- 20 4月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 05 4月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 24 2月, 2009 1 次提交
-
-
由 Ben Laurie 提交于
-
- 12 11月, 2008 1 次提交
-
-
由 Geoff Thorpe 提交于
knock-on work than expected - they've been extracted into a patch series that can be completed elsewhere, or in a different branch, before merging back to HEAD.
-
- 02 11月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
not used.
-
- 12 10月, 2008 1 次提交
-
-
由 Ben Laurie 提交于
-
- 05 8月, 2008 1 次提交
-
-
由 Bodo Möller 提交于
Also, get rid of compile-time switch OPENSSL_NO_RELEASE_BUFFERS because it was rather pointless (the new behavior has to be explicitly requested by setting SSL_MODE_RELEASE_BUFFERS anyway).
-
- 05 6月, 2008 3 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 03 6月, 2008 1 次提交
-
-
由 Ben Laurie 提交于
-
- 02 6月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 26 5月, 2008 1 次提交
-
-
由 Ben Laurie 提交于
-
- 26 10月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
of handshake failure 2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH (required for s3_srvr to accept GOST client certificates). 3. Changes to EVP - adding of function EVP_PKEY_CTX_get0_peerkey - Make function EVP_PKEY_derive_set_peerkey work for context with ENCRYPT operation, because we use peerkey field in the context to pass non-ephemeral secret key to GOST encrypt operation. - added EVP_PKEY_CTRL_SET_IV control command. It is really GOST-specific, but it is used in SSL code, so it has to go in some header file, available during libssl compilation 4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data 5. Include des.h if KSSL_DEBUG is defined into some libssl files, to make debugging output which depends on constants defined there, work and other KSSL_DEBUG output fixes 6. Declaration of real GOST ciphersuites, two authentication methods SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST 7. Implementation of these methods. 8. Support for sending unsolicited serverhello extension if GOST ciphersuite is selected. It is require for interoperability with CryptoPro CSP 3.0 and 3.6 and controlled by SSL_OP_CRYPTOPRO_TLSEXT_BUG constant. This constant is added to SSL_OP_ALL, because it does nothing, if non-GOST ciphersuite is selected, and all implementation of GOST include compatibility with CryptoPro. 9. Support for CertificateVerify message without length field. It is another CryptoPro bug, but support is made unconditional, because it does no harm for draft-conforming implementation. 10. In tls1_mac extra copy of stream mac context is no more done. When I've written currently commited code I haven't read EVP_DigestSignFinal manual carefully enough and haven't noticed that it does an internal digest ctx copying. This implementation was tested against 1. CryptoPro CSP 3.6 client and server 2. Cryptopro CSP 3.0 server
-
- 04 10月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 27 9月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 21 9月, 2007 1 次提交
-
-
由 Bodo Möller 提交于
(draft-rescorla-tls-opaque-prf-input-00.txt), and do some cleanups and bugfixes on the way. In particular, this fixes the buffer bounds checks in ssl_add_clienthello_tlsext() and in ssl_add_serverhello_tlsext(). Note that the opaque PRF Input TLS extension is not compiled by default; see CHANGES.
-
- 07 9月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
and cast from pointer to int of different size (linux-x86_64 and align).
-
- 31 8月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Victor B. Wagner <vitus@cryptocom.ru>
-
- 13 8月, 2007 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 12 8月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
for OpenSSL.
-
- 05 6月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 23 2月, 2007 1 次提交
-
-
由 Bodo Möller 提交于
selection remodeling Submitted by: Victor Duchovni
-
- 20 2月, 2007 1 次提交
-
-
由 Bodo Möller 提交于
-
- 17 2月, 2007 1 次提交
-
-
由 Bodo Möller 提交于
This change resolves a number of problems and obviates multiple kludges. A new feature is that you can now say "AES256" or "AES128" (not just "AES", which enables both). In some cases the ciphersuite list generated from a given string is affected by this change. I hope this is just in those cases where the previous behaviour did not make sense.
-
- 30 11月, 2006 1 次提交
-
-
由 Nils Larsch 提交于
Submitted by: Tracy Camp <tracyx.e.camp@intel.com>
-
- 28 9月, 2006 1 次提交
-
-
由 Mark J. Cox 提交于
(CVE-2006-3738) [Tavis Ormandy and Will Drewry, Google Security Team] Fix SSL client code which could crash if connecting to a malicious SSLv2 server. (CVE-2006-4343) [Tavis Ormandy and Will Drewry, Google Security Team]
-
- 16 6月, 2006 2 次提交
-
-
由 Bodo Möller 提交于
Also, change the default ciphersuite to give some prefererence to ciphersuites with forwared secrecy (rather than using a random order).
-
由 Bodo Möller 提交于
and allow more general RSA OIDs for ECC certs with RSA CA sig.
-
- 15 6月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
-
- 03 4月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Peter Sylvester
-
- 11 3月, 2006 1 次提交
-
-
由 Nils Larsch 提交于
PR: 1191 Submitted by: Mika Kousa and Pasi Eronen of Nokia Corporation Reviewed by: Nils Larsch
-
- 10 1月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Peter Sylvester
-
- 06 1月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Peter Sylvester
-
- 03 1月, 2006 2 次提交
-
-
由 Bodo Möller 提交于
- fix indentation - rename some functions and macros - fix up confusion between SSL_ERROR_... and SSL_AD_... values
-
由 Bodo Möller 提交于
Submitted by: Peter Sylvester
-
- 06 12月, 2005 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 08 10月, 2005 1 次提交
-
-
由 Dr. Stephen Henson 提交于
maximum send fragment size. Allocate I/O buffers accordingly.
-
- 01 10月, 2005 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-