#
1ef70f4f |
| 18-Jan-2025 |
tb <tb@openbsd.org> |
Remove SSL_DES and SSL_IDEA remnants
ok jsing
|
#
2bba40d4 |
| 18-Jan-2025 |
tb <tb@openbsd.org> |
Remove last uses of SSL_aDSS
ok jsing
|
#
c388d242 |
| 31-Aug-2024 |
jsing <jsing@openbsd.org> |
Update for OPENSSL_cpu_caps() now being machine independent.
ok tb@
|
#
849d353b |
| 31-Aug-2024 |
tb <tb@openbsd.org> |
Remove SSL_add_compression_method
|
#
ae0a2582 |
| 23-Jul-2024 |
jsing <jsing@openbsd.org> |
Remove get_cipher from SSL_METHOD.
Inline the get_cipher implementation (including the special handling for DTLS) in ssl_cipher_collect_ciphers() (the only consumer), remove the get_cipher member of
Remove get_cipher from SSL_METHOD.
Inline the get_cipher implementation (including the special handling for DTLS) in ssl_cipher_collect_ciphers() (the only consumer), remove the get_cipher member of SSL_METHOD and mop up dtls1_get_cipher().
ssl3_get_cipher() has always had a strange property of being a reverse index, which is relied on by the cipher list ordering code, since it currently assumes that high cipher suite values are preferable. Rather than complicating ssl3_get_cipher() (and regress), change the iteration order in ssl_cipher_collect_ciphers() to match what it requires. Lastly, rename ssl3_get_cipher() to be more descriptive.
ok tb@
show more ...
|
#
f4fe6251 |
| 22-Jul-2024 |
jsing <jsing@openbsd.org> |
Use cipher suite values instead of IDs.
OpenSSL has had the concept of cipher IDs, which were a way of working around overlapping cipher suite values between SSLv2 and SSLv3. Given that we no longer
Use cipher suite values instead of IDs.
OpenSSL has had the concept of cipher IDs, which were a way of working around overlapping cipher suite values between SSLv2 and SSLv3. Given that we no longer have to deal with this issue, replace the use of IDs with cipher suite values. In particular, this means that we can stop mapping back and forth between the two, simplifying things considerably.
While here, remove the 'valid' member of the SSL_CIPHER. The ssl3_ciphers[] table is no longer mutable, meaning that ciphers cannot be disabled at runtime (and we have `#if 0' if we want to do it at compile time).
Clean up the comments and add/update RFC references for cipher suites.
ok tb@
show more ...
|
#
387303bb |
| 20-Jul-2024 |
jsing <jsing@openbsd.org> |
Remove cipher from SSL_SESSION.
For a long time SSL_SESSION has had both a cipher ID and a pointer to an SSL_CIPHER (and not both are guaranteed to be populated). There is also a pointer to an SSL_C
Remove cipher from SSL_SESSION.
For a long time SSL_SESSION has had both a cipher ID and a pointer to an SSL_CIPHER (and not both are guaranteed to be populated). There is also a pointer to an SSL_CIPHER in the SSL_HANDSHAKE that denotes the cipher being used for this connection. Some code has been using the cipher from SSL_SESSION and some code has been using the cipher from SSL_HANDSHAKE.
Remove cipher from SSL_SESSION and use the version in SSL_HANDSHAKE everywhere. If resuming from a session then we need to use the SSL_SESSION cipher ID to set the SSL_HANDSHAKE cipher. And we still need to ensure that we update the cipher ID in the SSL_SESSION whenever the SSL_HANDSHAKE cipher changes (this only occurs in a few places).
ok tb@
show more ...
|
#
eb67a850 |
| 16-Jul-2024 |
jsing <jsing@openbsd.org> |
Clean up SSL_HANDSHAKE_MAC_DEFAULT.
The handshake MAC needs to be upgraded when TLSv1.0 and TLSv1.1 ciphersuites are used with TLSv1.2. Since we no longer support TLSv1.0 and TLSv1.1, we can simply
Clean up SSL_HANDSHAKE_MAC_DEFAULT.
The handshake MAC needs to be upgraded when TLSv1.0 and TLSv1.1 ciphersuites are used with TLSv1.2. Since we no longer support TLSv1.0 and TLSv1.1, we can simply upgrade the handshake MAC in the ciphersuite table and remove the various defines/macros/code that existed to handle the upgrade.
ok tb@
show more ...
|
#
39d7e165 |
| 14-Jul-2024 |
tb <tb@openbsd.org> |
Prepare to provide SSL_CIPHER_get_handshake_digest()
Needed by newer freeradius. This is a straightforward implementation that essentially duplicates tls13_cipher_hash().
ok jsing
|
#
1a00c28e |
| 09-May-2024 |
tb <tb@openbsd.org> |
ssl_ciph.c: unwrap a line
|
#
8dd2cd25 |
| 09-May-2024 |
tb <tb@openbsd.org> |
Remove leftover logic of SSL2 support
SSL2_CF_8_BYTE_ENC was set by things such as RC4_64_WITH_MD5, which fell victim to tedu's axe a decade ago. Zap that.
ok jsing
|
#
47628128 |
| 02-Mar-2024 |
tb <tb@openbsd.org> |
Remove SSL_CIPHER_get_by_{id,value}()
While this undocumented API would have been much nicer and saner than SSL_CIPHER_find(), nothing used this except for the exporter test. Let's get rid of it aga
Remove SSL_CIPHER_get_by_{id,value}()
While this undocumented API would have been much nicer and saner than SSL_CIPHER_find(), nothing used this except for the exporter test. Let's get rid of it again. libssl uses ssl3_get_cipher_by_{id,value}() directly.
ok jsing
show more ...
|
#
689a9b7e |
| 03-Feb-2024 |
beck <beck@openbsd.org> |
Remove GOST and STREEBOG support from libssl.
