1. 24 8月, 2016 1 次提交
  2. 18 8月, 2016 1 次提交
  3. 17 8月, 2016 1 次提交
  4. 15 8月, 2016 1 次提交
  5. 13 8月, 2016 1 次提交
  6. 05 8月, 2016 1 次提交
  7. 20 7月, 2016 1 次提交
  8. 19 7月, 2016 1 次提交
  9. 23 6月, 2016 1 次提交
  10. 08 6月, 2016 3 次提交
  11. 18 5月, 2016 1 次提交
  12. 17 5月, 2016 2 次提交
  13. 16 5月, 2016 1 次提交
  14. 12 5月, 2016 1 次提交
  15. 06 5月, 2016 1 次提交
  16. 29 4月, 2016 1 次提交
  17. 05 4月, 2016 2 次提交
  18. 31 3月, 2016 1 次提交
  19. 21 3月, 2016 1 次提交
  20. 17 3月, 2016 1 次提交
  21. 10 3月, 2016 3 次提交
  22. 08 3月, 2016 2 次提交
  23. 07 3月, 2016 1 次提交
    • E
      Rework the default cipherlist. · a556f342
      Emilia Kasper 提交于
       - Always prefer forward-secure handshakes.
       - Consistently order ECDSA above RSA.
       - Next, always prefer AEADs to non-AEADs, irrespective of strength.
       - Within AEADs, prefer GCM > CHACHA > CCM for a given strength.
       - Prefer TLS v1.2 ciphers to legacy ciphers.
       - Remove rarely used DSS, IDEA, SEED, CAMELLIA, CCM from the default
         list to reduce ClientHello bloat.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      a556f342
  24. 05 3月, 2016 1 次提交
  25. 04 3月, 2016 1 次提交
  26. 24 2月, 2016 1 次提交
  27. 19 2月, 2016 1 次提交
    • R
      Remove outdated DEBUG flags. · d63a5e5e
      Rich Salz 提交于
      Add -DBIO_DEBUG to --strict-warnings.
      Remove comments about outdated debugging ifdef guards.
      Remove md_rand ifdef guarding an assert; it doesn't seem used.
      Remove the conf guards in conf_api since we use OPENSSL_assert, not assert.
      For pkcs12 stuff put OPENSSL_ in front of the macro name.
      Merge TLS_DEBUG into SSL_DEBUG.
      Various things just turned on/off asserts, mainly for checking non-NULL
      arguments, which is now removed: camellia, bn_ctx, crypto/modes.
      Remove some old debug code, that basically just printed things to stderr:
        DEBUG_PRINT_UNKNOWN_CIPHERSUITES, DEBUG_ZLIB, OPENSSL_RI_DEBUG,
        RL_DEBUG, RSA_DEBUG, SCRYPT_DEBUG.
      Remove OPENSSL_SSL_DEBUG_BROKEN_PROTOCOL.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      d63a5e5e
  28. 14 2月, 2016 1 次提交
  29. 12 2月, 2016 2 次提交
  30. 09 2月, 2016 1 次提交
  31. 08 2月, 2016 1 次提交
    • M
      Handle SSL_shutdown while in init more appropriately #2 · 64f9f406
      Matt Caswell 提交于
      Previous commit 7bb196a7 attempted to "fix" a problem with the way
      SSL_shutdown() behaved whilst in mid-handshake. The original behaviour had
      SSL_shutdown() return immediately having taken no action if called mid-
      handshake with a return value of 1 (meaning everything was shutdown
      successfully). In fact the shutdown has not been successful.
      
      Commit 7bb196a7 changed that to send a close_notify anyway and then
      return. This seems to be causing some problems for some applications so
      perhaps a better (much simpler) approach is revert to the previous
      behaviour (no attempt at a shutdown), but return -1 (meaning the shutdown
      was not successful).
      
      This also fixes a bug where SSL_shutdown always returns 0 when shutdown
      *very* early in the handshake (i.e. we are still using SSLv23_method).
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      64f9f406
  32. 01 2月, 2016 1 次提交