History log of /openssl/ssl/s3_lib.c (Results 226 – 250 of 550)
Revision (<<< Hide revision tags) (Show revision tags >>>) Date Author Comments
# 7bb196a7 07-Dec-2015 Matt Caswell

Handle SSL_shutdown while in init more appropriately

Calling SSL_shutdown while in init previously gave a "1" response, meaning
everything was successfully closed down (even though it wa

Handle SSL_shutdown while in init more appropriately

Calling SSL_shutdown while in init previously gave a "1" response, meaning
everything was successfully closed down (even though it wasn't). Better is
to send our close_notify, but fail when trying to receive one.

The problem with doing a shutdown while in the middle of a handshake is
that once our close_notify is sent we shouldn't really do anything else
(including process handshake/CCS messages) until we've received a
close_notify back from the peer. However the peer might send a CCS before
acting on our close_notify - so we won't be able to read it because we're
not acting on CCS messages!

Reviewed-by: Viktor Dukhovni <viktor@openssl.org>

show more ...


# 89577287 19-Jan-2016 Dmitry Belyavsky

Fix GOST2012-NULL-GOST12

Fix a typo in the definition of the GOST2012-NULL-GOST12 ciphersuite.

RT#4213

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: M

Fix GOST2012-NULL-GOST12

Fix a typo in the definition of the GOST2012-NULL-GOST12 ciphersuite.

RT#4213

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>

show more ...


# 0982ecaa 16-Jan-2016 Viktor Dukhovni

Empty SNI names are not valid

While empty inputs to SSL_set1_host() clear the reference identifier
list.

Reviewed-by: Rich Salz <rsalz@openssl.org>


# 4a640fb6 23-Dec-2015 Dr. Stephen Henson

Fix declarations and constification for inline stack.

Reviewed-by: Richard Levitte <levitte@openssl.org>


# 4fa52141 29-Dec-2015 Viktor Dukhovni

Protocol version selection and negotiation rewrite

The protocol selection code is now consolidated in a few consecutive
short functions in a single file and is table driven. Protocol-sp

Protocol version selection and negotiation rewrite

The protocol selection code is now consolidated in a few consecutive
short functions in a single file and is table driven. Protocol-specific
constraints that influence negotiation are moved into the flags
field of the method structure. The same protocol version constraints
are now applied in all code paths. It is now much easier to add
new protocol versions without reworking the protocol selection
logic.

In the presence of "holes" in the list of enabled client protocols
we no longer select client protocols below the hole based on a
subset of the constraints and then fail shortly after when it is
found that these don't meet the remaining constraints (suiteb, FIPS,
security level, ...). Ideally, with the new min/max controls users
will be less likely to create "holes" in the first place.

Reviewed-by: Kurt Roeckx <kurt@openssl.org>

show more ...


# 1e0784ff 01-Jan-2016 Ben Laurie

Fix no-dh.

Reviewed-by: Stephen Henson <steve@openssl.org>


# b22d7113 24-Dec-2015 Dr. Stephen Henson

fix no-ec

Reviewed-by: Matt Caswell <matt@openssl.org>


# e2b420fd 17-Dec-2015 Dr. Stephen Henson

Server side EVP_PKEY DH support

Reviewed-by: Matt Caswell <matt@openssl.org>


# 6c4e6670 18-Dec-2015 Dr. Stephen Henson

utility function

Reviewed-by: Matt Caswell <matt@openssl.org>


# fb79abe3 17-Dec-2015 Dr. Stephen Henson

EVP_PKEY DH client support.

Reviewed-by: Matt Caswell <matt@openssl.org>


# ffaef3f1 17-Dec-2015 Dr. Stephen Henson

Always generate DH keys for ephemeral DH cipher suites.

Reviewed-by: Matt Caswell <matt@openssl.org>


# 1c9ed1d8 22-Dec-2015 Kurt Roeckx

Remove SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER and SSL_OP_TLS_D5_BUG support.

Suggested by David Benjamin

Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Viktor Dukhovni <open

Remove SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER and SSL_OP_TLS_D5_BUG support.

Suggested by David Benjamin

Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Viktor Dukhovni <openssl-users@dukhovni.org>

MR: #1520

show more ...


# bc71f910 15-Dec-2015 Dr. Stephen Henson

Remove fixed DH ciphersuites.

Remove all fixed DH ciphersuites and associated logic.

Reviewed-by: Matt Caswell <matt@openssl.org>


# 7644a9ae 16-Dec-2015 Rich Salz

Rename some BUF_xxx to OPENSSL_xxx

Rename BUF_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
to OPENSSL_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
Add #define's for the old nam

Rename some BUF_xxx to OPENSSL_xxx

Rename BUF_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
to OPENSSL_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
Add #define's for the old names.
Add CRYPTO_{memdup,strndup}, called by OPENSSL_{memdup,strndup} macros.

Reviewed-by: Tim Hudson <tjh@openssl.org>

show more ...


# e4cf8663 16-Dec-2015 Dr. Stephen Henson

fix for no-ec

Reviewed-by: Matt Caswell <matt@openssl.org>


# 61dd9f7a 14-Dec-2015 Dr. Stephen Henson

Use EVP_PKEY for client side EC.

Reviewed-by: Richard Levitte <levitte@openssl.org>


# 880d9d86 13-Dec-2015 Dr. Stephen Henson

Use EVP_PKEY for server EC.

Reviewed-by: Richard Levitte <levitte@openssl.org>


# 3f3504bd 15-Dec-2015 Dr. Stephen Henson

Add ECDH/DH utility functions.

Reviewed-by: Richard Levitte <levitte@openssl.org>


# c66ce5eb 12-Dec-2015 Dr. Stephen Henson

Remove ECDH client auth code.

Remove incomplete non-functional ECDH client authentication code.

Reviewed-by: Richard Levitte <levitte@openssl.org>


# 8ca8fc48 11-Dec-2015 Matt Caswell

Fix compile failure

Fix compile failure introduced by commit 94d61512360c due to a typo.

Reviewed-by: Richard Levitte <levitte@openssl.org>


# 94d61512 12-Sep-2015 Ben Laurie

Make no-dh work, plus other no-dh problems found by Richard.

Reviewed-by: Rich Salz <rsalz@openssl.org>


# a76ba82c 09-Dec-2015 Andy Polyakov

Wire ChaCha20-Poly1305 to TLS.

Reviewed-by: Richard Levitte <levitte@openssl.org>


# 1c735804 06-Dec-2015 Viktor Dukhovni

Really disable 56-bit (single-DES) ciphers

Reviewed-by: Kurt Roeckx <kurt@openssl.org>


# 361a1191 05-Dec-2015 Kurt Roeckx

Remove support for all 40 and 56 bit ciphers.

Reviewed-by: Rich Salz <rsalz@openssl.org>

MR: #364


# fe6ef247 04-Dec-2015 Kurt Roeckx

Remove SSL_{CTX_}set_ecdh_auto() and always enable ECDH

Reviewed-by: Dr. Stephen Henson <steve@openssl.org>


12345678910>>...22