- 02 12月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 26 11月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 24 11月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 16 11月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 30 9月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
a ciphersuite to position the SCSV value in different places for testing purposes.
-
- 12 9月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
client hello message. Previously this could only be retrieved on an initial connection and it was impossible to determine the cipher IDs of any uknown ciphersuites.
-
- 31 8月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
perform sanity checks on server certificate type as soon as it is received instead of waiting until server key exchange
-
- 15 8月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 27 4月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 05 4月, 2012 1 次提交
-
-
由 Andy Polyakov 提交于
PR: 2778
-
- 17 1月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
The cipher definitions of these ciphersuites have been around since SSLeay but were always disabled. Now OpenSSL supports DH certificates they can be finally enabled. Various additional changes were needed to make them work properly: many unused fixed DH sections of code were untested.
-
- 02 12月, 2011 1 次提交
-
-
由 Bodo Möller 提交于
methods isn't presorted, it will be sorted on first read). Submitted by: Adam Langley
-
- 10 10月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 03 8月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
invocation field. Add complete support for AES GCM ciphersuites including all those in RFC5288 and RFC5289.
-
- 26 7月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
prohibit use of these ciphersuites for TLS < 1.2
-
- 11 7月, 2011 1 次提交
-
-
由 Andy Polyakov 提交于
combos that can be implemented as AEAD ciphers.
-
- 20 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 01 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 30 4月, 2011 2 次提交
-
-
由 Dr. Stephen Henson 提交于
checking added, SHA256 PRF support added. At present only RSA key exchange ciphersuites work with TLS v1.2 as the new signature format is not yet implemented.
-
由 Dr. Stephen Henson 提交于
OPENSSL_NO_SSL_INTERN all ssl related structures are opaque and internals cannot be directly accessed. Many applications will need some modification to support this and most likely some additional functions added to OpenSSL. The advantage of this option is that any application supporting it will still be binary compatible if SSL structures change.
-
- 13 3月, 2011 1 次提交
-
-
由 Ben Laurie 提交于
-
- 12 6月, 2010 1 次提交
-
-
由 Ben Laurie 提交于
-
- 13 9月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Tomas Mraz <tmraz@redhat.com> Approved by: steve@openssl.org Constify SSL_CIPHER_description
-
- 07 4月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 13 3月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed by: steve@openssl.org Check return value of sk_SSL_COMP_find() properly.
-
- 05 1月, 2009 1 次提交
-
-
由 Lutz Jänicke 提交于
Some #include statements were not properly protected. This will go unnoted on most systems as openssl/comp.h tends to be installed as a system header file by default but may become visible when cross compiling.
-
- 30 12月, 2008 1 次提交
-
-
由 Ben Laurie 提交于
test for them!
-
- 21 12月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 25 11月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 29 10月, 2008 1 次提交
-
-
由 Ben Laurie 提交于
-
- 27 10月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 12 10月, 2008 1 次提交
-
-
由 Ben Laurie 提交于
-
- 11 9月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
strength "FIPS" to represent all FIPS approved ciphersuites without NULL encryption.
-
- 26 10月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
of handshake failure 2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH (required for s3_srvr to accept GOST client certificates). 3. Changes to EVP - adding of function EVP_PKEY_CTX_get0_peerkey - Make function EVP_PKEY_derive_set_peerkey work for context with ENCRYPT operation, because we use peerkey field in the context to pass non-ephemeral secret key to GOST encrypt operation. - added EVP_PKEY_CTRL_SET_IV control command. It is really GOST-specific, but it is used in SSL code, so it has to go in some header file, available during libssl compilation 4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data 5. Include des.h if KSSL_DEBUG is defined into some libssl files, to make debugging output which depends on constants defined there, work and other KSSL_DEBUG output fixes 6. Declaration of real GOST ciphersuites, two authentication methods SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST 7. Implementation of these methods. 8. Support for sending unsolicited serverhello extension if GOST ciphersuite is selected. It is require for interoperability with CryptoPro CSP 3.0 and 3.6 and controlled by SSL_OP_CRYPTOPRO_TLSEXT_BUG constant. This constant is added to SSL_OP_ALL, because it does nothing, if non-GOST ciphersuite is selected, and all implementation of GOST include compatibility with CryptoPro. 9. Support for CertificateVerify message without length field. It is another CryptoPro bug, but support is made unconditional, because it does no harm for draft-conforming implementation. 10. In tls1_mac extra copy of stream mac context is no more done. When I've written currently commited code I haven't read EVP_DigestSignFinal manual carefully enough and haven't noticed that it does an internal digest ctx copying. This implementation was tested against 1. CryptoPro CSP 3.6 client and server 2. Cryptopro CSP 3.0 server
-
- 07 9月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Fix additional gcc 4.2 value not used warnings.
-
- 31 8月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Victor B. Wagner <vitus@cryptocom.ru>
-
- 05 6月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 24 4月, 2007 1 次提交
-
-
由 Bodo Möller 提交于
PR: 1503 Submitted by: KISA Reviewed by: Bodo Moeller
-
- 24 3月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: ran@cryptocom.ru Reviewed by: steve@openssl.org
-
- 21 2月, 2007 1 次提交
-
-
由 Bodo Möller 提交于
-