History log of /openssl/ssl/ssl_ciph.c (Results 226 – 250 of 307)
Revision (<<< Hide revision tags) (Show revision tags >>>) Date Author Comments
# ab7e09f5 27-Oct-2008 Dr. Stephen Henson

Win32 fixes... add new directory to build system. Fix warnings.


# babb3798 12-Oct-2008 Ben Laurie

Type-checked (and modern C compliant) OBJ_bsearch.


Revision tags: OpenSSL_0_9_8i
# 3ad74edc 10-Sep-2008 Dr. Stephen Henson

Add SSL_FIPS flag for FIPS 140-2 approved ciphersuites and add a new
strength "FIPS" to represent all FIPS approved ciphersuites without NULL
encryption.


Revision tags: OpenSSL_0_9_8h
# 0e1dba93 26-Oct-2007 Dr. Stephen Henson

1. Changes for s_client.c to make it return non-zero exit code in case
of handshake failure

2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
make it recognize

1. Changes for s_client.c to make it return non-zero exit code in case
of handshake failure

2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
(required for s3_srvr to accept GOST client certificates).

3. Changes to EVP
- adding of function EVP_PKEY_CTX_get0_peerkey
- Make function EVP_PKEY_derive_set_peerkey work for context with
ENCRYPT operation, because we use peerkey field in the context to
pass non-ephemeral secret key to GOST encrypt operation.
- added EVP_PKEY_CTRL_SET_IV control command. It is really
GOST-specific, but it is used in SSL code, so it has to go
in some header file, available during libssl compilation

4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data

5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
make debugging output which depends on constants defined there, work
and other KSSL_DEBUG output fixes

6. Declaration of real GOST ciphersuites, two authentication methods
SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST

7. Implementation of these methods.

8. Support for sending unsolicited serverhello extension if GOST
ciphersuite is selected. It is require for interoperability with
CryptoPro CSP 3.0 and 3.6 and controlled by
SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
This constant is added to SSL_OP_ALL, because it does nothing, if
non-GOST ciphersuite is selected, and all implementation of GOST
include compatibility with CryptoPro.

9. Support for CertificateVerify message without length field. It is
another CryptoPro bug, but support is made unconditional, because it
does no harm for draft-conforming implementation.

10. In tls1_mac extra copy of stream mac context is no more done.
When I've written currently commited code I haven't read
EVP_DigestSignFinal manual carefully enough and haven't noticed that
it does an internal digest ctx copying.

This implementation was tested against
1. CryptoPro CSP 3.6 client and server
2. Cryptopro CSP 3.0 server

show more ...


Revision tags: OpenSSL_0_9_8g, OpenSSL_0_9_8f, FIPS_098_TEST_8, FIPS_098_TEST_7
# a6fbcb42 07-Sep-2007 Dr. Stephen Henson

Change safestack reimplementation to match 0.9.8.

Fix additional gcc 4.2 value not used warnings.


Revision tags: FIPS_098_TEST_6
# 81025661 31-Aug-2007 Dr. Stephen Henson

Update ssl code to support digests other than MD5+SHA1 in handshake.

Submitted by: Victor B. Wagner <vitus@cryptocom.ru>


Revision tags: FIPS_098_TEST_5, FIPS_098_TEST_4, FIPS_098_TEST_3, FIPS_098_TEST_2, FIPS_098_TEST_1
# b948e2c5 04-Jun-2007 Dr. Stephen Henson

Update ssl library to support EVP_PKEY MAC API. Include generic MAC support.


# 96afc1cf 23-Apr-2007 Bodo Möller

Add SEED encryption algorithm.

PR: 1503
Submitted by: KISA
Reviewed by: Bodo Moeller


# 9981a51e 23-Mar-2007 Dr. Stephen Henson

Stage 1 GOST ciphersuite support.

