Revision tags: OpenSSL-fips-2_0-pl1, OpenSSL-fips-2_0_2, OpenSSL-fips-2_0_1 |
|
#
323fa645 |
| 30-Sep-2012 |
Dr. Stephen Henson |
If OPENSSL_SSL_DEBUG_BROKEN_PROTOCOL is set allow the use of "SCSV" as a ciphersuite to position the SCSV value in different places for testing purposes.
|
#
94a209d8 |
| 12-Sep-2012 |
Dr. Stephen Henson |
Add ctrl and utility functions to retrieve raw cipher list sent by client in client hello message. Previously this could only be retrieved on an initial connection and it was impossible to de
Add ctrl and utility functions to retrieve raw cipher list sent by client in client hello message. Previously this could only be retrieved on an initial connection and it was impossible to determine the cipher IDs of any uknown ciphersuites.
show more ...
|
#
33a8de69 |
| 08-Sep-2012 |
Dr. Stephen Henson |
new ctrl to retrive value of received temporary key in server key exchange message, print out details in s_client
|
#
319354eb |
| 07-Sep-2012 |
Dr. Stephen Henson |
store and print out message digest peer signed with in TLS 1.2
|
#
2ea80354 |
| 15-Aug-2012 |
Dr. Stephen Henson |
Add three Suite B modes to TLS code, supporting RFC6460.
|
#
74ecfab4 |
| 23-Jul-2012 |
Dr. Stephen Henson |
Add support for certificate stores in CERT structure. This makes it possible to have different stores per SSL structure or one store in the parent SSL_CTX. Include distint stores for certific
Add support for certificate stores in CERT structure. This makes it possible to have different stores per SSL structure or one store in the parent SSL_CTX. Include distint stores for certificate chain verification and chain building. New ctrl SSL_CTRL_BUILD_CERT_CHAIN to build and store a certificate chain in CERT structure: returing an error if the chain cannot be built: this will allow applications to test if a chain is correctly configured. Note: if the CERT based stores are not set then the parent SSL_CTX store is used to retain compatibility with existing behaviour.
show more ...
|
#
9f27b1ee |
| 08-Jul-2012 |
Dr. Stephen Henson |
Add new ctrl to retrieve client certificate types, print out details in s_client. Also add ctrl to set client certificate types. If not used sensible values will be included based on
Add new ctrl to retrieve client certificate types, print out details in s_client. Also add ctrl to set client certificate types. If not used sensible values will be included based on supported signature algorithms: for example if we don't include any DSA signing algorithms the DSA certificate type is omitted. Fix restriction in old code where certificate types would be truncated if it exceeded TLS_CT_NUMBER.
show more ...
|
#
3dbc46df |
| 03-Jul-2012 |
Dr. Stephen Henson |
Separate client and server permitted signature algorithm support: by default the permitted signature algorithms for server and client authentication are the same but it is now possible to set
Separate client and server permitted signature algorithm support: by default the permitted signature algorithms for server and client authentication are the same but it is now possible to set different algorithms for client authentication only.
show more ...
|
#
0f39bab0 |
| 28-Jun-2012 |
Dr. Stephen Henson |
Function tls1_check_ec_server_key is now redundant as we make appropriate checks in tls1_check_chain.
|
#
d61ff83b |
| 28-Jun-2012 |
Dr. Stephen Henson |
Add new "valid_flags" field to CERT_PKEY structure which determines what the certificate can be used for (if anything). Set valid_flags field in new tls1_check_chain function. Simplify ssl_se
Add new "valid_flags" field to CERT_PKEY structure which determines what the certificate can be used for (if anything). Set valid_flags field in new tls1_check_chain function. Simplify ssl_set_cert_masks which used to have similar checks in it. Add new "cert_flags" field to CERT structure and include a "strict mode". This enforces some TLS certificate requirements (such as only permitting certificate signature algorithms contained in the supported algorithms extension) which some implementations ignore: this option should be used with caution as it could cause interoperability issues.
show more ...
|
#
0f229cce |
| 22-Jun-2012 |
Dr. Stephen Henson |
Add support for application defined signature algorithms for use with TLS v1.2. These are sent as an extension for clients and during a certificate request for servers. TODO: add sup
Add support for application defined signature algorithms for use with TLS v1.2. These are sent as an extension for clients and during a certificate request for servers. TODO: add support for shared signature algorithms, respect shared algorithms when deciding which ciphersuites and certificates to permit.
