| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
| |
|
|
|
|
| |
Worked out by bcook@
|
|
|
|
| |
noted by Bernard Spil
|
|
|
|
|
|
| |
Loosely based on changes in OpenSSL.
ok beck@
|
| |
|
| |
|
|
|
|
|
|
| |
development of a cargo cult in case people look at existing files
for examples. This achieves a consistent .Fo and .Fn quoting style
across the whole tree.
|
| |
|
|
|
|
|
|
|
|
| |
MD4 should have been removed a long time ago. Also, RFC 6150 moved it to
historic in 2011. Rides the major crank from removing SHA-0.
Discussed with many including beck@, millert@, djm@, sthen@
ok jsing@, input + ok bcook@
|
|
|
|
|
|
|
| |
SHA-0 was withdrawn shortly after publication 20 years ago and replaced
with SHA-1. This will require a major crank.
ok bcook@, jsing@
|
|
|
|
|
| |
OPENSSL_ia32cap_loc; nothing in ports uses them besides embedded copies of
OpenSSL. This opens the `all hell gets loose' window.
|
|
|
|
| |
ok miod
|
| |
|
|
|
|
|
|
|
| |
BN_bn2hex() had a 1-byte overflow when creating "-0\0". Reported to
me a while back by unknown person -- did not have enough experience
to push this through then.
advice from jsing, ok miod
|
|
|
|
| |
ok beck@ miod@
|
|
|
|
|
|
|
|
|
|
| |
The current client key exchange code generates DH and ECDH keys into the
same buffer that we use to send data to the network - stop doing this and
malloc() a new buffer, which we explicit_bzero() and free() on return.
This also benefits from ASLR and means that the keys are no longer
generated in a well known location.
ok beck@
|
|
|
|
| |
ok beck@
|
|
|
|
|
|
| |
the AES acceleration checking for i386.
ok beck@ miod@
|
|
|
|
|
|
| |
four line function and a tonne of license text.
ok beck@
|
|
|
|
| |
ok deraadt@ "hurray! finally!" miod@ "Yay!" sthen@
|
|
|
|
| |
"jajaja" miod@
|
|
|
|
|
|
|
|
|
| |
Currently, if you call ECDH_compute_key() it will silently truncate the
resulting key if the output buffer is less than the key size. Instead,
detect this condition and return an error. If the buffer provided is larger
than the key length, zero the remainder.
ok beck@ miod@ "+ shivers"
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
cpu's specific hardware capabilities users of libcrypto might be interested
in, as an integer value. This deprecates the existing OPENSSL_ia32cap()
macro and the OPENSSL_ia32cap_loc() function (which returns the pointer so
that you can mess with stuff you shouldn't mess with).
Interpreting the value returned by OPENSSL_cpu_caps() is, of course,
machine-dependent.
Minor version bump for libcrypto.
ok beck@ jsing@
|
|
|
|
|
|
|
|
| |
then decrement it and call a callback on exit from the function. As such,
these functions should not return in the middle, otherwise in_handshake is
never decremented and the callback never called.
ok beck@ "with many sighs" miod@
|
|
|
|
|
|
| |
over CHACHA20. Otherwise, prefer CHACHA20 with AES second.
ok beck@ miod@
|
|
|
|
|
|
|
|
|
| |
functions. The original was written as a huge if/else if chain -
split out the handling for each key exchange type. This allows us to reduce
two levels of indentation, make the code far more readable and have single
return paths so that we can simplify clean up.
ok beck@
|
| |
|
| |
|
|
|
|
| |
ok miod@
|
| |
|
|
|
|
|
|
|
| |
We can now assume >= TLS v1.0 since SSL2_VERSION, SSL3_VERSION and
DTLS1_BAD_VER support was removed.
"reads ok" miod@
|
|
|
|
| |
code deduped.
|
|
|
|
|
|
|
| |
ssl3_handshake_msg_hdr_len() function. Use this to correct several places
that have magic numbers with header lengths hardcoded as '4'.
ok beck@
|
|
|
|
| |
lines of code, while gaining SIGALGs support.
|
|
|
|
| |
lines of code, while gaining bug fixes and SIGALGs support.
|
| |
|
| |
|
| |
|
|
|
|
| |
ok beck@
|
|
|
|
|
| |
ssl3_send_client_verify() is different, but it correctly supports things
like SIGALGS. Another 74 lines of code bites the dust.
|
|
|
|
|
|
|
|
| |
ssl3_send_client_key_exchange() is effectively identical, in fact it has
a number of bug fixes and improvements that never got merged into the
DTLS copy of the code. Flenses another 264 lines of code.
ok beck@
|
|
|
|
| |
ok bcook@ beck@ miod@
|
|
|
|
| |
state after calling ssl3_handshake_msg_finish().
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
ssl3_ prefix.
ok beck@
|
|
|
|
| |
ok beck@
|
|
|
|
| |
ok "flensing knife"
|