#
7bb196a7 |
| 07-Dec-2015 |
Matt Caswell |
Handle SSL_shutdown while in init more appropriately Calling SSL_shutdown while in init previously gave a "1" response, meaning everything was successfully closed down (even though it wa
Handle SSL_shutdown while in init more appropriately Calling SSL_shutdown while in init previously gave a "1" response, meaning everything was successfully closed down (even though it wasn't). Better is to send our close_notify, but fail when trying to receive one. The problem with doing a shutdown while in the middle of a handshake is that once our close_notify is sent we shouldn't really do anything else (including process handshake/CCS messages) until we've received a close_notify back from the peer. However the peer might send a CCS before acting on our close_notify - so we won't be able to read it because we're not acting on CCS messages! Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
show more ...
|
#
89577287 |
| 19-Jan-2016 |
Dmitry Belyavsky |
Fix GOST2012-NULL-GOST12 Fix a typo in the definition of the GOST2012-NULL-GOST12 ciphersuite. RT#4213 Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: M
Fix GOST2012-NULL-GOST12 Fix a typo in the definition of the GOST2012-NULL-GOST12 ciphersuite. RT#4213 Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org>
show more ...
|
#
0982ecaa |
| 16-Jan-2016 |
Viktor Dukhovni |
Empty SNI names are not valid While empty inputs to SSL_set1_host() clear the reference identifier list. Reviewed-by: Rich Salz <rsalz@openssl.org>
|
#
4a640fb6 |
| 23-Dec-2015 |
Dr. Stephen Henson |
Fix declarations and constification for inline stack. Reviewed-by: Richard Levitte <levitte@openssl.org>
|
#
4fa52141 |
| 29-Dec-2015 |
Viktor Dukhovni |
Protocol version selection and negotiation rewrite The protocol selection code is now consolidated in a few consecutive short functions in a single file and is table driven. Protocol-sp
Protocol version selection and negotiation rewrite The protocol selection code is now consolidated in a few consecutive short functions in a single file and is table driven. Protocol-specific constraints that influence negotiation are moved into the flags field of the method structure. The same protocol version constraints are now applied in all code paths. It is now much easier to add new protocol versions without reworking the protocol selection logic. In the presence of "holes" in the list of enabled client protocols we no longer select client protocols below the hole based on a subset of the constraints and then fail shortly after when it is found that these don't meet the remaining constraints (suiteb, FIPS, security level, ...). Ideally, with the new min/max controls users will be less likely to create "holes" in the first place. Reviewed-by: Kurt Roeckx <kurt@openssl.org>
show more ...
|
#
1e0784ff |
| 01-Jan-2016 |
Ben Laurie |
Fix no-dh. Reviewed-by: Stephen Henson <steve@openssl.org>
|
#
b22d7113 |
| 24-Dec-2015 |
Dr. Stephen Henson |
fix no-ec Reviewed-by: Matt Caswell <matt@openssl.org>
|
#
e2b420fd |
| 17-Dec-2015 |
Dr. Stephen Henson |
Server side EVP_PKEY DH support Reviewed-by: Matt Caswell <matt@openssl.org>
|
#
6c4e6670 |
| 18-Dec-2015 |
Dr. Stephen Henson |
utility function Reviewed-by: Matt Caswell <matt@openssl.org>
|
#
fb79abe3 |
| 17-Dec-2015 |
Dr. Stephen Henson |
EVP_PKEY DH client support. Reviewed-by: Matt Caswell <matt@openssl.org>
|
#
ffaef3f1 |
| 17-Dec-2015 |
Dr. Stephen Henson |
Always generate DH keys for ephemeral DH cipher suites. Reviewed-by: Matt Caswell <matt@openssl.org>
|
#
1c9ed1d8 |
| 22-Dec-2015 |
Kurt Roeckx |
Remove SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER and SSL_OP_TLS_D5_BUG support. Suggested by David Benjamin Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Viktor Dukhovni <open
Remove SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER and SSL_OP_TLS_D5_BUG support. Suggested by David Benjamin Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Viktor Dukhovni <openssl-users@dukhovni.org> MR: #1520
show more ...
|
#
bc71f910 |
| 15-Dec-2015 |
Dr. Stephen Henson |
Remove fixed DH ciphersuites. Remove all fixed DH ciphersuites and associated logic. Reviewed-by: Matt Caswell <matt@openssl.org>
|
#
7644a9ae |
| 16-Dec-2015 |
Rich Salz |
Rename some BUF_xxx to OPENSSL_xxx Rename BUF_{strdup,strlcat,strlcpy,memdup,strndup,strnlen} to OPENSSL_{strdup,strlcat,strlcpy,memdup,strndup,strnlen} Add #define's for the old nam
Rename some BUF_xxx to OPENSSL_xxx Rename BUF_{strdup,strlcat,strlcpy,memdup,strndup,strnlen} to OPENSSL_{strdup,strlcat,strlcpy,memdup,strndup,strnlen} Add #define's for the old names. Add CRYPTO_{memdup,strndup}, called by OPENSSL_{memdup,strndup} macros. Reviewed-by: Tim Hudson <tjh@openssl.org>
show more ...
|
#
e4cf8663 |
| 16-Dec-2015 |
Dr. Stephen Henson |
fix for no-ec Reviewed-by: Matt Caswell <matt@openssl.org>
|
#
61dd9f7a |
| 14-Dec-2015 |
Dr. Stephen Henson |
Use EVP_PKEY for client side EC. Reviewed-by: Richard Levitte <levitte@openssl.org>
|
#
880d9d86 |
| 13-Dec-2015 |
Dr. Stephen Henson |
Use EVP_PKEY for server EC. Reviewed-by: Richard Levitte <levitte@openssl.org>
|
#
3f3504bd |
| 15-Dec-2015 |
Dr. Stephen Henson |
Add ECDH/DH utility functions. Reviewed-by: Richard Levitte <levitte@openssl.org>
|
#
c66ce5eb |
| 12-Dec-2015 |
Dr. Stephen Henson |
Remove ECDH client auth code. Remove incomplete non-functional ECDH client authentication code. Reviewed-by: Richard Levitte <levitte@openssl.org>
|
#
8ca8fc48 |
| 11-Dec-2015 |
Matt Caswell |
Fix compile failure Fix compile failure introduced by commit 94d61512360c due to a typo. Reviewed-by: Richard Levitte <levitte@openssl.org>
|
#
94d61512 |
| 12-Sep-2015 |
Ben Laurie |
Make no-dh work, plus other no-dh problems found by Richard. Reviewed-by: Rich Salz <rsalz@openssl.org>
|
#
a76ba82c |
| 09-Dec-2015 |
Andy Polyakov |
Wire ChaCha20-Poly1305 to TLS. Reviewed-by: Richard Levitte <levitte@openssl.org>
|
#
1c735804 |
| 06-Dec-2015 |
Viktor Dukhovni |
Really disable 56-bit (single-DES) ciphers Reviewed-by: Kurt Roeckx <kurt@openssl.org>
|
#
361a1191 |
| 05-Dec-2015 |
Kurt Roeckx |
Remove support for all 40 and 56 bit ciphers. Reviewed-by: Rich Salz <rsalz@openssl.org> MR: #364
|
#
fe6ef247 |
| 04-Dec-2015 |
Kurt Roeckx |
Remove SSL_{CTX_}set_ecdh_auto() and always enable ECDH Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
|