1. 08 6月, 2016 1 次提交
  2. 04 6月, 2016 1 次提交
  3. 18 5月, 2016 1 次提交
  4. 16 5月, 2016 2 次提交
  5. 29 4月, 2016 1 次提交
  6. 05 4月, 2016 2 次提交
  7. 04 3月, 2016 1 次提交
  8. 03 3月, 2016 1 次提交
    • E
      Refactor ClientHello extension parsing · 06217867
      Emilia Kasper 提交于
      1) Simplify code with better PACKET methods.
      
      2) Make broken SNI parsing explicit. SNI was intended to be extensible
      to new name types but RFC 4366 defined the syntax inextensibly, and
      OpenSSL has never parsed SNI in a way that would allow adding a new name
      type. RFC 6066 fixed the definition but due to broken implementations
      being widespread, it appears impossible to ever extend SNI.
      
      3) Annotate resumption behaviour. OpenSSL doesn't currently handle all
      extensions correctly upon resumption. Annotate for further clean-up.
      
      4) Send an alert on ALPN protocol mismatch.
      Reviewed-by: NKurt Roeckx <kurt@openssl.org>
      06217867
  9. 12 2月, 2016 1 次提交
  10. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  11. 10 12月, 2015 1 次提交
  12. 06 12月, 2015 1 次提交
  13. 24 11月, 2015 1 次提交
  14. 24 10月, 2015 1 次提交
  15. 14 8月, 2015 1 次提交
  16. 12 8月, 2015 1 次提交
  17. 30 7月, 2015 4 次提交
  18. 24 6月, 2015 1 次提交
  19. 23 5月, 2015 1 次提交
  20. 16 5月, 2015 1 次提交
    • M
      Server side version negotiation rewrite · 32ec4153
      Matt Caswell 提交于
      This commit changes the way that we do server side protocol version
      negotiation. Previously we had a whole set of code that had an "up front"
      state machine dedicated to the negotiating the protocol version. This adds
      significant complexity to the state machine. Historically the justification
      for doing this was the support of SSLv2 which works quite differently to
      SSLv3+. However, we have now removed support for SSLv2 so there is little
      reason to maintain this complexity.
      
      The one slight difficulty is that, although we no longer support SSLv2, we
      do still support an SSLv3+ ClientHello in an SSLv2 backward compatible
      ClientHello format. This is generally only used by legacy clients. This
      commit adds support within the SSLv3 code for these legacy format
      ClientHellos.
      
      Server side version negotiation now works in much the same was as DTLS,
      i.e. we introduce the concept of TLS_ANY_VERSION. If s->version is set to
      that then when a ClientHello is received it will work out the most
      appropriate version to respond with. Also, SSLv23_method and
      SSLv23_server_method have been replaced with TLS_method and
      TLS_server_method respectively. The old SSLv23* names still exist as
      macros pointing at the new name, although they are deprecated.
      
      Subsequent commits will look at client side version negotiation, as well of
      removal of the old s23* code.
      Reviewed-by: NKurt Roeckx <kurt@openssl.org>
      32ec4153
  21. 01 4月, 2015 1 次提交
  22. 23 3月, 2015 1 次提交
    • M
      Check libssl function returns · 4bcdb4a6
      Matt Caswell 提交于
      Mark most functions returning a result defined in any libssl header file
      with __owur to warn if they are used without checking the return value.
      Use -DUNUSED_RETURN compiler flag with gcc to activate these warnings.
      Some functions returning a result are skipped if it is common and valid to
      use these functions without checking the return value.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      4bcdb4a6
  23. 02 3月, 2015 1 次提交
    • R
      Remove experimental 56bit export ciphers · a258afaf
      Rich Salz 提交于
      These ciphers are removed:
          TLS1_CK_RSA_EXPORT1024_WITH_RC4_56_MD5
          TLS1_CK_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5
          TLS1_CK_RSA_EXPORT1024_WITH_DES_CBC_SHA
          TLS1_CK_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA
          TLS1_CK_RSA_EXPORT1024_WITH_RC4_56_SHA
          TLS1_CK_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA
          TLS1_CK_DHE_DSS_WITH_RC4_128_SHA
      They were defined in a long-expired IETF internet-draft:
      draft-ietf-tls-56-bit-ciphersuites-01.txt
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      a258afaf
  24. 03 2月, 2015 2 次提交
  25. 29 1月, 2015 1 次提交
  26. 22 1月, 2015 3 次提交
  27. 31 12月, 2014 1 次提交
  28. 15 10月, 2014 1 次提交
  29. 08 9月, 2014 1 次提交
  30. 16 8月, 2014 1 次提交
  31. 04 7月, 2014 1 次提交
  32. 28 6月, 2014 1 次提交