| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
| |
ok jsing@
|
|
|
|
|
|
|
|
|
|
| |
The current client key exchange code generates DH and ECDH keys into the
same buffer that we use to send data to the network - stop doing this and
malloc() a new buffer, which we explicit_bzero() and free() on return.
This also benefits from ASLR and means that the keys are no longer
generated in a well known location.
ok beck@
|
|
|
|
|
| |
verified that they are there via isdigit() so we can convert from
ASCII to an int without using atoi(). OK guenther@ deraadt@
|
|
|
|
|
|
|
|
|
| |
This pulls out and renames setup_ui/destroy_ui so we have something that
can be replaced as-needed, moving the the console setup code for Windows
to app_win.c in -portable, instead of needing a local patch to enable binary
console mode
ui_read/write are also simplified.
|
|
|
|
| |
ok beck@
|
|
|
|
| |
ok jmc@
|
|
|
|
|
|
| |
the AES acceleration checking for i386.
ok beck@ miod@
|
|
|
|
|
|
| |
four line function and a tonne of license text.
ok beck@
|
|
|
|
| |
ok deraadt@ "hurray! finally!" miod@ "Yay!" sthen@
|
|
|
|
| |
"jajaja" miod@
|
|
|
|
|
|
|
|
|
| |
Currently, if you call ECDH_compute_key() it will silently truncate the
resulting key if the output buffer is less than the key size. Instead,
detect this condition and return an error. If the buffer provided is larger
than the key length, zero the remainder.
ok beck@ miod@ "+ shivers"
|
|
|
|
|
|
| |
C=FR, O=Certplus, CN=Class 2 Primary CA
req by beck@, ok miod@ beck@
|
|
|
|
| |
ok jsing@
|
| |
|
| |
|
|
|
|
| |
ok jsing@
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
cpu's specific hardware capabilities users of libcrypto might be interested
in, as an integer value. This deprecates the existing OPENSSL_ia32cap()
macro and the OPENSSL_ia32cap_loc() function (which returns the pointer so
that you can mess with stuff you shouldn't mess with).
Interpreting the value returned by OPENSSL_cpu_caps() is, of course,
machine-dependent.
Minor version bump for libcrypto.
ok beck@ jsing@
|
|
|
|
|
|
|
|
| |
then decrement it and call a callback on exit from the function. As such,
these functions should not return in the middle, otherwise in_handshake is
never decremented and the callback never called.
ok beck@ "with many sighs" miod@
|
|
|
|
|
|
| |
over CHACHA20. Otherwise, prefer CHACHA20 with AES second.
ok beck@ miod@
|
|
|
|
|
|
| |
C standard are all weak.
Apply __{BEGIN,END}_HIDDEN_DECLS to gdtoa{,imp}.h, hiding the
arch-specific __strtorx, __ULtox_D2A, __strtorQ, __ULtoQ_D2A symbols.
|
| |
|
| |
|
|
|
|
|
|
| |
at handshake time. change accessors to return const char * to remove need
for caller to free memory.
ok jsing@
|
|
|
|
|
|
|
|
|
| |
functions. The original was written as a huge if/else if chain -
split out the handling for each key exchange type. This allows us to reduce
two levels of indentation, make the code far more readable and have single
return paths so that we can simplify clean up.
ok beck@
|
| |
|
| |
|
|
|
|
| |
ok miod@
|
|
|
|
|
|
|
|
|
|
| |
that we will pass the result through tls_ssl_error() on failure. Otherwise
we can end up reporting spurious errors due to their being unrelated errors
already on the error stack.
Spotted by Marko Kreen.
ok beck@
|
| |
|
|
|
|
|
|
|
|
|
|
| |
has been superseded by OPENSSL_CONF and discouraged from use for almost
16 years.
"Definately ok" jsing@
"burn it" deraadt@
"Kill it with fire" miod@
"KILL IT WITH FIRE!!! BURN!!!!" beck@
|
| |
|
| |
|
|
|
|
| |
and the symbols not in the C standard are weak
|
|
|
|
|
|
|
| |
We can now assume >= TLS v1.0 since SSL2_VERSION, SSL3_VERSION and
DTLS1_BAD_VER support was removed.
"reads ok" miod@
|
|
|
|
|
|
|
| |
This adds aes-128-gcm aes-256-gcm chacha20-poly1305
from Adam Langley's original patch for OpenSSL
ok beck@ jsing@
|
|
|
|
|
| |
It was the only thing preventing -Werror from building on some systems due to
the unchecked asprintf's.
|
|
|
|
| |
code deduped.
|
|
|
|
|
|
|
|
|
| |
primality, do not unnecessarily convert the original decimal number to
hex in the output.
Hex numbers explicitly specified with -hex remain unchanged.
ok beck@ deraadt@ jsing@ miod@
|
|
|
|
|
|
|
| |
ssl3_handshake_msg_hdr_len() function. Use this to correct several places
that have magic numbers with header lengths hardcoded as '4'.
ok beck@
|
|
|
|
| |
Delete unused 'fd' argument from internal function oldttyname()
|
|
|
|
| |
variables go direct. (Common variables cannot be aliased.)
|
|
|
|
| |
lines of code, while gaining SIGALGs support.
|
|
|
|
| |
lines of code, while gaining bug fixes and SIGALGs support.
|
| |
|
| |
|
| |
|
|
|
|
| |
ok beck@
|
|
|
|
|
| |
ssl3_send_client_verify() is different, but it correctly supports things
like SIGALGS. Another 74 lines of code bites the dust.
|
|
|
|
|
|
|
|
| |
ssl3_send_client_key_exchange() is effectively identical, in fact it has
a number of bug fixes and improvements that never got merged into the
DTLS copy of the code. Flenses another 264 lines of code.
ok beck@
|