- Oct 26, 2007
-
-
Dr. Stephen Henson authored
of handshake failure 2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH (required for s3_srvr to accept GOST client certificates). 3. Changes to EVP - adding of function EVP_PKEY_CTX_get0_peerkey - Make function EVP_PKEY_derive_set_peerkey work for context with ENCRYPT operation, because we use peerkey field in the context to pass non-ephemeral secret key to GOST encrypt operation. - added EVP_PKEY_CTRL_SET_IV control command. It is really GOST-specific, but it is used in SSL code, so it has to go in some header file, available during libssl compilation 4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data 5. Include des.h if KSSL_DEBUG is defined into some libssl files, to make debugging output which depends on constants defined there, work and other KSSL_DEBUG output fixes 6. Declaration of real GOST ciphersuites, two authentication methods SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST 7. Implementation of these methods. 8. Support for sending unsolicited serverhello extension if GOST ciphersuite is selected. It is require for interoperability with CryptoPro CSP 3.0 and 3.6 and controlled by SSL_OP_CRYPTOPRO_TLSEXT_BUG constant. This constant is added to SSL_OP_ALL, because it does nothing, if non-GOST ciphersuite is selected, and all implementation of GOST include compatibility with CryptoPro. 9. Support for CertificateVerify message without length field. It is another CryptoPro bug, but support is made unconditional, because it does no harm for draft-conforming implementation. 10. In tls1_mac extra copy of stream mac context is no more done. When I've written currently commited code I haven't read EVP_DigestSignFinal manual carefully enough and haven't noticed that it does an internal digest ctx copying. This implementation was tested against 1. CryptoPro CSP 3.6 client and server 2. Cryptopro CSP 3.0 server
-
- Oct 19, 2007
-
-
Lutz Jänicke authored
-
- Oct 13, 2007
-
-
Andy Polyakov authored
-
- Oct 12, 2007
-
-
Dr. Stephen Henson authored
-
- Oct 01, 2007
-
-
Andy Polyakov authored
s390x assembler pack in CHANAGES.
-
- Sep 27, 2007
-
-
Andy Polyakov authored
-
- Sep 26, 2007
-
-
Dr. Stephen Henson authored
-
- Sep 21, 2007
-
-
Bodo Möller authored
(draft-rescorla-tls-opaque-prf-input-00.txt), and do some cleanups and bugfixes on the way. In particular, this fixes the buffer bounds checks in ssl_add_clienthello_tlsext() and in ssl_add_serverhello_tlsext(). Note that the opaque PRF Input TLS extension is not compiled by default; see CHANGES.
-
- Sep 07, 2007
-
-
Dr. Stephen Henson authored
Fix additional gcc 4.2 value not used warnings.
-
- Aug 31, 2007
-
-
Dr. Stephen Henson authored
Submitted by: Victor B. Wagner <vitus@cryptocom.ru>
-
- Aug 27, 2007
-
-
Dr. Stephen Henson authored
-
- Aug 23, 2007
-
-
Dr. Stephen Henson authored
-
- Aug 11, 2007
-
-
Dr. Stephen Henson authored
for OpenSSL.
-
- Jun 20, 2007
-
-
Andy Polyakov authored
-
- Jun 07, 2007
-
-
Dr. Stephen Henson authored
-
- Jun 04, 2007
-
-
Dr. Stephen Henson authored
always use inline functions.
-
Dr. Stephen Henson authored
-
- May 22, 2007
-
-
Bodo Möller authored
-
- May 13, 2007
-
-
Ben Laurie authored
-
Ben Laurie authored
-
- Apr 23, 2007
-
-
Bodo Möller authored
PR: 1503 Submitted by: KISA Reviewed by: Bodo Moeller
-
- Apr 13, 2007
-
-
Dr. Stephen Henson authored
options. Add new streaming i2d (though strictly speaking it is BER format when streaming) and PEM functions. These all process content on the fly without storing it all in memory.
-
- Apr 11, 2007
-
-
Dr. Stephen Henson authored
terms of new API.
-
Dr. Stephen Henson authored
-
- Apr 08, 2007
-
-
Dr. Stephen Henson authored
-
- Mar 28, 2007
-
-
Bodo Möller authored
-
Bodo Möller authored
Submitted by: Matthew D Wood Reviewed by: Bodo Moeller
-
- Mar 21, 2007
-
-
Bodo Möller authored
-
- Feb 26, 2007
-
-
Bodo Möller authored
include release date of 0.9.8e
-
- Feb 21, 2007
-
-
Lutz Jänicke authored
EHLO or CAPABILITY handshake before sending STARTTLS Submitted by: Goetz Babin-Ebell <goetz@shomitefo.de>
-
Dr. Stephen Henson authored
-
- Feb 20, 2007
-
-
Bodo Möller authored
Change ssl_create_cipher_list() to prefer ephemeral ECDH over ephemeral DH.
-
- Feb 19, 2007
-
-
Bodo Möller authored
ciphersuite string such as "DEFAULT:RSA" cannot enable authentication-only ciphersuites. Also, change ssl_create_cipher_list() so that it no longer starts with an arbitrary ciphersuite ordering, but instead uses the logic that we previously had in SSL_DEFEAULT_CIPHER_LIST. SSL_DEFAULT_CIPHER_LIST simplifies into just "ALL:!aNULL:!eNULL".
-
- Feb 17, 2007
-
-
Bodo Möller authored
This change resolves a number of problems and obviates multiple kludges. A new feature is that you can now say "AES256" or "AES128" (not just "AES", which enables both). In some cases the ciphersuite list generated from a given string is affected by this change. I hope this is just in those cases where the previous behaviour did not make sense.
-
- Feb 03, 2007
-
-
Nils Larsch authored
-
- Dec 24, 2006
-
-
Dr. Stephen Henson authored
I thought it was about time I dusted this off. This stuff had been sitting on my hard drive for *ages* (2003 in fact). Hasn't been tested well and may not work properly. Nothing uses it at present which is just as well. Think of this as a traditional Christmas present which looks far more impressive in the adverts and on the box, some of the bits are missing and falls to bits if you play with it too much.
-
- Dec 21, 2006
-
-
Nils Larsch authored
PR: 1354, 1355, 1398, 1408
-
- Dec 20, 2006
-
-
Nils Larsch authored
-
- Dec 19, 2006
-
-
Bodo Möller authored
(need to prevent the removal of trailing zero bits).
-
- Nov 29, 2006
-
-
Bodo Möller authored
-