aboutsummaryrefslogtreecommitdiff
path: root/ssl/ssl_asn1.c
AgeCommit message (Collapse)AuthorFilesLines
2016-01-26Remove /* foo.c */ commentsRich Salz1-1/+0
This was done by the following find . -name '*.[ch]' | /tmp/pl where /tmp/pl is the following three-line script: print unless $. == 1 && m@/\* .*\.[ch] \*/@; close ARGV if eof; # Close file to reset $. And then some hand-editing of other files. Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
2015-12-16Rename some BUF_xxx to OPENSSL_xxxRich Salz1-2/+2
Rename BUF_{strdup,strlcat,strlcpy,memdup,strndup,strnlen} to OPENSSL_{strdup,strlcat,strlcpy,memdup,strndup,strnlen} Add #define's for the old names. Add CRYPTO_{memdup,strndup}, called by OPENSSL_{memdup,strndup} macros. Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-09-11Enable -Wmissing-variable-declarations andBen Laurie1-1/+1
-Wincompatible-pointer-types-discards-qualifiers (the latter did not require any code changes). Reviewed-by: Rich Salz <rsalz@openssl.org>
2015-05-22Remove support for OPENSSL_NO_TLSEXTMatt Caswell1-14/+0
Given the pervasive nature of TLS extensions it is inadvisable to run OpenSSL without support for them. It also means that maintaining the OPENSSL_NO_TLSEXT option within the code is very invasive (and probably not well tested). Therefore it is being removed. Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org>
2015-05-13Remove Kerberos support from libsslMatt Caswell1-22/+0
Remove RFC2712 Kerberos support from libssl. This code and the associated standard is no longer considered fit-for-purpose. Reviewed-by: Rich Salz <rsalz@openssl.org>
2015-05-05ssl/ssl_asn1.c: Fix typo introduced via cc5b6a03a320f1mancha security1-1/+1
Signed-off-by: mancha security <mancha1@zoho.com> Signed-off-by: Matt Caswell <matt@openssl.org> Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
2015-05-01Remove goto inside an if(0) blockRich Salz1-4/+0
There were a dozen-plus instances of this construct: if (0) { label: ..... } Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-05-01free null cleanup finaleRich Salz1-4/+2
Don't check for NULL before calling OPENSSL_free Reviewed-by: Richard Levitte <levitte@openssl.org>
2015-04-10The wrong ifdef is used to guard usage of PSK codeKurt Cancemi1-1/+1
PR#3790 Reviewed-by: Stephen Henson <steve@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
2015-04-03Rewrite ssl_asn1.c using new ASN.1 code.Dr. Stephen Henson1-439/+275
Complete reimplementation of d2i_SSL_SESSION and i2d_SSL_SESSION using new ASN.1 code and eliminating use of old ASN.1 macros. Reviewed-by: Rich Salz <rsalz@openssl.org>
2015-02-27Fix d2i_SSL_SESSION for DTLS1_BAD_VERMatt Caswell1-1/+3
Some Cisco appliances use a pre-standard version number for DTLS. We support this as DTLS1_BAD_VER within the code. This change fixes d2i_SSL_SESSION for that DTLS version. Based on an original patch by David Woodhouse <dwmw2@infradead.org> RT#3704 Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-02-10Correct reading back of tlsext_tick_lifetime_hint from ASN1.Matt Caswell1-3/+1
When writing out the hint, if the hint > 0, then we write it out otherwise we skip it. Previously when reading the hint back in, if were expecting to see one (because the ticket length > 0), but it wasn't present then we set the hint to -1, otherwise we set it to 0. This fails to set the hint to the same as when it was written out. The hint should never be negative because the RFC states the hint is unsigned. It is valid for a server to set the hint to 0 (this means the lifetime is unspecified according to the RFC). If the server set it to 0, it should still be 0 when we read it back in. Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-02-03Add flags field to SSL_SESSION.Dr. Stephen Henson1-0/+23
Add a "flags" field to SSL_SESSION. This will contain various flags such as encrypt-then-mac and extended master secret support. Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org>
2015-01-22Run util/openssl-format-source -v -c .Matt Caswell1-472/+463
Reviewed-by: Tim Hudson <tjh@openssl.org>
2014-12-04Remove SSLv2 supportKurt Roeckx1-45/+6
The only support for SSLv2 left is receiving a SSLv2 compatible client hello. Reviewed-by: Richard Levitte <levitte@openssl.org>
2014-05-07fix coverity issue 966597 - error line is not always initialisedTim Hudson1-0/+4
2012-06-03Version skew reduction: trivia (I hope).Ben Laurie1-1/+0
2011-10-25Use correct tag for SRP username.Dr. Stephen Henson1-1/+1
2011-09-05Fix d2i_SSL_SESSION.Bodo Möller1-0/+13
2011-03-12Add SRP support.Ben Laurie1-0/+37
2011-02-16Include openssl/crypto.h first in several other files so FIPS renamingDr. Stephen Henson1-0/+1
is picked up.
