summaryrefslogtreecommitdiff
path: root/lib/libssl
AgeCommit message (Collapse)Author
2015-09-02Replace dtls1_client_hello() with ssl3_client_hello() - both are basicallyJoel Sing
the same code, with two slight differences for DTLS handling. Also, make use of send_cookie to determine if the client random needs to be preserved, rather than testing if it is zeroed (hopefully your random number generator never returned all zeros, since the existing code would break). Inspired by BoringSSL. ok doug@
2015-09-02Fewer magic numbers - we already have defines for the header lengths, soJoel Sing
make use of them. ok doug@
2015-09-01Remove duplicate prototype for SSL_get_selected_srtp_profile().Joel Sing
From Aaron Burghardt.
2015-09-01Remove the ssl_prepare_{client,server}hello_tlsext() functions, which areJoel Sing
now nothing more than noops. ok bcook@ doug@
2015-09-01Make it always safe to call CBB_cleanup() providing that CBB_init() orJoel Sing
CBB_init_fixed() have been attempted. ok doug@
2015-08-29Now that SSLv3 is going away, TLS_* and SSLv23 are equivalent.Doug Hogan
Remove the TLS method data and tls_any_* functions. Point to SSLv23. ok jsing@
2015-08-29Delete s3_meth.c since it was only for SSLv3 support.Doug Hogan
ok jsing@
2015-08-29Remove SSLv3 method data structs and unlink s3_meth.c from the build.Doug Hogan
ok jsing@
2015-08-28Kill coverity 128475Bob Beck
ok doug@
2015-08-27Change AEAD out_len argument to size_t instead of ssize_t - while here,Joel Sing
rename it to out_len so that its purpose is more obvious. Also, drop two checks that are no longer possible (and have not been for a long time). Spotted by and ok doug@
2015-08-27Crank major version for libssl and libtls due to SSLv3 removal.Doug Hogan
2015-08-27Remove SSLv3 support from LibreSSL.Doug Hogan
This is the first wave of SSLv3 removal which removes the main SSLv3 functions. Future commits will remove the rest of the SSLv3 support. Discussed the plan at c2k15. Input from jsing@, beck@, miod@, bcook@, sthen@, naddy@, and deraadt@. ok jsing@, beck@
2015-08-20bump to 2.3.0 for the next LibreSSL release cycleBrent Cook
2015-08-19Properly handle missing TLS extensions in client hello as a non-failure.Brent Cook
Noticed by @Ligushka from github. ok miod@, doug@
2015-08-18typosMiod Vallat
2015-07-31Fix SRTP parsing.Doug Hogan
jsing@ noticed that during the CBS conversion, an extra CBS_len comparison was introduced. It should be 0 after extracting MKI. ok jsing@ bcook@ deraadt@
2015-07-29Add linker warnings in case SSLv3_{,client,server}_method are referenced.Miod Vallat
Use of this symbols proves the existence of a code path willingly using SSLv3, even with OPENSSL_NO_SSL3 being defined, which hints that it needs fixing. Discussed with the LibreSSL cabal during c2k15; ok deraadt@
2015-07-29Use named initialisers for X509V3_EXT_METHOD structs (for the usualJoel Sing
reasons) - only change in generated assembly is due to line numbering.
2015-07-29Expand obsolete M_ASN1.*(cmp|dup|print|set) macros - no change in generatedJoel Sing
assembly. ok bcook@
2015-07-29Expand obsolete M_ASN1_STRING_* macros in asn1_lib.c, apply some style(9)Joel Sing
and drop an unnecessary return from a void function. ok bcook@ doug@
2015-07-27Less asn1_mac.h - asn1_lib.c does not need it and x_pkey.c should beJoel Sing
using ASN1err() instead of ASN1_MAC_H_err(). ok miod@
2015-07-25double words fix; docs are slowly getting moved to mdoc, but thisIgor Sobrado
change will help people translating them. ok jmc@, schwarze@
2015-07-25Place the ASN.1 template macros (and remaining implement macros) underJoel Sing
#ifndef LIBRESSL_INTERNAL - we're not using these anymore!
2015-07-25Manually expand ASN.1 template macros - only change in generated assemblyJoel Sing
is due to line numbering.
2015-07-25Expand another ASN.1 template macro that snuck through last time around.Joel Sing
No change in generated assembly.
2015-07-25Expand ASN.1 template macros that got missed in the last pass - only changeJoel Sing
to generated assembly is due to line numbers.
2015-07-25Expand ASN.1 template macros - the generated assembly only differs byJoel Sing
changes to line numbers.
2015-07-25Expand ASN.1 template macros - no change in generated assembly.Joel Sing
2015-07-25Expand ASN.1 template macros - no change in generated assembly.Joel Sing
2015-07-25Expand another wall of ASN.1 template macros - no change to generatedJoel Sing
assembly.
2015-07-25Expand ASN.1 template macros - no change in generated assembly.Joel Sing
2015-07-25Expand ASN.1 template macros - no change in generated assembly.Joel Sing
2015-07-25Expand ASN.1 template macros - the generated assembly only differs byJoel Sing
changes to line numbers.
2015-07-24Expand ASN.1 template macros - no change in generated assembly.Joel Sing
2015-07-24Expand ASN.1 template macros - no change in generated assembly.Joel Sing
2015-07-24Expand ASN.1 template macros - the generated assembly only differs byJoel Sing
changes to line numbers.
2015-07-24an TLS -> a TLS; from thanos tsouanasJason McIntyre
2015-07-24Expand ASN1_ITEM_TEMPLATE/ASN1_EX_TEMPLATE_TYPE/ASN1_ITEM_TEMPLATE_ENDJoel Sing
macros - the generated assembly only differs by changes to line numbers.
2015-07-24Expand IMPLEMENT_ASN1_MSTRING macros - the generated assembly only differsJoel Sing
by changes to line numbers.
2015-07-24Convert tls1_process_ticket to CBS.Doug Hogan
ok miod@ jsing@
2015-07-24Convert tls1_process_sigalgs to CBS.Doug Hogan
ok miod@ jsing@
2015-07-24Convert ssl3_get_record to CBS.Doug Hogan
ok miod@ jsing@
2015-07-21Remove duplicate check in libssl.Doug Hogan
If len == 0, it already set try_session_cache so there's no need to check len again. Fixes Coverity issue 21687. ok bcook@
2015-07-20Correct #if/else logic in BIO's dgram_ctrl.Doug Hogan
Coverity issue 72741 noticed that ret is being overwritten before use. The actual issue is that the #if/else logic is guarding the wrong lines. Besides impacting ret, this also made the case's break logic wrong because it was in the wrong location. ok bcook@ beck@
2015-07-20prefer string.h to strings.h ok guenther@ doug@Brent Cook
2015-07-20Various memory leaks upon error or unchecked allocations.Miod Vallat
ok doug@
2015-07-20Use V_ASN1_UNDEF instead of -1.Miod Vallat
Make sure ASN1_primitive_new() will return NULL in *pval in all error situations. ok bcook@ doug@
2015-07-20Check the return value of asn1_enc_save(). ok bcook@ doug@Miod Vallat
2015-07-20When freeing an X509_CRL, if freeing the user-maintained meth_data fails,Miod Vallat
do not forgot to nevertheless keep freeing the other fields. ok doug@ guenther@
2015-07-20In X509_PKEY_new(), make sure all allocation failures push an error to theMiod Vallat
error stack, not only the first one. ok guenther@ doug@