- Jun 28, 2012
-
-
Dr. Stephen Henson authored
the certificate can be used for (if anything). Set valid_flags field in new tls1_check_chain function. Simplify ssl_set_cert_masks which used to have similar checks in it. Add new "cert_flags" field to CERT structure and include a "strict mode". This enforces some TLS certificate requirements (such as only permitting certificate signature algorithms contained in the supported algorithms extension) which some implementations ignore: this option should be used with caution as it could cause interoperability issues.
-
- Jun 25, 2012
-
-
Dr. Stephen Henson authored
Only store encoded versions of peer and configured signature algorithms. Determine shared signature algorithms and cache the result along with NID equivalents of each algorithm.
-
- Jun 22, 2012
-
-
Dr. Stephen Henson authored
TLS v1.2. These are sent as an extension for clients and during a certificate request for servers. TODO: add support for shared signature algorithms, respect shared algorithms when deciding which ciphersuites and certificates to permit.
-
- Jun 18, 2012
-
-
Dr. Stephen Henson authored
-
- Jun 15, 2012
-
-
Dr. Stephen Henson authored
for debugging purposes. Needs "enable-ssl-trace" configuration option.
-
- Jun 13, 2012
-
-
Dr. Stephen Henson authored
-
- Jun 12, 2012
-
-
Dr. Stephen Henson authored
-
- May 30, 2012
-
-
Ben Laurie authored
-
- May 11, 2012
-
-
Dr. Stephen Henson authored
Reported by: Constantine Sapuntzakis <csapuntz@gmail.com> Fix possible deadlock when decoding public keys.
-
Dr. Stephen Henson authored
Reported by: Phil Pennock <openssl-dev@spodhuis.org> Make renegotiation work for TLS 1.2, 1.1 by not using a lower record version client hello workaround if renegotiating.
-
- May 10, 2012
-
-
Dr. Stephen Henson authored
DTLS to fix DoS attack. Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic fuzzing as a service testing platform. (CVE-2012-2333)
-
Dr. Stephen Henson authored
Make sure tkeylen is initialised properly when encrypting CMS messages.
-
- Apr 26, 2012
-
-
Dr. Stephen Henson authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
- Apr 25, 2012
-
-
Dr. Stephen Henson authored
OpenSSL 1.0.0. Add CHANGES entry noting the consequences.
-
Andy Polyakov authored
vector contiguous. PR: 2802
-
- Apr 19, 2012
-
-
Dr. Stephen Henson authored
BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer in CRYPTO_realloc_clean. Thanks to Tavis Ormandy, Google Security Team, for discovering this issue and to Adam Langley <agl@chromium.org> for fixing it. (CVE-2012-2110)
-
- Apr 17, 2012
-
-
Bodo Möller authored
(TLS 1.2 clients could end up negotiating these with an OpenSSL server with TLS 1.2 disabled, which is problematic.) Submitted by: Adam Langley
-
Dr. Stephen Henson authored
If OPENSSL_MAX_TLS1_2_CIPHER_LENGTH is set then limit the size of client ciphersuites to this value. A value of 50 should be sufficient. Document workarounds in CHANGES.
-
- Apr 05, 2012
-
-
Dr. Stephen Henson authored
enabled instead of requiring an application to hard code a (possibly inappropriate) parameter set and delve into EC internals we just automatically use the preferred curve.
-
- Mar 31, 2012
-
-
Andy Polyakov authored
-
- Mar 28, 2012
-
-
Dr. Stephen Henson authored
Tidy some code up. Don't allocate a structure to handle ECC extensions when it is used for default values. Make supported curves configurable. Add ctrls to retrieve shared curves: not fully integrated with rest of ECC code yet.
-
- Mar 06, 2012
-
-
Dr. Stephen Henson authored
extensions to s_client and s_server to print out retrieved valued. Extend CERT structure to cache supported signature algorithm data.
-
- Feb 21, 2012
-
-
Dr. Stephen Henson authored
between NIDs and the more common NIST names such as "P-256". Enhance ecparam utility and ECC method to recognise the NIST names for curves.
-
- Feb 16, 2012
-
-
Dr. Stephen Henson authored
before rejecting multiple SGC restarts.
-
- Feb 15, 2012
-
-
Dr. Stephen Henson authored
Update RSA EVP_PKEY_METHOD to use the OCTET STRING form of MDC2 signature: this will make all versions of MDC2 signature equivalent.
-
Dr. Stephen Henson authored
signatures and MDC2 using EVP or RSA_sign. This has become more apparent when the dgst utility in OpenSSL 1.0.0 and later switched to using the EVP_DigestSign functions which call RSA_sign. This means that the signature format OpenSSL 1.0.0 and later used with dgst -sign and MDC2 is incompatible with previous versions. Add detection in RSA_verify so either format works. Note: MDC2 is disabled by default in OpenSSL and very rarely used in practice.
-
- Feb 09, 2012
-
-
Dr. Stephen Henson authored
some servers.
-
- Jan 31, 2012
-
-
Dr. Stephen Henson authored
structure. Before this the only way to add a custom chain was in the parent SSL_CTX (which is shared by all key types and SSL structures) or rely on auto chain building (which is performed on each handshake) from the trust store.
-
- Jan 25, 2012
-
-
Dr. Stephen Henson authored
-
- Jan 18, 2012
-
-
Dr. Stephen Henson authored
Thanks to Antonio Martin, Enterprise Secure Access Research and Development, Cisco Systems, Inc. for discovering this bug and preparing a fix. (CVE-2012-0050)
-
- Jan 17, 2012
-
-
Dr. Stephen Henson authored
-
- Jan 16, 2012
-
-
Dr. Stephen Henson authored
The cipher definitions of these ciphersuites have been around since SSLeay but were always disabled. Now OpenSSL supports DH certificates they can be finally enabled. Various additional changes were needed to make them work properly: many unused fixed DH sections of code were untested.
-
- Jan 05, 2012
-
-
Bodo Möller authored
(While the 1.0.0f CHANGES entry on VOS PRNG seeding was missing in HEAD, the actual code is here already.)
-
- Jan 04, 2012
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Reviewed by: steve Fix for DTLS plaintext recovery attack discovered by Nadhem Alfardan and Kenny Paterson.
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-