -8/+8 | |
| | ||||||
* | spaces -> tabs | tb | 2021-04-06 | 1 | -5/+5 | |
| | ||||||
* | minor style tweaks | tb | 2021-04-06 | 1 | -5/+6 | |
| | ||||||
* | Don't leak param->name in x509_verify_param_zero() | tb | 2021-04-05 | 1 | -1/+2 | |
| | | | | | | | | | For dynamically allocated verify parameters, param->name is only ever set in X509_VERIFY_set1_name() where the old one is freed and the new one is assigned via strdup(). Setting it to NULL without freeing it beforehand is a leak. looks correct to millert, ok inoguchi | |||||
* | Add missing error check for AES_unwrap_key(). | tb | 2021-04-04 | 1 | -1/+3 | |
| | ||||||
* | Fix two copy paste errors in error messages | tb | 2021-04-04 | 1 | -3/+3 | |
| | ||||||
* | Add tests for DTLSv1_2{,_client,_server}_method() | tb | 2021-04-04 | 1 | -1/+20 | |
| | ||||||
* | Use correct type for tmp in test_write_bytes() | tb | 2021-04-04 | 1 | -2/+2 | |
| | ||||||
* | Explicitly NULL pointers to avoid a double free. | tb | 2021-04-04 | 1 | -1/+3 | |
| | ||||||
* | Don't leak key and dh in the error path. | tb | 2021-04-04 | 1 | -4/+7 | |
| | ||||||
* | Clean up client and server tls{,_config} contexts in tls_test(). | tb | 2021-04-04 | 1 | -2/+11 | |
| | | | | Leaks reported by Ilya Shipitsin. | |||||
* | Run the CMAC tests through EVP_PKEY_new_CMAC_key(). | tb | 2021-04-03 | 1 | -10/+22 | |
| | ||||||
* | Two cases of BRE involving counts and backrefs that go wrong and | otto | 2021-04-02 | 1 | -1/+16 | |
| | | | | | similar that have no isssues. Reported by Michael Paoli. Failing cases commented out for now. | |||||
* | Show DTLS1.2 message with openssl(1) s_server and s_client | inoguchi | 2021-04-02 | 1 | -2/+6 | |
| | | | | ok jsing@ tb@ | |||||
* | Compare the pointer variable explicitly with NULL in if condition | inoguchi | 2021-04-01 | 1 | -18/+17 | |
| | ||||||
* | one of the examples needs an -N (and explanation); | jmc | 2021-03-31 | 1 | -4/+7 | |
| | | | | | | diff from robert scheck discussed with and tweaked by sthen | |||||
* | Update for DTLSv1.2 support. | tb | 2021-03-31 | 1 | -2/+4 | |
| | ||||||
* | Remove workarounds for SSL_is_dtls() | tb | 2021-03-31 | 2 | -11/+2 | |
| | | | | Reminded by inoguchi jsing | |||||
* | Remove workaround for missing d2i_DSAPrivateKey_fp prototype | tb | 2021-03-31 | 1 | -5/+1 | |
| | ||||||
* | Bump minors after symbol addition | tb | 2021-03-31 | 3 | -3/+3 | |
| | ||||||
* | Expose various DTLSv1.2 specific functions and defines | tb | 2021-03-31 | 5 | -27/+8 | |
| | | | | ok bcook inoguchi jsing | |||||
* | Document SSL_set_hostflags(3) and SSL_get0_peername(3) | tb | 2021-03-31 | 1 | -18/+4 | |
| | | | | ok bcook inoguchi jsing | |||||
* | Expose SSL_set_hostflags(3) and SSL_get0_peername(3) | tb | 2021-03-31 | 2 | -3/+3 | |
| | | | | ok bcook inoguchi jsing | |||||
* | Document SSL_use_certificate_chain_file(3) | tb | 2021-03-31 | 1 | -11/+3 | |
| | | | | ok bcook inoguchi jsing | |||||
* | Expose SSL_use_certificate_chain_file(3) | tb | 2021-03-31 | 2 | -3/+2 | |
| | | | | ok bcook inoguchi jsing | |||||
* | Provide missing prototype for d2i_DSAPrivateKey_fp(3) | tb | 2021-03-31 | 1 | -1/+2 | |