2010-06-12Fix warnings.Ben Laurie1-2/+1
2010-02-01PR: 2160Dr. Stephen Henson1-2/+2
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Make session tickets work with DTLS.
2009-10-30Generate stateless session ID just after the ticket is received insteadDr. Stephen Henson1-26/+0
of when a session is loaded. This will mean that applications that just hold onto SSL_SESSION structures and never call d2i_SSL_SESSION() will still work.
2009-10-30Fix statless session resumption so it can coexist with SNIDr. Stephen Henson1-6/+13
2009-09-02PR: 2009Dr. Stephen Henson1-4/+4
Submitted by: "Alexei Khlebnikov" <alexei.khlebnikov@opera.com> Approved by: steve@openssl.org Avoid memory leak and fix error reporting in d2i_SSL_SESSION(). NB: although the ticket mentions buffer overruns this isn't a security issue because the SSL_SESSION structure is generated internally and it should never be possible to supply its contents from an untrusted application (this would among other things destroy session cache security).
2009-08-05Update from 1.0.0-stable.Dr. Stephen Henson1-1/+2
2009-06-30Update from 0.9.8-stableDr. Stephen Henson1-1/+34
2008-11-13Aftermath of a clashing size_t fix (now only format changes).Ben Laurie1-1/+1
2008-11-12Revert the size_t modifications from HEAD that had led to moreGeoff Thorpe1-1/+1
knock-on work than expected - they've been extracted into a patch series that can be completed elsewhere, or in a different branch, before merging back to HEAD.
2008-11-01More size_tification.Ben Laurie1-1/+1
2008-09-14Some precautions to avoid potential security-relevant problems.Bodo Möller1-1/+1
2007-10-17Fix from stable branch.Dr. Stephen Henson1-5/+8
2007-08-12Fix warning and make no-tlsext work.Dr. Stephen Henson1-1/+4
2007-08-11RFC4507 (including RFC4507bis) TLS stateless session resumption supportDr. Stephen Henson1-7/+62
for OpenSSL.
2006-04-05Remove ECC extension information from external representationBodo Möller1-64/+5
of the session -- we don't really need it once the handshake has completed.
2006-03-30Implement Supported Elliptic Curves Extension.Bodo Möller1-7/+31
Submitted by: Douglas Stebila
2006-03-26Simplify ASN.1 for point format listBodo Möller1-27/+5
Submitted by: Douglas Stebila
2006-03-13Resolve signed vs. unsigned issuesRichard Levitte1-4/+4
2006-03-11Implement the Supported Point Formats Extension for ECC ciphersuitesBodo Möller1-7/+63
Submitted by: Douglas Stebila
2006-03-10add initial support for RFC 4279 PSK SSL ciphersuitesNils Larsch1-2/+87
PR: 1191 Submitted by: Mika Kousa and Pasi Eronen of Nokia Corporation Reviewed by: Nils Larsch
2006-01-04Fix signed/unsigned char clashes.Richard Levitte1-2/+2
2006-01-02Support TLS extensions (specifically, HostName)Bodo Möller1-1/+36
Submitted by: Peter Sylvester
2005-12-05Avoid warnings on VC++ 2005.Dr. Stephen Henson1-1/+1
2005-04-20Make kerberos ciphersuite code compile again.Dr. Stephen Henson1-5/+5
Avoid more shadow warnings.
2005-04-01use SSL3_VERSION_MAJOR instead of SSL3_VERSION etc.Nils Larsch1-3/+3
PR: 658
2005-03-31Give everything prototypes (well, everything that's actually used).Ben Laurie1-6/+6
2005-03-30Constification.Ben Laurie1-1/+1
2003-12-27Avoid including cryptlib.h, it's not really needed.Richard Levitte1-1/+0
Check if IDEA is being built or not. This is part of a large change submitted by Markus Friedl <markus@openbsd.org>
2003-10-29A general spring-cleaning (in autumn) to fix up signed/unsigned warnings.Geoff Thorpe1-3/+3
I have tried to convert 'len' type variable declarations to unsigned as a means to address these warnings when appropriate, but when in doubt I have used casts in the comparisons instead. The better solution (that would get us all lynched by API users) would be to go through and convert all the function prototypes and structure definitions to use unsigned variables except when signed is necessary. The proliferation of (signed) "int" for strictly non-negative uses is unfortunate.