- 06 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
signature algorithms extension and correct signature format for server key exchange. All ciphersuites should now work on the server but no client support and no client certificate support yet.
-
- 13 3月, 2011 1 次提交
-
-
由 Ben Laurie 提交于
-
- 09 2月, 2011 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Neel Mehta, Adam Langley, Bodo Moeller
-
- 25 11月, 2010 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Jack Lloyd <lloyd@randombit.net>, "Mounir IDRASSI" <mounir.idrassi@idrix.net>, steve Reviewed by: steve As required by RFC4492 an absent supported points format by a server is not an error: it should be treated as equivalent to an extension only containing uncompressed.
-
由 Dr. Stephen Henson 提交于
-
- 18 11月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Don't assume a decode error if session tlsext_ecpointformatlist is not NULL: it can be legitimately set elsewhere.
-
- 16 11月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 06 9月, 2010 1 次提交
-
-
由 Ben Laurie 提交于
-
- 27 8月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de> Fix other cases not covered by original patch.
-
- 28 7月, 2010 1 次提交
-
-
由 Ben Laurie 提交于
-
- 12 6月, 2010 1 次提交
-
-
由 Ben Laurie 提交于
-
- 18 2月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
initial connection to unpatched servers. There are no additional security concerns in doing this as clients don't see renegotiation during an attack anyway.
-
- 08 1月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
1. Send SCSV is not renegotiating, never empty RI. 2. Send RI if renegotiating.
-
- 17 12月, 2009 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 14 12月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
RI. Reorganise RI checking code and handle some missing cases.
-
- 08 12月, 2009 2 次提交
-
-
由 Dr. Stephen Henson 提交于
work in SSLv3: initial handshake has no extensions but includes MCSV, if server indicates RI support then renegotiation handshakes include RI. NB: current MCSV value is bogus for testing only, will be updated when we have an official value. Change mismatch alerts to handshake_failure as required by spec. Also have some debugging fprintfs so we can clearly see what is going on if OPENSSL_RI_DEBUG is set.
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Add extension support to DTLS code mainly using existing implementation for TLS.
-
- 07 12月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 18 11月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 11 11月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 08 11月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
ticket to request a new session.
-
- 30 10月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 05 9月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Approved by: steve@openssl.org Fix DTLS cookie management bugs.
-
- 29 4月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 30 12月, 2008 3 次提交
-
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
test). (Coverity ID 148).
-
由 Ben Laurie 提交于
test for them!
-
- 14 12月, 2008 2 次提交
-
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-
- 16 11月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Jouni Malinen <j@w1.fi> Approved by: steve@openssl.org Ticket override support for EAP-FAST.
-
- 04 9月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 29 5月, 2008 1 次提交
-
-
由 Bodo Möller 提交于
Fix double-free in TLS server name extensions which could lead to a remote crash found by Codenomicon TLS test suite (CVE-2008-0891) Reviewed by: openssl-security@openssl.org Obtained from: jorton@redhat.com
-
- 01 5月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 30 4月, 2008 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 25 4月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 17 3月, 2008 1 次提交
-
-
由 Geoff Thorpe 提交于
OPENSSL_NO_DEPRECATED, etc. Steve, please double-check the CMS stuff...
-
- 26 10月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
of handshake failure 2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH (required for s3_srvr to accept GOST client certificates). 3. Changes to EVP - adding of function EVP_PKEY_CTX_get0_peerkey - Make function EVP_PKEY_derive_set_peerkey work for context with ENCRYPT operation, because we use peerkey field in the context to pass non-ephemeral secret key to GOST encrypt operation. - added EVP_PKEY_CTRL_SET_IV control command. It is really GOST-specific, but it is used in SSL code, so it has to go in some header file, available during libssl compilation 4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data 5. Include des.h if KSSL_DEBUG is defined into some libssl files, to make debugging output which depends on constants defined there, work and other KSSL_DEBUG output fixes 6. Declaration of real GOST ciphersuites, two authentication methods SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST 7. Implementation of these methods. 8. Support for sending unsolicited serverhello extension if GOST ciphersuite is selected. It is require for interoperability with CryptoPro CSP 3.0 and 3.6 and controlled by SSL_OP_CRYPTOPRO_TLSEXT_BUG constant. This constant is added to SSL_OP_ALL, because it does nothing, if non-GOST ciphersuite is selected, and all implementation of GOST include compatibility with CryptoPro. 9. Support for CertificateVerify message without length field. It is another CryptoPro bug, but support is made unconditional, because it does no harm for draft-conforming implementation. 10. In tls1_mac extra copy of stream mac context is no more done. When I've written currently commited code I haven't read EVP_DigestSignFinal manual carefully enough and haven't noticed that it does an internal digest ctx copying. This implementation was tested against 1. CryptoPro CSP 3.6 client and server 2. Cryptopro CSP 3.0 server
-
- 18 10月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-