History log of /openssl/ssl/s3_lib.c (Results 376 – 400 of 550)
Revision (<<< Hide revision tags) (Show revision tags >>>) Date Author Comments
Revision tags: OpenSSL-fips-2_0-pl1, OpenSSL-fips-2_0_2, OpenSSL-fips-2_0_1
# 323fa645 30-Sep-2012 Dr. Stephen Henson

If OPENSSL_SSL_DEBUG_BROKEN_PROTOCOL is set allow the use of "SCSV" as
a ciphersuite to position the SCSV value in different places for testing
purposes.


# 94a209d8 12-Sep-2012 Dr. Stephen Henson

Add ctrl and utility functions to retrieve raw cipher list sent by client in
client hello message. Previously this could only be retrieved on an initial
connection and it was impossible to de

Add ctrl and utility functions to retrieve raw cipher list sent by client in
client hello message. Previously this could only be retrieved on an initial
connection and it was impossible to determine the cipher IDs of any uknown
ciphersuites.

show more ...


# 33a8de69 08-Sep-2012 Dr. Stephen Henson

new ctrl to retrive value of received temporary key in server key exchange message, print out details in s_client


# 319354eb 07-Sep-2012 Dr. Stephen Henson

store and print out message digest peer signed with in TLS 1.2


# 2ea80354 15-Aug-2012 Dr. Stephen Henson

Add three Suite B modes to TLS code, supporting RFC6460.


# 74ecfab4 23-Jul-2012 Dr. Stephen Henson

Add support for certificate stores in CERT structure. This makes it
possible to have different stores per SSL structure or one store in
the parent SSL_CTX. Include distint stores for certific

Add support for certificate stores in CERT structure. This makes it
possible to have different stores per SSL structure or one store in
the parent SSL_CTX. Include distint stores for certificate chain
verification and chain building. New ctrl SSL_CTRL_BUILD_CERT_CHAIN
to build and store a certificate chain in CERT structure: returing
an error if the chain cannot be built: this will allow applications
to test if a chain is correctly configured.

Note: if the CERT based stores are not set then the parent SSL_CTX
store is used to retain compatibility with existing behaviour.

show more ...


# 9f27b1ee 08-Jul-2012 Dr. Stephen Henson

Add new ctrl to retrieve client certificate types, print out
details in s_client.

Also add ctrl to set client certificate types. If not used sensible values
will be included based on

Add new ctrl to retrieve client certificate types, print out
details in s_client.

Also add ctrl to set client certificate types. If not used sensible values
will be included based on supported signature algorithms: for example if
we don't include any DSA signing algorithms the DSA certificate type is
omitted.

Fix restriction in old code where certificate types would be truncated
if it exceeded TLS_CT_NUMBER.

show more ...


# 3dbc46df 03-Jul-2012 Dr. Stephen Henson

Separate client and server permitted signature algorithm support: by default
the permitted signature algorithms for server and client authentication
are the same but it is now possible to set

Separate client and server permitted signature algorithm support: by default
the permitted signature algorithms for server and client authentication
are the same but it is now possible to set different algorithms for client
authentication only.

show more ...


# 0f39bab0 28-Jun-2012 Dr. Stephen Henson

Function tls1_check_ec_server_key is now redundant as we make
appropriate checks in tls1_check_chain.


# d61ff83b 28-Jun-2012 Dr. Stephen Henson

Add new "valid_flags" field to CERT_PKEY structure which determines what
the certificate can be used for (if anything). Set valid_flags field
in new tls1_check_chain function. Simplify ssl_se

Add new "valid_flags" field to CERT_PKEY structure which determines what
the certificate can be used for (if anything). Set valid_flags field
in new tls1_check_chain function. Simplify ssl_set_cert_masks which used
to have similar checks in it.

Add new "cert_flags" field to CERT structure and include a "strict mode".
This enforces some TLS certificate requirements (such as only permitting
certificate signature algorithms contained in the supported algorithms
extension) which some implementations ignore: this option should be used
with caution as it could cause interoperability issues.

show more ...


# 0f229cce 22-Jun-2012 Dr. Stephen Henson

Add support for application defined signature algorithms for use with
TLS v1.2. These are sent as an extension for clients and during a certificate
request for servers.