| | | | | ok bcook inoguchi jsing | |||||
* | Document EVP_PKEY_new_CMAC_key(3) | tb | 2021-03-31 | 1 | -16/+4 | |
| | | | | ok bcook inoguchi jsing | |||||
* | Provide EVP_PKEY_new_CMAC_key(3) | tb | 2021-03-31 | 2 | -5/+2 | |
| | | | | ok bcook inoguchi jsing | |||||
* | whitespace nits | tb | 2021-03-29 | 1 | -4/+4 | |
| | ||||||
* | Prepare documenting EVP_PKEY_new_CMAC_key(3) | tb | 2021-03-29 | 1 | -2/+54 | |
| | | | | Based on some text in OpenSSL 1.1.1's EVP_PKEY_new.pod. | |||||
* | Remove pointless assignment in SSL_get0_alpn_selected(). | jsing | 2021-03-29 | 1 | -4/+1 | |
| | | | | ok tb@ | |||||
* | Avoid transcript initialisation when sending a TLS HelloRequest. | jsing | 2021-03-29 | 1 | -4/+6 | |
| | | | | | | | | | | When server side renegotiation is triggered, the TLSv1.2 state machine sends a HelloRequest before going to ST_SW_FLUSH and ST_OK. In this case we do not need the transcript and currently hit the sanity check in ST_OK that ensures the transcript has been freed, breaking server initiated renegotiation. We do however need the transcript in the DTLS case. ok tb@ | |||||
* | Move finished and peer finished to the handshake struct. | jsing | 2021-03-29 | 7 | -44/+44 | |
| | | | | | | | | | This moves the finish_md and peer_finish_md from the 'tmp' struct to the handshake struct, renaming to finished and peer_finished in the process. This also allows the remaining S3I(s) references to be removed from the TLSv1.3 client and server. ok inoguchi@ tb@ | |||||
* | Add regress coverage for TLSv1.2 record number increment. | jsing | 2021-03-29 | 1 | -8/+151 | |
| | ||||||
* | Move the TLSv1.2 record number increment into the new record layer. | jsing | 2021-03-29 | 3 | -19/+44 | |
| | | | | | | | This adds checks (based on the TLSv1.3 implementation) to ensure that the TLS/DTLS sequence numbers do not wrap, as required by the respective RFCs. ok inoguchi@ tb@ | |||||
* | Prepare to provide EVP_PKEY_new_CMAC_key() | tb | 2021-03-29 | 4 | -20/+84 | |
| | | | | | | | sebastia ran into this when attempting to update security/hcxtools. This will be tested via wycheproof.go once the symbol is public. ok jsing, tested by sebastia | |||||
* | The failure mode of test-tls13-version-negotiation.py has changed. | tb | 2021-03-28 | 1 | -4/+2 | |
| | | | | Update comment. | |||||
* | Fix duplicate SSL_is_dtls in libssl and apps.c | inoguchi | 2021-03-28 | 1 | -1/+3 | |
| | | | | | | | | | | Currently, SSL_is_dtls exists in both libssl and apps.c, and one in libssl is guarded by LIBRESSL_INTERNAL and not exposed yet. This causes portable build broke with openssl(1) and optionstest. To solve this temporarily, rename SSL_is_dtls by apps.h. This temporary renaming will be removed when the SSL_is_dtls() is exposed. ok jsing@ | |||||
* | Enable test-sig-algs-renegotiation-resumption.py. | tb | 2021-03-27 | 1 | -5/+6 | |
| | | | | | | | This test covers various scenarios with renegotiation and session resumption. In particular it crashes the OpenSSL 1.1.1j server due to the sigalg NULL deref fixed this week. We need --sig-algs-drop-ok since we do not currently implement signature_algorithms_cert. |