Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
c6ccf055
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
10
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
c6ccf055
编写于
7月 19, 2002
作者:
L
Lutz Jänicke
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
New cipher selection options COMPLEMENTOFALL and COMPLEMENTOFDEFAULT.
Submitted by: Reviewed by: PR: 127
上级
1649d85d
变更
4
隐藏空白更改
内联
并排
Showing
4 changed file
with
48 addition
and
0 deletion
+48
-0
CHANGES
CHANGES
+5
-0
doc/apps/ciphers.pod
doc/apps/ciphers.pod
+24
-0
ssl/ssl.h
ssl/ssl.h
+17
-0
ssl/ssl_ciph.c
ssl/ssl_ciph.c
+2
-0
未找到文件。
CHANGES
浏览文件 @
c6ccf055
...
@@ -101,6 +101,11 @@
...
@@ -101,6 +101,11 @@
Changes between 0.9.6e and 0.9.7 [XX xxx 2002]
Changes between 0.9.6e and 0.9.7 [XX xxx 2002]
*) Add cipher selection rules COMPLEMENTOFALL and COMPLENENTOFDEFAULT
to allow version independent disabling of normally unselected ciphers,
which may be activated as a side-effect of selecting a single cipher.
[Lutz Jaenicke, Bodo Moeller]
*) Add appropriate support for separate platform-dependent build
*) Add appropriate support for separate platform-dependent build
directories. The recommended way to make a platform-dependent
directories. The recommended way to make a platform-dependent
build directory is the following (tested on Linux), maybe with
build directory is the following (tested on Linux), maybe with
...
...
doc/apps/ciphers.pod
浏览文件 @
c6ccf055
...
@@ -108,10 +108,20 @@ the default cipher list. This is determined at compile time and is normally
...
@@ -108,10 +108,20 @@ the default cipher list. This is determined at compile time and is normally
B<ALL:!ADH:RC4+RSA:+SSLv2:@STRENGTH>. This must be the first cipher string
B<ALL:!ADH:RC4+RSA:+SSLv2:@STRENGTH>. This must be the first cipher string
specified.
specified.
=item B<COMPLEMENTOFDEFAULT>
the ciphers not enabled by default, currently being B<ADH>. This rule does not
cover B<eNULL>, which is not included by B<ALL> and is therefore be handled by
B<COMPLENETOFALL>.
=item B<ALL>
=item B<ALL>
all ciphers suites except the B<eNULL> ciphers which must be explicitly enabled.
all ciphers suites except the B<eNULL> ciphers which must be explicitly enabled.
=item B<COMPLEMENTOFALL>
the cipher suites not enabled by B<ALL>, currently being B<eNULL>.
=item B<HIGH>
=item B<HIGH>
"high" encryption cipher suites. This currently means those with key lengths larger
"high" encryption cipher suites. This currently means those with key lengths larger
...
@@ -339,8 +349,22 @@ Include only 3DES ciphers and then place RSA ciphers last:
...
@@ -339,8 +349,22 @@ Include only 3DES ciphers and then place RSA ciphers last:
openssl ciphers -v '3DES:+RSA'
openssl ciphers -v '3DES:+RSA'
Include all RC4 ciphers but leave out those without authentication:
openssl ciphers -v 'RC4:!COMPLEMENTOFDEFAULT'
Include all chiphers with RSA authentication but leave out ciphers without
encryption.
openssl ciphers -v 'RSA:!COMPLEMENTOFALL'
=head1 SEE ALSO
=head1 SEE ALSO
L<s_client(1)|s_client(1)>, L<s_server(1)|s_server(1)>, L<ssl(3)|ssl(3)>
L<s_client(1)|s_client(1)>, L<s_server(1)|s_server(1)>, L<ssl(3)|ssl(3)>
=head1 HISTORY
The B<COMPLENTOFALL> and B<COMPLEMENTOFDEFAULT> selection options were
added in version 0.9.7.
=cut
=cut
ssl/ssl.h
浏览文件 @
c6ccf055
...
