1. 27 3月, 2014 1 次提交
    • D
      Update chain building function. · e970f63d
      Dr. Stephen Henson 提交于
      Don't clear verification errors from the error queue unless
      SSL_BUILD_CHAIN_FLAG_CLEAR_ERROR is set.
      
      If errors occur during verification and SSL_BUILD_CHAIN_FLAG_IGNORE_ERROR
      is set return 2 so applications can issue warnings.
      (cherry picked from commit 2dd6976f6d02f98b30c376951ac38f780a86b3b5)
      e970f63d
  2. 10 3月, 2014 1 次提交
  3. 02 3月, 2014 1 次提交
    • D
      Add function to free compression methods. · db7b5e0d
      Dr. Stephen Henson 提交于
      Although the memory allocated by compression methods is fixed and
      cannot grow over time it can cause warnings in some leak checking
      tools. The function SSL_COMP_free_compression_methods() will free
      and zero the list of supported compression methods. This should
      *only* be called in a single threaded context when an application
      is shutting down to avoid interfering with existing contexts
      attempting to look up compression methods.
      (cherry picked from commit 976c58302b13d085edb3ab822f5eac4b2f1bff95)
      db7b5e0d
  4. 23 2月, 2014 1 次提交
    • D
      New chain building flags. · 13dc3ce9
      Dr. Stephen Henson 提交于
      New flags to build certificate chains. The can be used to rearrange
      the chain so all an application needs to do is add all certificates
      in arbitrary order and then build the chain to check and correct them.
      
      Add verify error code when building chain.
      
      Update docs.
      13dc3ce9
  5. 22 2月, 2014 1 次提交
  6. 21 2月, 2014 1 次提交
  7. 19 2月, 2014 1 次提交
  8. 16 2月, 2014 1 次提交
    • D
      Restore SSL_OP_MSIE_SSLV2_RSA_PADDING · 3c6c139a
      Dr. Stephen Henson 提交于
      The flag SSL_OP_MSIE_SSLV2_RSA_PADDING hasn't done anything since OpenSSL
      0.9.7h but deleting it will break source compatibility with any software
      that references it. Restore it but #define to zero.
      (cherry picked from commit b17d6b8d1d49fa4732deff17cfd1833616af0d9c)
      3c6c139a
  9. 13 2月, 2014 1 次提交
  10. 06 2月, 2014 5 次提交
  11. 03 2月, 2014 1 次提交
    • D
      New ctrl to set current certificate. · 0f78819c
      Dr. Stephen Henson 提交于
      New ctrl sets current certificate based on certain criteria. Currently
      two options: set the first valid certificate as current and set the
      next valid certificate as current. Using these an application can
      iterate over all certificates in an SSL_CTX or SSL structure.
      0f78819c
  12. 27 1月, 2014 1 次提交
  13. 16 1月, 2014 1 次提交
  14. 09 1月, 2014 2 次提交
  15. 13 12月, 2013 1 次提交
  16. 19 11月, 2013 2 次提交
  17. 14 11月, 2013 2 次提交
    • P
      Fix compilation with no-nextprotoneg. · 2911575c
      Piotr Sikora 提交于
      PR#3106
      2911575c
    • R
      Additional "chain_cert" functions. · 7b6b246f
      Rob Stradling 提交于
      PR#3169
      
      This patch, which currently applies successfully against master and
      1_0_2, adds the following functions:
      
      SSL_[CTX_]select_current_cert() - set the current certificate without
      disturbing the existing structure.
      
      SSL_[CTX_]get0_chain_certs() - get the current certificate's chain.
      
      SSL_[CTX_]clear_chain_certs() - clear the current certificate's chain.
      
      The patch also adds these functions to, and fixes some existing errors
      in, SSL_CTX_add1_chain_cert.pod.
      7b6b246f
  18. 06 11月, 2013 1 次提交
  19. 21 10月, 2013 2 次提交
    • N
      Do not include a timestamp in the Client/ServerHello Random field. · 2016265d
      Nick Mathewson 提交于
      Instead, send random bytes, unless SSL_SEND_{CLIENT,SERVER}RANDOM_MODE
      is set.
      
