Age | Commit message (Collapse) | Author |
|
excluding interface changes that don't apply to LibreSSL,
except that i left the confusing discussion of RETURN VALUES
completely unchanged, to warn users that this is a mess:
OpenSSL first published this interface, then later changed
its syntax and semantics in multiple ways.
|
|
cleanup, including the removal of a dead code path.
ok beck@
|
|
|
|
In the SYNOPSIS, show function prototypes rather than macro definitions.
Delete the useless NOTES section header.
|
|
majors appropriately
|
|
constraints, in order to force the union to have the same constraint,
use the actual type instead of `double'. And add a comment explaining why we
want such an alignment in there.
ok beck@
|
|
From Markus Uhlin <markus.uhlin at bredband dot net>
ok beck@ bcooK@
|
|
ok beck@
|
|
this code path.
ok beck@ bcook@
|
|
ssl3_send_server_key_exchange().
ok beck@ bcook@
|
|
MEDIUM.
ok beck@ bcook@
|
|
this.
ok beck@ bcook@
|
|
ok beck@
|
|
|
|
Simply return since there is nothing more to do.
Spotted by coverity. ok jsing@ beck@
|
|
make it easier to do further clean up.
ok beck@ miod@
|
|
libraries, in particular considering that there are unrelated
files in doc/; requested by jsing@ and beck@
|
|
|
|
|
|
in the process. This also fixes a long standing bug where
tls1_ec_curve_id2nid() is called with only one byte of the curve ID.
ok beck@ miod@
|
|
ok guenther@
|
|
that's what it really is.
ok miod@
|
|
ok beck@
|
|
ok jsing@ beck@
|
|
ok jsing@
|
|
declared in the public headers, and use __{BEGIN,END}_HIDDEN_DECLS
in the internal headers to optimize internal functions
ok jsing@
|
|
functions.. document with a man page.
bump majors on libtls, libssl, libcrypto
ok jsing@ guenther@
|
|
three functions that were removed a while ago
ok jsing@
|
|
ok jsing@
|
|
addresses two 2038 related issues and also adds support for allocation in
the i2d function, which will allow for simplification in the callers.
ok beck@ miod@
|
|
ok beck@
|
|
records, otherwise a peer can potentially cause us to loop indefinately.
Return with an SSL_ERROR_WANT_READ instead, so that the caller can choose
when they want to handle further processing for this connection.
ok beck@ miod@
|
|
ok beck@ (who was struggling to keep lunch down while reviewing the diff)
|
|
code for improved readability, however it also address two issues.
The first of these is a hard-to-hit double free that will occur if
EVP_DigestInit_ex() fails. To avoid this and to be more robust, ensure
that tls1_digest_cached_records() either completes successfully and sets
up all of the necessary digests, or it cleans up and frees everything
that was allocated.
The second issue is that EVP_DigestUpdate() can fail - detect and handle
this in tls1_finish_mac() and change the return type to an int so that a
failure can be propagated to the caller (the callers still need to be
fixed to handle this, in a later diff).
The double-free was reported by Matthew Dillon.
ok beck@ doug@ miod@
|
|
macros. Only change in generated assembly is due to line numbering.
|
|
|
|
|
|
|
|
change to generated assembly results from a difference in line numbers.
|
|
|
|
and more importantly they do not provide PFS (if you want to use ECDH, use
ECDHE instead).
With input from guenther@.
ok deraadt@ guenther@
|
|
based on openssl commit a5184a6c89ff954261e73d1e8691ab73b9b4b2d4
ok bcook@
|
|
fails or the HMAC check fails.
Noted independently by jsing@ and Kurt Cancemi (kurt (at) x64architecture.com)
ok bcook@
|
|
ok bcook@
|
|
repeatedly renegotiating and sending OCSP Status Request TLS extensions.
Fix based on OpenSSL.
|
|
Flip pointer comparison logic to avoid beyond-end-of-buffer pointers
to make it less likely a compiler will decide to screw you.
Based on parts of openssl commits
6f35f6deb5ca7daebe289f86477e061ce3ee5f46 and
89c2720298f875ac80777da2da88a64859775898
ok jsing@
|
|
chooses a different HMAC algorithm.
Avert memory leaks if the callback preps the HMAC in some way.
Based on openssl commit 1bbe48ab149893a78bf99c8eb8895c928900a16f
but retaining a pre-callback length check to guarantee the callback
is provided the buffer that the API claims.
ok bcook@ jsing@
|
|
from OpenSSL:
SSL_set_SSL_CTX is normally called for SNI after ClientHello has
received and the digest to use for each certificate has been decided.
The original ssl->cert contains the negotiated digests and is now
copied to the new ssl->cert.
noted by David Benjamin and Kinichiro Inoguchi
|
|
moved.
from Patrick Wildt
|
|
avoids permission problems due to the build and install stages being run
by different users.
ok deraadt jasper
|