summaryrefslogtreecommitdiff
path: root/lib
AgeCommit message (Collapse)Author
2022-06-30To figure our whether a large allocation can be grown into thePhilip Guenther
following page(s) we've been first mquery()ing for it, mmapp()ing w/o MAP_FIXED if available, and then munmap()ing if there was a race. Instead, just try it directly with mmap(MAP_FIXED | __MAP_NOREPLACE) tested in snaps for weeks ok deraadt@
2022-06-30Remove redundant commentsTheo Buehler
discussed with jsing
2022-06-30Check security level for supported groups.Theo Buehler
ok jsing
2022-06-30Rename variable from tls_version to version since it could also beTheo Buehler
a DTLS version at this point.
2022-06-30Check whether the security level allows session tickets.Theo Buehler
ok beck jsing
2022-06-30Add checks to ensure we do not initiate or negotiate handshakes withTheo Buehler
versions below the minimum required by the security level. input & ok jsing
2022-06-30Replace obj_mac.h with object.hTheo Buehler
Pointed out by and ok jsing
2022-06-30Rename use_* to ssl_use_* for consistency.Theo Buehler
discussed with jsing
2022-06-30whitespace nitTheo Buehler
2022-06-30Remove obj_mac.h include. Requested by jsingTheo Buehler
2022-06-29Don't check the signature if a cert is self signed.Theo Buehler
ok beck jsing
2022-06-29Make ssl_cert_add{0,1}_chain_cert() take ssl/ctxTheo Buehler
ok beck jsing
2022-06-29ssl_cert_set{0,1}_chain() take ssl/ctxTheo Buehler
ok beck jsing
2022-06-29Add a security check to ssl_set_cert()Theo Buehler
ok beck jsing
2022-06-29Make ssl_set_{cert,pkey} take an ssl/ctxTheo Buehler
ok beck jsing
2022-06-29Refactor use_certificate_chain_* to take ssl/ctx instead of a certTheo Buehler
ok beck jsing
2022-06-29Add functions that check security level in certs and cert chains.Theo Buehler
ok beck jsing
2022-06-29Make sure the verifier checks the security level in cert chainsTheo Buehler
ok beck jsing
2022-06-29Remove a confusing commentTheo Buehler
discussed with jsing
2022-06-29Parse the @SECLEVEL=n annotation in cipher stringsTheo Buehler
To this end, hand the SSL_CERT through about 5 levels of indirection to set an integer on it. ok beck jsing
2022-06-29Add support for sending QUIC transport parametersBob Beck
This is the start of adding the boringssl API for QUIC support, and the TLS extensions necessary to send and receive QUIC transport data. Inspired by boringssl's https://boringssl-review.googlesource.com/24464 ok jsing@ tb@
2022-06-29whitespace nitTheo Buehler
2022-06-29missing blank lineTheo Buehler
2022-06-29Refactor asn1 time parsing to use CBS - enforce valid times in ASN.1 parsing.Bob Beck
While we're here enforce valid days for months and leap years. Inspired by same in boringssl. ok jsing@
2022-06-29Also check the security level in SSL_get1_supported_ciphersTheo Buehler
ok beck jsing
2022-06-29Check security level when convertin a cipher list to bytesTheo Buehler
ok beck jsing
2022-06-29Also check the security level when choosing a shared cipherTheo Buehler
ok beck jsing
2022-06-29There's tentacles, tentacles everywhereTheo Buehler
ok beck jsing
2022-06-29Also check the security level of the 'tmp dh'Theo Buehler
ok beck jsing
2022-06-29Check the security of DH key sharesTheo Buehler
ok beck, looks good to jsing
2022-06-29Rename one s to ssl for consistencyTheo Buehler
2022-06-29Check sigalg security level when selecting them.Theo Buehler
ok beck jsing
2022-06-29Check the security bits of the sigalgs' pkeyTheo Buehler
ok beck jsing
2022-06-29Check the security level when building sigalgsTheo Buehler
ok beck jsing
2022-06-29Annotate sigalgs with their security level.Theo Buehler
ok beck jsing
2022-06-28Add prototypes for ssl{_ctx,}_security()Theo Buehler
ok beck jsing sthen
2022-06-28Add error code definsTheo Buehler
ok beck jsing sthen
2022-06-28Add a period to a commentTheo Buehler
Pointed out by jsing
2022-06-28Security level >= 3 requires a ciphersuite with PFSTheo Buehler
ok beck jsing sthen
2022-06-28Add a secop handler for tmp_dhTheo Buehler
This disallows DHE keys weaker than 1024 bits at level 0 to match OpenSSL behavior. ok beck jsing sthen
2022-06-28Add security level related error codes.Theo Buehler
ok beck jsing sthen
2022-06-28Sort error stringsTheo Buehler
ok beck jsing sthen
2022-06-28Implement ssl{,_ctx}_security()Theo Buehler
ok beck jsing sthen
2022-06-28Copy the security level stuff in ssl_cert_dup()Theo Buehler
ok beck jsing sthen
2022-06-28Set up the default callback in SSL_CERTTheo Buehler
ok beck jsing sthen
2022-06-28Implement the default security level callbackTheo Buehler
And here is where the fun starts. The tentacles will grow everywhere. ok beck jsing sthen
2022-06-28Provide OPENSSL_TLS_SECURITY_LEVEL defineTheo Buehler
ok beck jsing sthen
2022-06-28Implement SSL_{CTX_}_{g,s}et_security_level(3)Theo Buehler
ok beck jsing sthen
2022-06-28Add security callback, level and ex_data fields to SSL_CERTTheo Buehler
ok beck jsing sthen
2022-06-28Add #defines and prototypes for security level APITheo Buehler
This marks the start of one of the worst API additions in the history of this library. And as everybody knows the bar is high. Very high. ok beck jsing sthen