      This is a forward-port of commits:
        4af793036f6ef4f0a1078e5d7155426a98d50e37
        f4c93b46edb51da71f09eda99e83eaf193a33c08
        3da721dac9382c48812c8eba455528fd59af2eef
        2583270191a8b27eed303c03ece1da97b9b69fd3
      
      While the gmt_unix_time record was added in an ostensible attempt to
      mitigate the dangers of a bad RNG, its presence leaks the host's view
      of the current time in the clear.  This minor leak can help
      fingerprint TLS instances across networks and protocols... and what's
      worse, it's doubtful thet the gmt_unix_time record does any good at
      all for its intended purpose, since:
      
          * It's quite possible to open two TLS connections in one second.
      
          * If the PRNG output is prone to repeat itself, ephemeral
            handshakes (and who knows what else besides) are broken.
      2016265d
    • D
      Extend SSL_CONF · ec2f7e56
      Dr. Stephen Henson 提交于
      Extend SSL_CONF to return command value types.
      
      Add certificate and key options.
      
      Update documentation.
      ec2f7e56
  20. 25 9月, 2013 1 次提交
  21. 18 9月, 2013 1 次提交
  22. 06 9月, 2013 2 次提交
    • B
      More cleanup. · 5eda213e
      Ben Laurie 提交于
      5eda213e
    • S
      Add callbacks supporting generation and retrieval of supplemental data... · 36086186
      Scott Deboy 提交于
      Add callbacks supporting generation and retrieval of supplemental data entries, facilitating RFC 5878 (TLS auth extensions)
      Removed prior audit proof logic - audit proof support was implemented using the generic TLS extension API
      Tests exercising the new supplemental data registration and callback api can be found in ssltest.c.
      Implemented changes to s_server and s_client to exercise supplemental data callbacks via the -auth argument, as well as additional flags to exercise supplemental data being sent only during renegotiation.
      36086186
  23. 05 9月, 2013 1 次提交
  24. 22 7月, 2013 1 次提交
  25. 28 6月, 2013 1 次提交
  26. 18 6月, 2013 1 次提交
    • T
      Cleanup of custom extension stuff. · 9cd50f73
      Trevor 提交于
      serverinfo rejects non-empty extensions.
      
      Omit extension if no relevant serverinfo data.
      
      Improve error-handling in serverinfo callback.
      
      Cosmetic cleanups.
      
      s_client documentation.
      
      s_server documentation.
      
      SSL_CTX_serverinfo documentation.
      
      Cleaup -1 and NULL callback handling for custom extensions, add tests.
      
      Cleanup ssl_rsa.c serverinfo code.
      
      Whitespace cleanup.
      
      Improve comments in ssl.h for serverinfo.
      
      Whitespace.
      
      Cosmetic cleanup.
      
      Reject non-zero-len serverinfo extensions.
      
      Whitespace.
      
      Make it build.
      9cd50f73
  27. 14 6月, 2013 1 次提交
  28. 13 6月, 2013 1 次提交
  29. 09 4月, 2013 2 次提交
    • D
      Suite B support for DTLS 1.2 · 4544f0a6
      Dr. Stephen Henson 提交于
      Check for Suite B support using method flags instead of version numbers:
      anything supporting TLS 1.2 cipher suites will also support Suite B.
      
      Return an error if an attempt to use DTLS 1.0 is made in Suite B mode.
      4544f0a6
    • D
      Dual DTLS version methods. · c6913eeb
      Dr. Stephen Henson 提交于
      Add new methods DTLS_*_method() which support both DTLS 1.0 and DTLS 1.2 and
      pick the highest version the peer supports during negotiation.
      
      As with SSL/TLS options can change this behaviour specifically
      SSL_OP_NO_DTLSv1 and SSL_OP_NO_DTLSv1_2.
      c6913eeb
  30. 26 3月, 2013 1 次提交
    • D
      Provisional DTLS 1.2 support. · c3b344e3
      Dr. Stephen Henson 提交于
      Add correct flags for DTLS 1.2, update s_server and s_client to handle
      DTLS 1.2 methods.
      
      Currently no support for version negotiation: i.e. if client/server selects
      DTLS 1.2 it is that or nothing.
      c3b344e3