TODO: add sup

Add support for application defined signature algorithms for use with
TLS v1.2. These are sent as an extension for clients and during a certificate
request for servers.

TODO: add support for shared signature algorithms, respect shared algorithms
when deciding which ciphersuites and certificates to permit.

show more ...


# 195b9eee 11-Jun-2012 Ben Laurie

Fix memory leak.


# 32e62d1c 06-Jun-2012 Ben Laurie

Fix memory leak.


# a9e1c50b 30-May-2012 Ben Laurie

RFC 5878 support.


# efb19e13 10-May-2012 Dr. Stephen Henson

PR: 2806
Submitted by: PK <runningdoglackey@yahoo.com>

Correct ciphersuite signature algorithm definitions.


Revision tags: OpenSSL_1_0_1c, OpenSSL_1_0_0j, OpenSSL_0_9_8x, OpenSSL_1_0_1b, OpenSSL_0_9_8w, OpenSSL_1_0_1a, OpenSSL_0_9_8v, OpenSSL_1_0_0i
# d3ddf022 17-Apr-2012 Bodo Möller

Disable SHA-2 ciphersuites in < TLS 1.2 connections.

(TLS 1.2 clients could end up negotiating these with an OpenSSL server
with TLS 1.2 disabled, which is problematic.)

Submitt

Disable SHA-2 ciphersuites in < TLS 1.2 connections.

(TLS 1.2 clients could end up negotiating these with an OpenSSL server
with TLS 1.2 disabled, which is problematic.)

Submitted by: Adam Langley

show more ...


# a4352630 05-Apr-2012 Dr. Stephen Henson

Add support for automatic ECDH temporary key parameter selection. When
enabled instead of requiring an application to hard code a (possibly
inappropriate) parameter set and delve into EC inte

Add support for automatic ECDH temporary key parameter selection. When
enabled instead of requiring an application to hard code a (possibly
inappropriate) parameter set and delve into EC internals we just
automatically use the preferred curve.

show more ...


# fd2b65ce 04-Apr-2012 Dr. Stephen Henson

Tidy up EC parameter check code: instead of accessing internal structures
add utility functions to t1_lib.c to check if EC certificates and parameters
are consistent with peer.


# d0595f17 28-Mar-2012 Dr. Stephen Henson

Initial revision of ECC extension handling.

Tidy some code up.

Don't allocate a structure to handle ECC extensions when it is used for
default values.

Make supported cu

Initial revision of ECC extension handling.

Tidy some code up.

Don't allocate a structure to handle ECC extensions when it is used for
default values.

Make supported curves configurable.

Add ctrls to retrieve shared curves: not fully integrated with rest of
ECC code yet.

show more ...


# 156421a2 14-Mar-2012 Dr. Stephen Henson

oops, revert unrelated patches


# 61ad8262 14-Mar-2012 Dr. Stephen Henson

update FAQ, NEWS


Revision tags: OpenSSL_1_0_1, OpenSSL_1_0_0h, OpenSSL_0_9_8u
# e7f8ff43 06-Mar-2012 Dr. Stephen Henson

New ctrls to retrieve supported signature algorithms and curves and
extensions to s_client and s_server to print out retrieved valued.

Extend CERT structure to cache supported signature

New ctrls to retrieve supported signature algorithms and curves and
extensions to s_client and s_server to print out retrieved valued.

Extend CERT structure to cache supported signature algorithm data.

show more ...


Revision tags: OpenSSL_1_0_1-beta3
# 74b4b494 22-Feb-2012 Dr. Stephen Henson

SSL export fixes (from Adam Langley) [original from 1.0.1]


# 1df80b65 10-Feb-2012 Dr. Stephen Henson

PR: 2704
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>

Fix srp extension.


# f71c6e52 31-Jan-2012 Dr. Stephen Henson

Add support for distinct certificate chains per key type and per SSL
structure.

Before this the only way to add a custom chain was in the parent SSL_CTX
(which is shared by all key t

Add support for distinct certificate chains per key type and per SSL
structure.

Before this the only way to add a custom chain was in the parent SSL_CTX
(which is shared by all key types and SSL structures) or rely on auto
chain building (which is performed on each handshake) from the trust store.

show more ...


1...<<11121314151617181920>>...22