1. 26 3月, 2013 1 次提交
    • D
      Provisional DTLS 1.2 support. · c3b344e3
      Dr. Stephen Henson 提交于
      Add correct flags for DTLS 1.2, update s_server and s_client to handle
      DTLS 1.2 methods.
      
      Currently no support for version negotiation: i.e. if client/server selects
      DTLS 1.2 it is that or nothing.
      c3b344e3
  2. 18 3月, 2013 2 次提交
    • D
      Use enc_flags when deciding protocol variations. · cbd64894
      Dr. Stephen Henson 提交于
      Use the enc_flags field to determine whether we should use explicit IV,
      signature algorithms or SHA256 default PRF instead of hard coding which
      versions support each requirement.
      cbd64894
    • D
      DTLS revision. · 173e72e6
      Dr. Stephen Henson 提交于
      Revise DTLS code. There was a *lot* of code duplication in the
      DTLS code that generates records. This makes it harder to maintain and
      sometimes a TLS update is omitted by accident from the DTLS code.
      
      Specifically almost all of the record generation functions have code like
      this:
      
      some_pointer = buffer + HANDSHAKE_HEADER_LENGTH;
      ... Record creation stuff ...
      set_handshake_header(ssl, SSL_MT_SOMETHING, message_len);
      
      ...
      
      write_handshake_message(ssl);
      
      Where the "Record creation stuff" is identical between SSL/TLS and DTLS or
      in some cases has very minor differences.
      
      By adding a few fields to SSL3_ENC to include the header length, some flags
      and function pointers for handshake header setting and handshake writing the
      code can cope with both cases.
      
      Note: although this passes "make test" and some simple DTLS tests there may
      be some minor differences in the DTLS code that have to be accounted for.
      173e72e6
  3. 31 8月, 2012 1 次提交
  4. 30 8月, 2012 1 次提交
  5. 15 8月, 2012 1 次提交
  6. 27 7月, 2012 1 次提交
  7. 25 7月, 2012 1 次提交
  8. 24 7月, 2012 1 次提交
  9. 18 7月, 2012 1 次提交
  10. 08 7月, 2012 1 次提交
    • D
      Add new ctrl to retrieve client certificate types, print out · 9f27b1ee
      Dr. Stephen Henson 提交于
      details in s_client.
      
      Also add ctrl to set client certificate types. If not used sensible values
      will be included based on supported signature algorithms: for example if
      we don't include any DSA signing algorithms the DSA certificate type is
      omitted.
      
      Fix restriction in old code where certificate types would be truncated
      if it exceeded TLS_CT_NUMBER.
      9f27b1ee
  11. 29 6月, 2012 1 次提交
    • D
      Add certificate callback. If set this is called whenever a certificate · 18d71588
      Dr. Stephen Henson 提交于
      is required by client or server. An application can decide which
      certificate chain to present based on arbitrary criteria: for example
      supported signature algorithms. Add very simple example to s_server.
      This fixes many of the problems and restrictions of the existing client
      certificate callback: for example you can now clear existing certificates
      and specify the whole chain.
      18d71588
  12. 04 6月, 2012 1 次提交
  13. 30 5月, 2012 1 次提交
  14. 24 4月, 2012 3 次提交
  15. 17 4月, 2012 1 次提交
    • D
      Additional workaround for PR#2771 · 800e1cd9
      Dr. Stephen Henson 提交于
      If OPENSSL_MAX_TLS1_2_CIPHER_LENGTH is set then limit the size of client
      ciphersuites to this value. A value of 50 should be sufficient.
      
      Document workarounds in CHANGES.
      800e1cd9
  16. 09 2月, 2012 1 次提交
  17. 27 1月, 2012 1 次提交
  18. 26 1月, 2012 1 次提交
  19. 25 1月, 2012 1 次提交
  20. 17 1月, 2012 1 次提交
    • D
      Support for fixed DH ciphersuites. · 8e1dc4d7
      Dr. Stephen Henson 提交于
      The cipher definitions of these ciphersuites have been around since SSLeay
      but were always disabled. Now OpenSSL supports DH certificates they can be
      finally enabled.
      
      Various additional changes were needed to make them work properly: many
      unused fixed DH sections of code were untested.
      8e1dc4d7
  21. 01 1月, 2012 1 次提交
    • D
      PR: 2658 · 4817504d
      Dr. Stephen Henson 提交于
      Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>
      Reviewed by: steve
      
      Support for TLS/DTLS heartbeats.
      4817504d
  22. 27 12月, 2011 1 次提交
    • D
      PR: 2326 · f3d781bb
      Dr. Stephen Henson 提交于
      Submitted by: Tianjie Mao <tjmao@tjmao.net>
      Reviewed by: steve
      
      Fix incorrect comma expressions and goto f_err as alert has been set.
      f3d781bb
  23. 25 11月, 2011 2 次提交
    • D
      PR: 1794 · ebba6c48
      Dr. Stephen Henson 提交于
      Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
      Reviewed by: steve
      
      Make SRP conformant to rfc 5054.
      
      Changes are:
      
      - removal of the addition state after client hello
      - removal of all pre-rfc srp alert ids
      - sending a fatal alert when there is no srp extension but when the
      server wants SRP
      - removal of unnecessary code in the client.
      ebba6c48
    • B
      Fix NPN implementation for renegotiation. · 6f31dd72
      Bodo Möller 提交于
      (Problem pointed out by Ben Murphy.)
      
      Submitted by: Adam Langley
      6f31dd72
  24. 05 9月, 2011 1 次提交
  25. 26 7月, 2011 1 次提交
  26. 08 6月, 2011 1 次提交
  27. 25 5月, 2011 1 次提交
  28. 20 5月, 2011 1 次提交
  29. 13 5月, 2011 1 次提交
  30. 12 5月, 2011 1 次提交
  31. 09 5月, 2011 1 次提交
  32. 17 3月, 2011 1 次提交
  33. 13 3月, 2011 1 次提交
  34. 17 2月, 2011 1 次提交
  35. 03 2月, 2011 1 次提交
  36. 10 10月, 2010 1 次提交
    • D
      PR: 2314 · 57594258
      Dr. Stephen Henson 提交于
      Submitted by: Mounir IDRASSI <mounir.idrassi@idrix.net>
      Reviewed by: steve
      
      Fix for double free bug in ssl/s3_clnt.c CVE-2010-2939
      57594258