- 07 6月, 2012 1 次提交
-
-
由 Ben Laurie 提交于
-
- 30 5月, 2012 1 次提交
-
-
由 Ben Laurie 提交于
-
- 24 4月, 2012 3 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed by: steve Improved localisation of TLS extension handling and code tidy.
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 18 4月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 22 2月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Move new structure fields to end of structures.
-
- 10 2月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Fix encoding of use_srtp extension to be compliant with RFC5764
-
- 26 1月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
New function ssl_add_cert_chain which adds a certificate chain to SSL internal BUF_MEM. Use this function in ssl3_output_cert_chain and dtls1_output_cert_chain instead of partly duplicating code.
-
- 05 1月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 04 1月, 2012 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 01 1月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reviewed by: steve Support for TLS/DTLS heartbeats.
-
- 16 11月, 2011 2 次提交
-
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-
- 12 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Make sure message is long enough for signature algorithms.
-
- 09 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
algorithms extension (including everything we support). Swicth to new signature format where needed and relax ECC restrictions. Not TLS v1.2 client certifcate support yet but client will handle case where a certificate is requested and we don't have one.
-
- 30 4月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
OPENSSL_NO_SSL_INTERN all ssl related structures are opaque and internals cannot be directly accessed. Many applications will need some modification to support this and most likely some additional functions added to OpenSSL. The advantage of this option is that any application supporting it will still be binary compatible if SSL structures change.
-
- 17 3月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 13 3月, 2011 1 次提交
-
-
由 Ben Laurie 提交于
-
- 28 7月, 2010 1 次提交
-
-
由 Ben Laurie 提交于
-
- 07 1月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
1. Add provisional SCSV value. 2. Don't send SCSV and RI at same time. 3. Fatal error is SCSV received when renegotiating.
-
- 01 1月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
algorithm matches current and give error if compression is disabled and server requests it (shouldn't happen unless server is broken).
-
- 31 12月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
used compression algorithms in client hello (a legacy from when the compression algorithm wasn't serialized with SSL_SESSION).
-
- 09 12月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 18 11月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 10 11月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 06 9月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 26 8月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Approved by: steve@openssl.org Do not use multiple DTLS records for a single user message
-
- 13 8月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Make error name discrepancies a fatal error. Fix error codes. make update
-
- 15 7月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 06 4月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 27 12月, 2008 2 次提交
-
-
由 Ben Laurie 提交于
(Coverity ID 140).
-
由 Ben Laurie 提交于
-
- 16 11月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Jouni Malinen <j@w1.fi> Approved by: steve@openssl.org Ticket override support for EAP-FAST.
-
- 14 8月, 2008 1 次提交
-
-
由 Bodo Möller 提交于
PR: 1679
-
- 05 8月, 2008 1 次提交
-
-
由 Bodo Möller 提交于
Also, get rid of compile-time switch OPENSSL_NO_RELEASE_BUFFERS because it was rather pointless (the new behavior has to be explicitly requested by setting SSL_MODE_RELEASE_BUFFERS anyway).
-
- 02 6月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 27 10月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 26 10月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
of handshake failure 2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH (required for s3_srvr to accept GOST client certificates). 3. Changes to EVP - adding of function EVP_PKEY_CTX_get0_peerkey - Make function EVP_PKEY_derive_set_peerkey work for context with ENCRYPT operation, because we use peerkey field in the context to pass non-ephemeral secret key to GOST encrypt operation. - added EVP_PKEY_CTRL_SET_IV control command. It is really GOST-specific, but it is used in SSL code, so it has to go in some header file, available during libssl compilation 4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data 5. Include des.h if KSSL_DEBUG is defined into some libssl files, to make debugging output which depends on constants defined there, work and other KSSL_DEBUG output fixes 6. Declaration of real GOST ciphersuites, two authentication methods SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST 7. Implementation of these methods. 8. Support for sending unsolicited serverhello extension if GOST ciphersuite is selected. It is require for interoperability with CryptoPro CSP 3.0 and 3.6 and controlled by SSL_OP_CRYPTOPRO_TLSEXT_BUG constant. This constant is added to SSL_OP_ALL, because it does nothing, if non-GOST ciphersuite is selected, and all implementation of GOST include compatibility with CryptoPro. 9. Support for CertificateVerify message without length field. It is another CryptoPro bug, but support is made unconditional, because it does no harm for draft-conforming implementation. 10. In tls1_mac extra copy of stream mac context is no more done. When I've written currently commited code I haven't read EVP_DigestSignFinal manual carefully enough and haven't noticed that it does an internal digest ctx copying. This implementation was tested against 1. CryptoPro CSP 3.6 client and server 2. Cryptopro CSP 3.0 server
-