Submitted by: ran@cryptocom.ru
Reviewed by: steve@openssl.org


Revision tags: OpenSSL_0_9_7m, OpenSSL_0_9_8e
# aa79dd68 21-Feb-2007 Bodo Möller

prefer SHA1 over MD5 (this affects the Kerberos ciphersuites)


# 114c9c36 20-Feb-2007 Bodo Möller

SSL_kKRB5 ciphersuites shouldn't be preferred by default


# fd5bc65c 20-Feb-2007 Bodo Möller

Improve ciphersuite order stability when disabling ciphersuites.
Change ssl_create_cipher_list() to prefer ephemeral ECDH over
ephemeral DH.


# e0418639 20-Feb-2007 Bodo Möller

fix a typo in the new ciphersuite ordering code


# 0a05123a 19-Feb-2007 Bodo Möller

Include "!eNULL" in SSL_DEFAULT_CIPHER_LIST to make sure that a
ciphersuite string such as "DEFAULT:RSA" cannot enable
authentication-only ciphersuites.

Also, change ssl_create_ciphe

Include "!eNULL" in SSL_DEFAULT_CIPHER_LIST to make sure that a
ciphersuite string such as "DEFAULT:RSA" cannot enable
authentication-only ciphersuites.

Also, change ssl_create_cipher_list() so that it no longer
starts with an arbitrary ciphersuite ordering, but instead
uses the logic that we previously had in SSL_DEFEAULT_CIPHER_LIST.
SSL_DEFAULT_CIPHER_LIST simplifies into just "ALL:!aNULL:!eNULL".

show more ...


# 52b8dad8 17-Feb-2007 Bodo Möller

Reorganize the data used for SSL ciphersuite pattern matching.
This change resolves a number of problems and obviates multiple kludges.
A new feature is that you can now say "AES256" or "AES1

Reorganize the data used for SSL ciphersuite pattern matching.
This change resolves a number of problems and obviates multiple kludges.
A new feature is that you can now say "AES256" or "AES128" (not just
"AES", which enables both).

In some cases the ciphersuite list generated from a given string is
affected by this change. I hope this is just in those cases where the
previous behaviour did not make sense.

show more ...


# 39d764ed 03-Jan-2007 Nils Larsch

remove undefined constant


Revision tags: OpenSSL_0_9_7l, OpenSSL_0_9_8d
# ed65f7dc 11-Sep-2006 Bodo Möller

ensure that ciphersuite strings such as "RC4-MD5" match the SSL 2.0
ciphersuite as well


Revision tags: OpenSSL_0_9_8c, OpenSSL_0_9_7k
# 777c47ac 28-Aug-2006 Ben Laurie

Make things static that should be. Declare stuff in headers that should be.
Fix warnings.


# ed3ecd80 15-Jun-2006 Bodo Möller

Error messages for client ECC cert verification.

Also, change the default ciphersuite to give some prefererence to
ciphersuites with forwared secrecy (rather than using a random order).


# 09e20e0b 15-Jun-2006 Bodo Möller

Fix another new bug in the cipherstring logic.


# a717831d 15-Jun-2006 Bodo Möller

Fix another bug introduced yesterday when deleting Fortezza stuff:
make sure 'mask' is initialized in ssl_cipher_get_disabled().

Also simplify code by removing some unused arguments in s

Fix another bug introduced yesterday when deleting Fortezza stuff:
make sure 'mask' is initialized in ssl_cipher_get_disabled().

Also simplify code by removing some unused arguments in static functions.

show more ...


# 89bbe14c 14-Jun-2006 Bodo Möller

Ciphersuite string bugfixes, and ECC-related (re-)definitions.


# 675f605d 14-Jun-2006 Bodo Möller

Thread-safety fixes


# f3dea9a5 09-Jun-2006 Bodo Möller

Camellia cipher, contributed by NTT

Submitted by: Masashi Fujita
Reviewed by: Bodo Moeller


Revision tags: OpenSSL_0_9_7j, OpenSSL_0_9_8b
# ba1ba5f0 15-Apr-2006 Dr. Stephen Henson

If cipher list contains a match for an explicit ciphersuite only match that
one suite.


12345678910>>...13