- Sep 05, 2013
-
-
Carlos Alberto Lopez Perez authored
* Many XMPP servers are configured with multiple domains (virtual hosts) * In order to establish successfully the TLS connection you have to specify which virtual host you are trying to connect. * Test this, for example with :: * Fail: openssl s_client -connect talk.google.com:5222 -starttls xmpp * Works: openssl s_client -connect talk.google.com:5222 -starttls xmpp -xmpphost gmail.com
-
Carlos Alberto Lopez Perez authored
-
Carlos Alberto Lopez Perez authored
* When the host used in "-connect" is not what the remote XMPP server expects the server will return an error like this: <stream:error> <host-unknown xmlns='urn:ietf:params:xml:ns:xmpp-streams'/> </stream:error> * But the actual code will stay on the loop forever because the stop condition "/stream:features>" will never happen, * Make this more robust: The stop condition should be that BIO_read failed * Test if for example with :: openssl s_client -connect random.jabb3r.net:5222 -starttls xmpp
-
Carlos Alberto Lopez Perez authored
* Some XMPP Servers (OpenFire) use double quotes. * This makes s_client starttls work with this servers. * Tested with OpenFire servers from http://xmpp.net/ :: openssl s_client -connect coderollers.com:5222 -starttls xmpp
-
Rob Stradling authored
OS X 10.8..10.8.3 has broken support for ECDHE-ECDSA ciphers.
-
- Sep 03, 2013
-
-
Dr. Stephen Henson authored
-
- Aug 21, 2013
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Ben Laurie authored
-
Ben Laurie authored
-
- Aug 18, 2013
-
-
Dr. Stephen Henson authored
(cherry picked from commit 90e7f983b573c3f3c722a02db4491a1b1cd87e8c)
-
- Aug 17, 2013
-
-
Dr. Stephen Henson authored
Preliminary documentation for chain and verify stores and certificate chain setting functions.
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Aug 14, 2013
-
-
Dr. Stephen Henson authored
-
- Aug 13, 2013
-
-
Michael Tuexen authored
This fix ensures that * A HelloRequest is retransmitted if not responded by a ClientHello * The HelloRequest "consumes" the sequence number 0. The subsequent ServerHello uses the sequence number 1. * The client also expects the sequence number of the ServerHello to be 1 if a HelloRequest was received earlier. This patch fixes the RFC violation.
-
- Aug 08, 2013
-
-
Michael Tuexen authored
Reported by: Prashant Jaikumar <rmstar@gmail.com> Fix handling of application data received before a handshake.
-
- Aug 06, 2013
-
-
Kaspar Brand authored
PR: 3028 Fix bug introduced in PEM_X509_INFO_bio which wouldn't process RSA keys correctly if they appeared first.
-
- Aug 05, 2013
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Add X9.42 DH KDF. Move sharedinfo generation code to CMS library as the same structure is used by DH and ECDH. Move ASN1_OBJECT typedef to ossl_typ.h so it can be picked up by dh headers without the need to use ASN1.
-
Dr. Stephen Henson authored
Add support for DH parameter generation using DSA methods including FIPS 186-3.
-
Dr. Stephen Henson authored
Make DHparams_dup work properly with X9.42 DH parameters.
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Don't need to use temporary buffer if remaining length equals digest length.
-
Dr. Stephen Henson authored
Check and set AlgorithmIdenfier parameters for key wrap algorithms. Currently these just set parameters to NULL.
-
- Aug 03, 2013
-
-
Andy Polyakov authored
Bug would emerge when XTS is added to bsaes-armv7.pl. Pointed out by Ard Biesheuvel of Linaro.
-
Andy Polyakov authored
-
- Jul 31, 2013
-
-
Andy Polyakov authored
-
Trevor Perrin authored
Force no SSL2 when custom extensions in use. Don't clear extension state when cert is set. Clear on renegotiate.
-
- Jul 22, 2013
-
-
Adam Langley authored
Conflicts: ssl/ssltest.c
-
Ben Laurie authored
-
Adam Langley authored
This change adds support for ALPN[1] in OpenSSL. ALPN is the IETF blessed version of NPN and we'll be supporting both ALPN and NPN for some time yet. [1] https://tools.ietf.org/html/draft-ietf-tls-applayerprotoneg-00 Conflicts: ssl/ssl3.h ssl/t1_lib.c
-
- Jul 19, 2013
-
-
Dr. Stephen Henson authored
Update ecdsatest to use ECDSA_sign_setup and ECDSA_sign_ex, this avoids the nonce generation which would otherwise break the test. Reinstate ecdsatest.
-
Dr. Stephen Henson authored
Disable ECDSA test temporarily: it is incompatible with ECDSA nonces.
-
- Jul 17, 2013
-
-
Dr. Stephen Henson authored
Add some ECDH CMS tests.
-
Dr. Stephen Henson authored
Add a script to generate keys and certificates for the S/MIME and CMS tests. Update certificates and add EC examples.
-