show more ...
|
#
195b9eee |
| 11-Jun-2012 |
Ben Laurie |
Fix memory leak.
|
#
32e62d1c |
| 06-Jun-2012 |
Ben Laurie |
Fix memory leak.
|
#
a9e1c50b |
| 30-May-2012 |
Ben Laurie |
RFC 5878 support.
|
#
efb19e13 |
| 10-May-2012 |
Dr. Stephen Henson |
PR: 2806 Submitted by: PK <runningdoglackey@yahoo.com> Correct ciphersuite signature algorithm definitions.
|
Revision tags: OpenSSL_1_0_1c, OpenSSL_1_0_0j, OpenSSL_0_9_8x, OpenSSL_1_0_1b, OpenSSL_0_9_8w, OpenSSL_1_0_1a, OpenSSL_0_9_8v, OpenSSL_1_0_0i |
|
#
d3ddf022 |
| 17-Apr-2012 |
Bodo Möller |
Disable SHA-2 ciphersuites in < TLS 1.2 connections. (TLS 1.2 clients could end up negotiating these with an OpenSSL server with TLS 1.2 disabled, which is problematic.) Submitt
Disable SHA-2 ciphersuites in < TLS 1.2 connections. (TLS 1.2 clients could end up negotiating these with an OpenSSL server with TLS 1.2 disabled, which is problematic.) Submitted by: Adam Langley
show more ...
|
#
a4352630 |
| 05-Apr-2012 |
Dr. Stephen Henson |
Add support for automatic ECDH temporary key parameter selection. When enabled instead of requiring an application to hard code a (possibly inappropriate) parameter set and delve into EC inte
Add support for automatic ECDH temporary key parameter selection. When enabled instead of requiring an application to hard code a (possibly inappropriate) parameter set and delve into EC internals we just automatically use the preferred curve.
show more ...
|
#
fd2b65ce |
| 04-Apr-2012 |
Dr. Stephen Henson |
Tidy up EC parameter check code: instead of accessing internal structures add utility functions to t1_lib.c to check if EC certificates and parameters are consistent with peer.
|
#
d0595f17 |
| 28-Mar-2012 |
Dr. Stephen Henson |
Initial revision of ECC extension handling. Tidy some code up. Don't allocate a structure to handle ECC extensions when it is used for default values. Make supported cu
Initial revision of ECC extension handling. Tidy some code up. Don't allocate a structure to handle ECC extensions when it is used for default values. Make supported curves configurable. Add ctrls to retrieve shared curves: not fully integrated with rest of ECC code yet.
show more ...
|
#
156421a2 |
| 14-Mar-2012 |
Dr. Stephen Henson |
oops, revert unrelated patches
|
#
61ad8262 |
| 14-Mar-2012 |
Dr. Stephen Henson |
update FAQ, NEWS
|
Revision tags: OpenSSL_1_0_1, OpenSSL_1_0_0h, OpenSSL_0_9_8u |
|
#
e7f8ff43 |
| 06-Mar-2012 |
Dr. Stephen Henson |
New ctrls to retrieve supported signature algorithms and curves and extensions to s_client and s_server to print out retrieved valued. Extend CERT structure to cache supported signature
New ctrls to retrieve supported signature algorithms and curves and extensions to s_client and s_server to print out retrieved valued. Extend CERT structure to cache supported signature algorithm data.
show more ...
|
Revision tags: OpenSSL_1_0_1-beta3 |
|
#
74b4b494 |
| 22-Feb-2012 |
Dr. Stephen Henson |
SSL export fixes (from Adam Langley) [original from 1.0.1]
|
#
1df80b65 |
| 10-Feb-2012 |
Dr. Stephen Henson |
PR: 2704 Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr> Fix srp extension.
|
#
f71c6e52 |
| 31-Jan-2012 |
Dr. Stephen Henson |
Add support for distinct certificate chains per key type and per SSL structure. Before this the only way to add a custom chain was in the parent SSL_CTX (which is shared by all key t
Add support for distinct certificate chains per key type and per SSL structure. Before this the only way to add a custom chain was in the parent SSL_CTX (which is shared by all key types and SSL structures) or rely on auto chain building (which is performed on each handshake) from the trust store.
show more ...
|