1. 03 2月, 2014 1 次提交
    • D
      New ctrl to set current certificate. · 0f78819c
      Dr. Stephen Henson 提交于
      New ctrl sets current certificate based on certain criteria. Currently
      two options: set the first valid certificate as current and set the
      next valid certificate as current. Using these an application can
      iterate over all certificates in an SSL_CTX or SSL structure.
      0f78819c
  2. 28 1月, 2014 1 次提交
  3. 27 1月, 2014 1 次提交
  4. 26 1月, 2014 1 次提交
  5. 16 1月, 2014 2 次提交
  6. 09 1月, 2014 9 次提交
  7. 07 1月, 2014 1 次提交
  8. 04 1月, 2014 3 次提交
  9. 02 1月, 2014 1 次提交
  10. 30 12月, 2013 1 次提交
  11. 21 12月, 2013 1 次提交
    • D
      Fix DTLS retransmission from previous session. · 20b82b51
      Dr. Stephen Henson 提交于
      For DTLS we might need to retransmit messages from the previous session
      so keep a copy of write context in DTLS retransmission buffers instead
      of replacing it after sending CCS. CVE-2013-6450.
      (cherry picked from commit 34628967f1e65dc8f34e000f0f5518e21afbfc7b)
      20b82b51
  12. 18 12月, 2013 1 次提交
  13. 13 12月, 2013 2 次提交
  14. 19 11月, 2013 2 次提交
  15. 18 11月, 2013 1 次提交
  16. 14 11月, 2013 4 次提交
    • P
      Fix compilation with no-nextprotoneg. · 2911575c
      Piotr Sikora 提交于
      PR#3106
      2911575c
    • D
      Allow match selecting of current certificate. · 629b640b
      Dr. Stephen Henson 提交于
      If pointer comparison for current certificate fails check
      to see if a match using X509_cmp succeeds for the current
      certificate: this is useful for cases where the certificate
      pointer is not available.
      629b640b
    • R
      Additional "chain_cert" functions. · 7b6b246f
      Rob Stradling 提交于
      PR#3169
      
      This patch, which currently applies successfully against master and
      1_0_2, adds the following functions:
      
      SSL_[CTX_]select_current_cert() - set the current certificate without
      disturbing the existing structure.
      
      SSL_[CTX_]get0_chain_certs() - get the current certificate's chain.
      
      SSL_[CTX_]clear_chain_certs() - clear the current certificate's chain.
      
      The patch also adds these functions to, and fixes some existing errors
      in, SSL_CTX_add1_chain_cert.pod.
      7b6b246f
    • K
      Delete duplicate entry. · 44314cf6
      Krzysztof Kwiatkowski 提交于
      PR#3172
      44314cf6
  17. 07 11月, 2013 1 次提交
    • D
      Experimental workaround TLS filler (WTF) extension. · 0467ea68
      Dr. Stephen Henson 提交于
      Based on a suggested workaround for the "TLS hang bug" (see FAQ and PR#2771):
      if the TLS Client Hello record length value would otherwise be > 255 and less
      that 512 pad with a dummy extension containing zeroes so it is at least 512.
      
      To enable it use an unused extension number (for example 0x4242) using
      e.g. -DTLSEXT_TYPE_wtf=0x4242
      
      WARNING: EXPERIMENTAL, SUBJECT TO CHANGE.
      0467ea68
  18. 06 11月, 2013 2 次提交
  19. 02 11月, 2013 5 次提交
    • D
      Add brainpool curves to trace output. · d519f083
      Dr. Stephen Henson 提交于
      (cherry picked from commit bd80d0229c9a154f569b046365bc85d76b59cfc5)
      d519f083
    • R
      DTLS/SCTP Finished Auth Bug · b9ef52b0
      Robin Seggelmann 提交于
      PR: 2808
      
      With DTLS/SCTP the SCTP extension SCTP-AUTH is used to protect DATA and
      FORWARD-TSN chunks. The key for this extension is derived from the
      master secret and changed with the next ChangeCipherSpec, whenever a new
      key has been negotiated. The following Finished then already uses the
      new key.  Unfortunately, the ChangeCipherSpec and Finished are part of
      the same flight as the ClientKeyExchange, which is necessary for the
      computation of the new secret. Hence, these messages are sent
      immediately following each other, leaving the server very little time to
      compute the new secret and pass it to SCTP before the finished arrives.
      So the Finished is likely to be discarded by SCTP and a retransmission
      becomes necessary. To prevent this issue, the Finished of the client is
      still sent with the old key.
      (cherry picked from commit 9fb523adce6fd6015b68da2ca8e4ac4900ac2be2)
      b9ef52b0
    • P
      Fix SSL_OP_SINGLE_ECDH_USE · 29b490a4
      Piotr Sikora 提交于
      Don't require a public key in tls1_set_ec_id if compression status is
      not needed. This fixes a bug where SSL_OP_SINGLE_ECDH_USE wouldn't work.
      (cherry picked from commit 5ff68e8f6dac3b0d8997b8bc379f9111c2bab74f)
      29b490a4
    • D
      Add -ecdh_single option. · a9bc1af9
      Dr. Stephen Henson 提交于
      Add -ecdh_single option to set SSL_OP_SINGLE_ECDH_USE on the command line.
      (cherry picked from commit f14a4a861d2d221ed565a75441a218f85b8db530)
      a9bc1af9
    • D
      Fix warning. · 96e16bdd
      Dr. Stephen Henson 提交于
      96e16bdd