- 12 3月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" by Yuval Yarom and Naomi Benger. Details can be obtained from: http://eprint.iacr.org/2014/140 Thanks to Yuval Yarom and Naomi Benger for discovering this flaw and to Yuval Yarom for supplying a fix. (cherry picked from commit 2198be3483259de374f91e57d247d0fc667aef29) Conflicts: CHANGES
-
- 04 1月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Fix a limitation in SSL_CTX_use_certificate_chain_file(): use algorithm specific chains instead of the shared chain. Update docs.
-
- 21 12月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
For DTLS we might need to retransmit messages from the previous session so keep a copy of write context in DTLS retransmission buffers instead of replacing it after sending CCS. CVE-2013-6450. (cherry picked from commit 34628967f1e65dc8f34e000f0f5518e21afbfc7b)
-
- 13 12月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Fix padding calculation for different SSL_METHOD types. Use the standard name as used in draft-agl-tls-padding-02
-
- 07 11月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Based on a suggested workaround for the "TLS hang bug" (see FAQ and PR#2771): if the TLS Client Hello record length value would otherwise be > 255 and less that 512 pad with a dummy extension containing zeroes so it is at least 512. To enable it use an unused extension number (for example 0x4242) using e.g. -DTLSEXT_TYPE_wtf=0x4242 WARNING: EXPERIMENTAL, SUBJECT TO CHANGE.
-
- 22 10月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 18 9月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Add various functions to allocate and set the fields of an ECDSA_METHOD structure.
-
- 17 9月, 2013 2 次提交
-
-
由 Bodo Moeller 提交于
(This went into 1.0.2 too, so it's not actually a change between 1.0.x and 1.1.0.)
-
由 Bodo Moeller 提交于
the main branch (http://cvs.openssl.org/chngview?cn=19322) later added to the 1.0.2 branch (http://cvs.openssl.org/chngview?cn=23113), and thus not a change "between 1.0.2 and 1.1.0".
-
- 16 9月, 2013 1 次提交
-
-
由 Bodo Moeller 提交于
(Various changes from the master branch are now in the 1.0.2 branch too.)
-
- 14 9月, 2013 1 次提交
-
-
由 Rob Stradling 提交于
-
- 08 9月, 2013 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Experimental support for encrypt then mac from draft-gutmann-tls-encrypt-then-mac-02.txt To enable it set the appropriate extension number (0x10 for the test server) using e.g. -DTLSEXT_TYPE_encrypt_then_mac=0x10 For non-compliant peers (i.e. just about everything) this should have no effect.
-
- 06 9月, 2013 2 次提交
-
-
由 Scott Deboy 提交于
Add callbacks supporting generation and retrieval of supplemental data entries, facilitating RFC 5878 (TLS auth extensions) Removed prior audit proof logic - audit proof support was implemented using the generic TLS extension API Tests exercising the new supplemental data registration and callback api can be found in ssltest.c. Implemented changes to s_server and s_client to exercise supplemental data callbacks via the -auth argument, as well as additional flags to exercise supplemental data being sent only during renegotiation.
-
-
- 18 7月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Add support for key wrap algorithms via EVP interface. Generalise AES wrap algorithm and add to modes, making existing AES wrap algorithm a special case. Move test code to evptests.txt
-
- 05 7月, 2013 1 次提交
-
-
由 Jeff Walton 提交于
-
- 22 6月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 13 6月, 2013 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Extend OAEP support. Generalise the OAEP padding functions to support arbitrary digests. Extend EVP_PKEY RSA method to handle the new OAEP padding functions and add ctrls to set the additional parameters.
-
由 Trevor 提交于
Contributed by Trevor Perrin.
-
- 09 4月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Add new methods DTLS_*_method() which support both DTLS 1.0 and DTLS 1.2 and pick the highest version the peer supports during negotiation. As with SSL/TLS options can change this behaviour specifically SSL_OP_NO_DTLSv1 and SSL_OP_NO_DTLSv1_2.
-
- 19 12月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 12 12月, 2012 1 次提交
-
-
由 Ben Laurie 提交于
-
- 08 12月, 2012 1 次提交
-
-
由 Ben Laurie 提交于
-
- 07 12月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Just a sample, real world applications would have to be cleverer.
-
- 06 12月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Add new verify options to set checks. Remove previous -check* commands from s_client and s_server.
-
- 05 12月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 03 12月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 29 11月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
structures using HTTP. Add wrapper function to handle CRL download.
-
- 28 11月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
from X509_STORE_CTX.
-
- 22 11月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 19 11月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 18 11月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Contributed by: Florian Weimer <fweimer@redhat.com> Fixes to X509 hostname and email address checking. Wildcard matching support. New test program and manual page.
-
- 17 11月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 08 10月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
certificate. Add options to s_client, s_server and x509 utilities to print results of checks.
-
- 20 9月, 2012 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 14 9月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
by client and send back to server. Also prints an abbreviated summary of the connection parameters.
-
- 13 9月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
New option -verify_quiet to shut up the verify callback unless there is an error.
-
- 12 9月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
client hello message. Previously this could only be retrieved on an initial connection and it was impossible to determine the cipher IDs of any uknown ciphersuites.
-
- 11 9月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
change the current certificate (in s->cert->key) to the one used and then SSL_get_certificate and SSL_get_privatekey will automatically work.
-