| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
|
|
|
| |
SHA-0 was withdrawn shortly after publication 20 years ago and replaced
with SHA-1. This will require a major crank.
ok bcook@, jsing@
|
| |
|
|
|
|
| |
if hardware acceleration is available.
|
| |
|
|
|
|
|
| |
OPENSSL_ia32cap_loc; nothing in ports uses them besides embedded copies of
OpenSSL. This opens the `all hell gets loose' window.
|
|
|
|
| |
ok miod
|
| |
|
|
|
|
|
|
|
| |
BN_bn2hex() had a 1-byte overflow when creating "-0\0". Reported to
me a while back by unknown person -- did not have enough experience
to push this through then.
advice from jsing, ok miod
|
|
|
|
|
| |
we can indicate an EOF properly on tls_read and tls_write
ok jsing@
|
|
|
|
| |
Hide bcrypt_autorounds(), prefixing with an underbar for static builds.
|
| |
|
| |
|
| |
|
|
|
|
| |
ok beck@ miod@
|
|
|
|
| |
ok jsing@
|
| |
|
| |
|
|
|
|
| |
ok jsing@
|
|
|
|
|
|
|
|
|
|
| |
The current client key exchange code generates DH and ECDH keys into the
same buffer that we use to send data to the network - stop doing this and
malloc() a new buffer, which we explicit_bzero() and free() on return.
This also benefits from ASLR and means that the keys are no longer
generated in a well known location.
ok beck@
|
|
|
|
|
| |
verified that they are there via isdigit() so we can convert from
ASCII to an int without using atoi(). OK guenther@ deraadt@
|
|
|
|
|
|
|
|
|
| |
This pulls out and renames setup_ui/destroy_ui so we have something that
can be replaced as-needed, moving the the console setup code for Windows
to app_win.c in -portable, instead of needing a local patch to enable binary
console mode
ui_read/write are also simplified.
|
|
|
|
| |
ok beck@
|
|
|
|
| |
ok jmc@
|
|
|
|
|
|
| |
the AES acceleration checking for i386.
ok beck@ miod@
|
|
|
|
|
|
| |
four line function and a tonne of license text.
ok beck@
|
|
|
|
| |
ok deraadt@ "hurray! finally!" miod@ "Yay!" sthen@
|
|
|
|
| |
"jajaja" miod@
|
|
|
|
|
|
|
|
|
| |
Currently, if you call ECDH_compute_key() it will silently truncate the
resulting key if the output buffer is less than the key size. Instead,
detect this condition and return an error. If the buffer provided is larger
than the key length, zero the remainder.
ok beck@ miod@ "+ shivers"
|
|
|
|
|
|
| |
C=FR, O=Certplus, CN=Class 2 Primary CA
req by beck@, ok miod@ beck@
|
|
|
|
| |
ok jsing@
|
| |
|
| |
|
|
|
|
| |
ok jsing@
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
cpu's specific hardware capabilities users of libcrypto might be interested
in, as an integer value. This deprecates the existing OPENSSL_ia32cap()
macro and the OPENSSL_ia32cap_loc() function (which returns the pointer so
that you can mess with stuff you shouldn't mess with).
Interpreting the value returned by OPENSSL_cpu_caps() is, of course,
machine-dependent.
Minor version bump for libcrypto.
ok beck@ jsing@
|
|
|
|
|
|
|
|
| |
then decrement it and call a callback on exit from the function. As such,
these functions should not return in the middle, otherwise in_handshake is
never decremented and the callback never called.
ok beck@ "with many sighs" miod@
|
|
|
|
|
|
| |
over CHACHA20. Otherwise, prefer CHACHA20 with AES second.
ok beck@ miod@
|
|
|
|
|
|
| |
C standard are all weak.
Apply __{BEGIN,END}_HIDDEN_DECLS to gdtoa{,imp}.h, hiding the
arch-specific __strtorx, __ULtox_D2A, __strtorQ, __ULtoQ_D2A symbols.
|
| |
|
| |
|
|
|
|
|
|
| |
at handshake time. change accessors to return const char * to remove need
for caller to free memory.
ok jsing@
|
|
|
|
|
|
|
|
|
| |
functions. The original was written as a huge if/else if chain -
split out the handling for each key exchange type. This allows us to reduce
two levels of indentation, make the code far more readable and have single
return paths so that we can simplify clean up.
ok beck@
|
| |
|
| |
|
|
|
|
| |
ok miod@
|
|
|
|
|
|
|
|
|
|
| |
that we will pass the result through tls_ssl_error() on failure. Otherwise
we can end up reporting spurious errors due to their being unrelated errors
already on the error stack.
Spotted by Marko Kreen.
ok beck@
|
| |
|
|
|
|
|
|
|
|
|
|
| |
has been superseded by OPENSSL_CONF and discouraged from use for almost
16 years.
"Definately ok" jsing@
"burn it" deraadt@
"Kill it with fire" miod@
"KILL IT WITH FIRE!!! BURN!!!!" beck@
|
| |
|
| |
|