- 24 4月, 2007 3 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
PR: 1503 Submitted by: KISA Reviewed by: Bodo Moeller
-
- 06 4月, 2007 1 次提交
-
-
由 Ben Laurie 提交于
-
- 24 3月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: ran@cryptocom.ru Reviewed by: steve@openssl.org
-
- 21 3月, 2007 1 次提交
-
-
由 Bodo Möller 提交于
-
- 23 2月, 2007 1 次提交
-
-
由 Bodo Möller 提交于
selection remodeling Submitted by: Victor Duchovni
-
- 21 2月, 2007 4 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
Change ssl_create_cipher_list() to prefer ephemeral ECDH over ephemeral DH.
-
- 20 2月, 2007 3 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
ciphersuite string such as "DEFAULT:RSA" cannot enable authentication-only ciphersuites. Also, change ssl_create_cipher_list() so that it no longer starts with an arbitrary ciphersuite ordering, but instead uses the logic that we previously had in SSL_DEFEAULT_CIPHER_LIST. SSL_DEFAULT_CIPHER_LIST simplifies into just "ALL:!aNULL:!eNULL".
-
由 Bodo Möller 提交于
-
- 19 2月, 2007 2 次提交
-
-
由 Bodo Möller 提交于
ciphersuite selection code in HEAD Submitted by: Victor Duchovni
-
由 Bodo Möller 提交于
Submitted by: Victor Duchovni
-
- 17 2月, 2007 2 次提交
-
-
由 Bodo Möller 提交于
This change resolves a number of problems and obviates multiple kludges. A new feature is that you can now say "AES256" or "AES128" (not just "AES", which enables both). In some cases the ciphersuite list generated from a given string is affected by this change. I hope this is just in those cases where the previous behaviour did not make sense.
-
由 Nils Larsch 提交于
PR: 1490
-
- 10 2月, 2007 1 次提交
-
-
由 Nils Larsch 提交于
PR: 1467 Submitted by: Andrei Pelinescu-Onciul <andrei@iptel.org>
-
- 08 2月, 2007 1 次提交
-
-
由 Nils Larsch 提交于
PR: 1476
-
- 22 1月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 04 1月, 2007 1 次提交
-
-
由 Nils Larsch 提交于
-
- 22 12月, 2006 1 次提交
-
-
由 Nils Larsch 提交于
PR: 1354, 1355, 1398, 1408
-
- 30 11月, 2006 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Nils Larsch 提交于
Submitted by: Tracy Camp <tracyx.e.camp@intel.com>
-
- 29 11月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
-
- 22 11月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 07 11月, 2006 1 次提交
-
-
由 Nils Larsch 提交于
-
- 20 10月, 2006 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 28 9月, 2006 2 次提交
-
-
由 Mark J. Cox 提交于
(CVE-2006-3738) [Tavis Ormandy and Will Drewry, Google Security Team] Fix SSL client code which could crash if connecting to a malicious SSLv2 server. (CVE-2006-4343) [Tavis Ormandy and Will Drewry, Google Security Team]
-
由 Richard Levitte 提交于
1) Certificate Message with no certs OpenSSL implementation sends the Certificate message during SSL handshake, however as per the specification, these have been omitted. -- RFC 2712 -- CertificateRequest, and the ServerKeyExchange shown in Figure 1 will be omitted since authentication and the establishment of a master secret will be done using the client's Kerberos credentials for the TLS server. The client's certificate will be omitted for the same reason. -- RFC 2712 -- 3) Pre-master secret Protocol version The pre-master secret generated by OpenSSL does not have the correct client version. RFC 2712 says, if the Kerberos option is selected, the pre-master secret structure is the same as that used in the RSA case. TLS specification defines pre-master secret as: struct { ProtocolVersion client_version; opaque random[46]; } PreMasterSecret; where client_version is the latest protocol version supported by the client The pre-master secret generated by OpenSSL does not have the correct client version. The implementation does not update the first 2 bytes of random secret for Kerberos Cipher suites. At the server-end, the client version from the pre-master secret is not validated. PR: 1336
-
- 24 9月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed by: steve
-
- 11 9月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
ciphersuite as well
-
- 29 8月, 2006 1 次提交
-
-
由 Ben Laurie 提交于
Fix warnings.
-
- 16 6月, 2006 5 次提交
-
-
由 Bodo Möller 提交于
Also, change the default ciphersuite to give some prefererence to ciphersuites with forwared secrecy (rather than using a random order).
-
由 Bodo Möller 提交于
and allow more general RSA OIDs for ECC certs with RSA CA sig.
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
make sure 'mask' is initialized in ssl_cipher_get_disabled(). Also simplify code by removing some unused arguments in static functions.
-
由 Bodo Möller 提交于
the Fortezza stuff
-
- 15 6月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
-