1. 06 2月, 2014 3 次提交
    • S
      Updating DTCP authorization type to expected value · 519531e9
      Scott Deboy 提交于
      519531e9
    • S
      Update custom TLS extension and supplemental data 'generate' callbacks to support sending an alert. · ac20719d
      Scott Deboy 提交于
      If multiple TLS extensions are expected but not received, the TLS extension and supplemental data 'generate' callbacks are the only chance for the receive-side to trigger a specific TLS alert during the handshake.
      
      Removed logic which no-op'd TLS extension generate callbacks (as the generate callbacks need to always be called in order to trigger alerts), and updated the serverinfo-specific custom TLS extension callbacks to track which custom TLS extensions were received by the client, where no-ops for 'generate' callbacks are appropriate.
      ac20719d
    • D
      Return per-certificate chain if extra chain is NULL. · a51f7676
      Dr. Stephen Henson 提交于
      If an application calls the macro SSL_CTX_get_extra_chain_certs
      return either the old "shared" extra certificates or those associated
      with the current certificate.
      
      This means applications which call SSL_CTX_use_certificate_chain_file
      and retrieve the additional chain using SSL_CTX_get_extra_chain_certs
      will still work. An application which only wants to check the shared
      extra certificates can call the new macro
      SSL_CTX_get_extra_chain_certs_only
      a51f7676
  2. 05 2月, 2014 2 次提交
  3. 03 2月, 2014 1 次提交
    • D
      New ctrl to set current certificate. · 0f78819c
      Dr. Stephen Henson 提交于
      New ctrl sets current certificate based on certain criteria. Currently
      two options: set the first valid certificate as current and set the
      next valid certificate as current. Using these an application can
      iterate over all certificates in an SSL_CTX or SSL structure.
      0f78819c
  4. 28 1月, 2014 1 次提交
  5. 27 1月, 2014 1 次提交
  6. 26 1月, 2014 1 次提交
  7. 16 1月, 2014 2 次提交
  8. 09 1月, 2014 9 次提交
  9. 07 1月, 2014 1 次提交
  10. 04 1月, 2014 3 次提交
  11. 02 1月, 2014 1 次提交
  12. 30 12月, 2013 1 次提交
  13. 21 12月, 2013 1 次提交
    • D
      Fix DTLS retransmission from previous session. · 20b82b51
      Dr. Stephen Henson 提交于
      For DTLS we might need to retransmit messages from the previous session
      so keep a copy of write context in DTLS retransmission buffers instead
      of replacing it after sending CCS. CVE-2013-6450.
      (cherry picked from commit 34628967f1e65dc8f34e000f0f5518e21afbfc7b)
      20b82b51
  14. 18 12月, 2013 1 次提交
  15. 13 12月, 2013 2 次提交
  16. 19 11月, 2013 2 次提交
  17. 18 11月, 2013 1 次提交
  18. 14 11月, 2013 4 次提交
    • P
      Fix compilation with no-nextprotoneg. · 2911575c
      Piotr Sikora 提交于
      PR#3106
      2911575c
    • D
      Allow match selecting of current certificate. · 629b640b
      Dr. Stephen Henson 提交于
      If pointer comparison for current certificate fails check
      to see if a match using X509_cmp succeeds for the current
      certificate: this is useful for cases where the certificate
      pointer is not available.
      629b640b
    • R
      Additional "chain_cert" functions. · 7b6b246f
      Rob Stradling 提交于
      PR#3169
      
      This patch, which currently applies successfully against master and
      1_0_2, adds the following functions:
      
      SSL_[CTX_]select_current_cert() - set the current certificate without
      disturbing the existing structure.
      
      SSL_[CTX_]get0_chain_certs() - get the current certificate's chain.
      
      SSL_[CTX_]clear_chain_certs() - clear the current certificate's chain.
      
      The patch also adds these functions to, and fixes some existing errors
      in, SSL_CTX_add1_chain_cert.pod.
      7b6b246f
    • K
      Delete duplicate entry. · 44314cf6
      Krzysztof Kwiatkowski 提交于
      PR#3172
      44314cf6
  19. 07 11月, 2013 1 次提交
    • D
      Experimental workaround TLS filler (WTF) extension. · 0467ea68
      Dr. Stephen Henson 提交于
      Based on a suggested workaround for the "TLS hang bug" (see FAQ and PR#2771):
      if the TLS Client Hello record length value would otherwise be > 255 and less
      that 512 pad with a dummy extension containing zeroes so it is at least 512.
      
      To enable it use an unused extension number (for example 0x4242) using
      e.g. -DTLSEXT_TYPE_wtf=0x4242
      
      WARNING: EXPERIMENTAL, SUBJECT TO CHANGE.
      0467ea68
  20. 06 11月, 2013 2 次提交