aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* Make it possible to affect the way dists are madeRichard Levitte2015-12-081-2/+1
| | | | | | | Introducing DISTTARVARS to propagate changed variables down to the tar-making target. Reviewed-by: Rich Salz <rsalz@openssl.org>
* Update NEWSDr. Stephen Henson2015-12-081-1/+2
| | | | Reviewed-by: Matt Caswell <matt@openssl.org>
* Extended master secret test script.Dr. Stephen Henson2015-12-081-0/+273
| | | | Reviewed-by: Matt Caswell <matt@openssl.org>
* Add extms extensionDr. Stephen Henson2015-12-081-0/+1
| | | | Reviewed-by: Matt Caswell <matt@openssl.org>
* TLSProxy updateDr. Stephen Henson2015-12-082-6/+20
| | | | | | Add function to delete extensions and fix ClientHello repacking. Reviewed-by: Matt Caswell <matt@openssl.org>
* update errorsDr. Stephen Henson2015-12-082-0/+2
| | | | Reviewed-by: Matt Caswell <matt@openssl.org>
* Extended master secret fixes and checks.Dr. Stephen Henson2015-12-084-20/+77
| | | | | | | | | | | | Add new flag TLS1_FLAGS_RECEIVED_EXTMS which is set when the peer sends the extended master secret extension. Server now sends extms if and only if the client sent extms. Check consistency of extms extension when resuming sessions following (where practical) RFC7627. Reviewed-by: Matt Caswell <matt@openssl.org>
* Fix merge errorMatt Caswell2015-12-081-4/+4
| | | | | | | | Commit 6140f0365 added some new ctrl constants. However due to a merge error one of these values was duplicated with an existing value. Reviewed-by: Rich Salz <rsalz@openssl.org>
* Add some new cipher ctrl constantsDmitry Belyavskiy2015-12-081-0/+21
| | | | | | | These are needed for GOST Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org>
* Cleanup the EVP_MD_CTX before exit rather than afterRichard Levitte2015-12-081-1/+1
| | | | Reviewed-by: Matt Caswell <matt@openssl.org>
* Remove double semi (;)Richard Levitte2015-12-081-1/+1
| | | | | | When in the middle of declarations, some C compilers will complain. Reviewed-by: Matt Caswell <matt@openssl.org>
* Remove typedef of HMAC_CTX from crypto/hmac/hmac_lcl.hRichard Levitte2015-12-071-2/+2
| | | | | | This is already defined in include/openssl/ossl_typ.h. Reviewed-by: Matt Caswell <matt@openssl.org>
* Fix clang complaints about uninitialised variables.Richard Levitte2015-12-073-7/+7
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Change tar owner and group to just 0Richard Levitte2015-12-071-1/+1
| | | | | | | | | It seems like some tar versions don't like the name:id form for --owner and --group. The closest known anonymous user being 0 (root), that seems to be the most appropriate user/group to assign ownership to. It matters very little when unpacking either way. Reviewed-by: Rich Salz <rsalz@openssl.org>
* Add an entry in CHANGESRichard Levitte2015-12-071-0/+22
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Document EVP_MD constructors, destructors and manipulatorsRichard Levitte2015-12-071-0/+160
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Document the HMAC changesRichard Levitte2015-12-071-13/+24
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Document the EVP_MD_CTX changesRichard Levitte2015-12-075-43/+43
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* make updateRichard Levitte2015-12-074-22/+58
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Cleanup: fix all sources that used HMAC_CTX_initRichard Levitte2015-12-073-6/+6
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Cleanup: rename HMAC_CTX_init to HMAC_CTX_resetRichard Levitte2015-12-072-3/+3
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Cleanup: support EVP_MD_CTX_(create|init|destroy) for deprecated useRichard Levitte2015-12-071-0/+5
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Cleanup: fix all sources that used EVP_MD_CTX_(create|init|destroy)Richard Levitte2015-12-0747-182/+181
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Cleanup: rename EVP_MD_CTX_(create|init|destroy) to EVP_MD_CTX_(new|reset|free)Richard Levitte2015-12-073-15/+15
| | | | | | | | | Looking over names, it seems like we usually use names ending with _new and _free as object constructors and destructors. Also, since EVP_MD_CTX_init is now used to reset a EVP_MD_CTX, it might as well be named accordingly. Reviewed-by: Rich Salz <rsalz@openssl.org>
* Cleanup: Remove M_EVP_MD_* macrosRichard Levitte2015-12-071-9/+0
| | | | | | | These macros were only meant for crypto/evp, and are now entirely unused. Reviewed-by: Rich Salz <rsalz@openssl.org>
* Adapt the rest of the source to the removal of (EVP_MD_CTX|HMAC_CTX)_cleanupRichard Levitte2015-12-076-10/+8
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Remove HMAC_CTX_cleanup and combine its functionality into EVP_MD_CTX_initRichard Levitte2015-12-072-19/+18
| | | | | | | This follows the same idea as the combination of EVP_MD_CTX_cleanup and EVP_MD_CTX_init into one function. Reviewed-by: Rich Salz <rsalz@openssl.org>
* Remove EVP_MD_CTX_cleanup and put its functionality into EVP_MD_CTX_initRichard Levitte2015-12-072-54/+45