This version of GOST is old and not anywhere close to compliant with modern GOST standards. It is also very intrusive in libssl and makes a mess everywh
Remove GOST and STREEBOG support from libssl.
This version of GOST is old and not anywhere close to compliant with modern GOST standards. It is also very intrusive in libssl and makes a mess everywhere. Efforts to entice a suitably minded anyone to care about it have been unsuccessful.
At this point it is probably best to remove this, and if someone ever showed up who truly needed a working version, it should be a clean implementation from scratch, and have it use something closer to the typical API in libcrypto so it would integrate less painfully here.
This removes it from libssl in preparation for it's removal from libcrypto with a future major bump
ok tb@
show more ...
|
#
fe1adf5a |
| 04-Jan-2024 |
tb <tb@openbsd.org> |
Remove last external call to EVP_PKEY_meth_find()
In order to determine whether GOST is properly enabled, libssl has various weird dances. In this specific case, it calls EVP_PKEY_meth_find() to see
Remove last external call to EVP_PKEY_meth_find()
In order to determine whether GOST is properly enabled, libssl has various weird dances. In this specific case, it calls EVP_PKEY_meth_find() to see whether the relevant cipher is around. Check the same thing with an #ifdef instead.
ok jsing
show more ...
|
#
da5b25ce |
| 19-Nov-2023 |
tb <tb@openbsd.org> |
Unifdef OPENSSL_NO_ENGINE in libssl
As usual, a few manual fixes to avoid duplicate lines.
ok jsing
|
#
71e04849 |
| 08-Jul-2023 |
beck <beck@openbsd.org> |
Hide all public symbols in libssl
With the guentherizer 9000
ok tb@
|
#
c9675a23 |
| 26-Nov-2022 |
tb <tb@openbsd.org> |
Make internal header file names consistent
Libcrypto currently has a mess of *_lcl.h, *_locl.h, and *_local.h names used for internal headers. Move all these headers we inherited from OpenSSL to *_l
Make internal header file names consistent
Libcrypto currently has a mess of *_lcl.h, *_locl.h, and *_local.h names used for internal headers. Move all these headers we inherited from OpenSSL to *_local.h, reserving the name *_internal.h for our own code. Similarly, move dtls_locl.h and ssl_locl.h to dtls_local and ssl_local.h. constant_time_locl.h is moved to constant_time.h since it's special.
Adjust all .c files in libcrypto, libssl and regress.
The diff is mechanical with the exception of tls13_quic.c, where #include <ssl_locl.h> was fixed manually.
discussed with jsing, no objection bcook
show more ...
|
#
8319bb50 |
| 08-Sep-2022 |
millert <millert@openbsd.org> |
ssl_cipher_process_rulestr: return early if a cipher command is invalid This is a safer fix for the bug where we might read outside rule_str buffer and is how BoringSSL fixed it. OK tb@
|
#
cce5ad9f |
| 07-Sep-2022 |
millert <millert@openbsd.org> |
ssl_cipher_process_rulestr: don't read outside rule_str buffer If rule_str ended in a "-", "l" was incremented one byte past the end of the buffer. This resulted in an out-of-bounds read when "l" is
ssl_cipher_process_rulestr: don't read outside rule_str buffer If rule_str ended in a "-", "l" was incremented one byte past the end of the buffer. This resulted in an out-of-bounds read when "l" is dereferenced at the end of the loop. OK tb@
show more ...
|
#
600de797 |
| 04-Sep-2022 |
tb <tb@openbsd.org> |
Make ssl_create_cipher_list() have a single exit
This simplifies memory management and makes it easier to see the leak that were introduced in the previous commit. Sprinkle a few malloc errors for c
Make ssl_create_cipher_list() have a single exit
This simplifies memory management and makes it easier to see the leak that were introduced in the previous commit. Sprinkle a few malloc errors for consistency.
CID 278396
with/ok jsing
show more ...
|
#
bcee1a6c |
| 01-Sep-2022 |
tb <tb@openbsd.org> |
Check sk_SSL_CIPHER_push() return value
CID 24797
ok jsing
|
#
96d3ead6 |
| 30-Aug-2022 |
tb <tb@openbsd.org> |
Remove a commented-out sk_push that has been hanging around for > 20 years
|
#
476fd43a |
| 29-Jun-2022 |
tb <tb@openbsd.org> |
Remove a confusing comment
discussed with jsing
|
#
c81ec4ff |
| 29-Jun-2022 |
tb <tb@openbsd.org> |
Parse the @SECLEVEL=n annotation in cipher strings
To this end, hand the SSL_CERT through about 5 levels of indirection to set an integer on it.
ok beck jsing
|
#
8043fa60 |
| 05-Mar-2022 |
bket <bket@openbsd.org> |
Fix typo in comment
OK tb@
|