@@ -266,6 +266,23 @@ extern "C" {
...
@@ -266,6 +266,23 @@ extern "C" {
#define SSL_TXT_TLSV1 "TLSv1"
#define SSL_TXT_TLSV1 "TLSv1"
#define SSL_TXT_ALL "ALL"
#define SSL_TXT_ALL "ALL"
/*
* COMPLEMENTOF* definitions. These identifiers are used to (de-select)
* ciphers normally not being used.
* Example: "RC4" will activate all ciphers using RC4 including ciphers
* without authentication, which would normally disabled by DEFAULT (due
* the "!ADH" being part of default). Therefore "RC4:!COMPLEMENTOFDEFAULT"
* will make sure that it is also disabled in the specific selection.
* COMPLEMENTOF* identifiers are portable between version, as adjustments
* to the default cipher setup will also be included here.
*
* COMPLEMENTOFDEFAULT does not experience the same special treatment that
* DEFAULT gets, as only selection is being done and no sorting as needed
* for DEFAULT.
*/
#define SSL_TXT_CMPALL "COMPLEMENTOFALL"
#define SSL_TXT_CMPDEF "COMPLEMENTOFDEFAULT"
/* The following cipher list is used by default.
/* The following cipher list is used by default.
* It also is substituted when an application-defined cipher list string
* It also is substituted when an application-defined cipher list string
* starts with 'DEFAULT'. */
* starts with 'DEFAULT'. */
...
...
ssl/ssl_ciph.c
浏览文件 @
c6ccf055
...
@@ -102,6 +102,8 @@ typedef struct cipher_order_st
...
@@ -102,6 +102,8 @@ typedef struct cipher_order_st
static
const
SSL_CIPHER
cipher_aliases
[]
=
{
static
const
SSL_CIPHER
cipher_aliases
[]
=
{
/* Don't include eNULL unless specifically enabled. */
/* Don't include eNULL unless specifically enabled. */
{
0
,
SSL_TXT_ALL
,
0
,
SSL_ALL
&
~
SSL_eNULL
,
SSL_ALL
,
0
,
0
,
0
,
SSL_ALL
,
SSL_ALL
},
/* must be first */
{
0
,
SSL_TXT_ALL
,
0
,
SSL_ALL
&
~
SSL_eNULL
,
SSL_ALL
,
0
,
0
,
0
,
SSL_ALL
,
SSL_ALL
},
/* must be first */
{
0
,
SSL_TXT_CMPALL
,
0
,
SSL_eNULL
,
0
,
0
,
0
,
0
,
SSL_ENC_MASK
,
0
},
/* COMPLEMENT OF ALL */
{
0
,
SSL_TXT_CMPDEF
,
0
,
SSL_ADH
,
0
,
0
,
0
,
0
,
SSL_AUTH_MASK
,
0
},
{
0
,
SSL_TXT_kKRB5
,
0
,
SSL_kKRB5
,
0
,
0
,
0
,
0
,
SSL_MKEY_MASK
,
0
},
/* VRS Kerberos5 */
{
0
,
SSL_TXT_kKRB5
,
0
,
SSL_kKRB5
,
0
,
0
,
0
,
0
,
SSL_MKEY_MASK
,
0
},
/* VRS Kerberos5 */
{
0
,
SSL_TXT_kRSA
,
0
,
SSL_kRSA
,
0
,
0
,
0
,
0
,
SSL_MKEY_MASK
,
0
},
{
0
,
SSL_TXT_kRSA
,
0
,
SSL_kRSA
,
0
,
0
,
0
,
0
,
SSL_MKEY_MASK
,
0
},
{
0
,
SSL_TXT_kDHr
,
0
,
SSL_kDHr
,
0
,
0
,
0
,
0
,
SSL_MKEY_MASK
,
0
},
{
0
,
SSL_TXT_kDHr
,
0
,
SSL_kDHr
,
0
,
0
,
0
,
0
,
SSL_MKEY_MASK
,
0
},
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录