| | | | | | | | | | | The idea is that with EVP_MD_CTX_create() and EVP_MD_CTX_destroy(), EVP_MD_CTX_cleanup and EVP_MD_CTX_init is not used the same as before. Instead, we need a single function that can be used to reinitialise an existing EVP_MD_CTX that's been created with EVP_MD_CTX_create() previously. Combining EVP_MD_CTX_cleanup and EVP_MD_CTX_init into that one function is the answer. Reviewed-by: Rich Salz <rsalz@openssl.org>
* Adapt the rest of the source to the opaque HMAC_CTXRichard Levitte2015-12-077-92/+118
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Make the definition of HMAC_CTX opaqueRichard Levitte2015-12-075-27/+123
| | | | | | | This moves the definition to crypto/hmac/hmac_lcl.h. Constructor and destructor added, and the typedef moved to include/openssl/ossl_typ.h. Reviewed-by: Rich Salz <rsalz@openssl.org>
* Add inclusion of internal/evp_int.h to all crypto/ files that need itRichard Levitte2015-12-0717-2/+19
| | | | | | These are the files that add new EVP_MDs. Reviewed-by: Rich Salz <rsalz@openssl.org>
* Adapt all engines that add new EVP_MDsRichard Levitte2015-12-078-155/+347
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Have the few apps that accessed EVP_MD directly use accessors insteadRichard Levitte2015-12-072-2/+2
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Make the definition of EVP_MD opaqueRichard Levitte2015-12-074-15/+178
| | | | | | | | | This moves the definition to crypto/include/internal/evp_int.h and defines all the necessary method creators, destructors, writers and accessors. The name standard for the latter is inspired from the corresponding functions to manipulate UI methods. Reviewed-by: Rich Salz <rsalz@openssl.org>
* Adjust all accesses to EVP_MD_CTX to use accessor functions.Richard Levitte2015-12-0755-574/+746
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Document the changed HMAC API.Richard Levitte2015-12-071-4/+6
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Adapt HMAC to the EVP_MD_CTX changesRichard Levitte2015-12-0710-44/+70
| | | | | | | | | | | | | This change required some special treatment, as HMAC is intertwined with EVP_MD. For now, all local HMAC_CTX variables MUST be initialised with HMAC_CTX_EMPTY, or whatever happens to be on the stack will be mistaken for actual pointers to EVP_MD_CTX. This will change as soon as HMAC_CTX becomes opaque. Also, since HMAC_CTX_init() can fail now, its return type changes from void to int, and it will return 0 on failure, 1 on success. Reviewed-by: Rich Salz <rsalz@openssl.org>
* Have other crypto/evp files include evp_locl.hRichard Levitte2015-12-078-77/+108
| | | | | | | Note: this does not include the files in crypto/evp that are just instanciations of EVP_MD. Reviewed-by: Rich Salz <rsalz@openssl.org>
* Make the definition of EVP_MD_CTX opaqueRichard Levitte2015-12-073-21/+51
| | | | | | | This moves the definitionto crypto/evp/evp_locl.h, along with a few associated accessor macros. A few accessor/writer functions added. Reviewed-by: Rich Salz <rsalz@openssl.org>
* Do not add symlinks in the source releaseRichard Levitte2015-12-071-1/+1
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* In travis, build from a "source release" rather than from the build treeRichard Levitte2015-12-071-0/+6
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Small changes to creating distsRichard Levitte2015-12-071-19/+15
| | | | | | | Make TARFILE include ../ instead of having that hard coded all over the place. When transforming file names in TAR_COMMAND, use $(NAME) instead of openssl-$(VERSION) Reviewed-by: Rich Salz <rsalz@openssl.org>
* Fix and update versions in CHANGES and NEWSDr. Stephen Henson2015-12-072-2/+74
| | | | Reviewed-by: Matt Caswell <matt@openssl.org>
* ARMv4 assembly pack: allow Thumb2 even in iOS build,Andy Polyakov2015-12-0710-12/+20
| | | | | | and engage it in most modules. Reviewed-by: Tim Hudson <tjh@openssl.org>
* Fix typo and improve a bit of textViktor Dukhovni2015-12-061-4/+5
| | | | Reviewed-by: Tim Hudson <tjh@openssl.org>
* Really disable 56-bit (single-DES) ciphersViktor Dukhovni2015-12-062-110/+3
| | | | Reviewed-by: Kurt Roeckx <kurt@openssl.org>
* Remove support for all 40 and 56 bit ciphers.Kurt Roeckx2015-12-0524-1419/+293
| | | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> MR: #364
* Remove SSL_{CTX_}set_ecdh_auto() and always enable ECDHKurt Roeckx2015-12-0412-142/+43
| | | | Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
* Make SSL_{CTX}_set_tmp_ecdh() call SSL_{CTX_}set1_curves()Kurt Roeckx2015-12-048-72/+48
| | | | | | | | SSL_{CTX}_set_tmp_ecdh() allows to set 1 EC curve and then tries to use it. On the other hand SSL_{CTX_}set1_curves() allows you to set a list of curves, but only when SSL_{CTX_}set_ecdh_auto() was called to turn it on. Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
* Remove support for SSL_{CTX_}set_tmp_ecdh_callback().Kurt Roeckx2015-12-049-68/+10
| | | | | | | | This only gets used to set a specific curve without actually checking that the peer supports it or not and can therefor result in handshake failures that can be avoided by selecting a different cipher. Reviewed-by: Dr. Stephen Henson <steve@openssl.org>