- Oct 01, 2013
-
-
Dr. Stephen Henson authored
(cherry picked from commit e0f7cfda)
-
Dr. Stephen Henson authored
Add support for customisation of CMS handling of signed and enveloped data from custom public key parameters. This will provide support for RSA-PSS and RSA-OAEP but could also be applied to other algorithms. (cherry picked from commit e365352d)
-
Dr. Stephen Henson authored
(cherry picked from commit 81063953)
-
Dr. Stephen Henson authored
Add OIDs for KDF schemes from RFC5753 and add cross references for each type and the appropriate digest to use. (cherry picked from commit 6af440ce) Conflicts: crypto/objects/obj_dat.h crypto/objects/obj_mac.num
-
Dr. Stephen Henson authored
(cherry picked from commit e423c360) Conflicts: crypto/objects/obj_dat.h crypto/objects/obj_mac.num
-
Dr. Stephen Henson authored
Backport support for FIPS 186-2 DSA parameter generation from HEAD. Redirect to FIPS in FIPS mode and workaround prototype error.
-
Dr. Stephen Henson authored
Add support for DH parameter generation using DSA methods including FIPS 186-3. (cherry picked from commit 39090878)
-
Dr. Stephen Henson authored
Make DHparams_dup work properly with X9.42 DH parameters. (cherry picked from commit d3cc91ee)
-
Dr. Stephen Henson authored
(cherry picked from commit c9577ab5) Conflicts: crypto/dh/dh_ameth.c
-
Dr. Stephen Henson authored
Add support for key wrap algorithms via EVP interface. Generalise AES wrap algorithm and add to modes, making existing AES wrap algorithm a special case. Move test code to evptests.txt (cherry picked from commit 97cf1f6c) Conflicts: CHANGES
-
Andy Polyakov authored
(cherry picked from commit c9a8e3d1)
-
Andy Polyakov authored
(cherry picked from commit ca303d33)
-
Ben Laurie authored
(cherry picked from commit 282a480a)
-
Dr. Stephen Henson authored
Add code to support GCM an CCM modes in evp_test. On encrypt this will compare the expected ciphertext and tag. On decrypt it will compare the expected plaintext: tag comparison is done internally. Add a simple CCM test case and convert all tests from crypto/modes/gcm128.c (cherry picked from commit 15652f98)
-
Dr. Stephen Henson authored
(cherry picked from commit 95248de3)
-
Dr. Stephen Henson authored
(cherry picked from commit bc91494e)
-
Dr. Stephen Henson authored
(cherry picked from commit 415ece73)
-
Ben Laurie authored
-
Ben Laurie authored
Conflicts: ssl/ssl3.h ssl/t1_lib.c
-
- Sep 25, 2013
-
-
Ben Laurie authored
-
- Sep 24, 2013
-
-
Ben Laurie authored
-
Ben Laurie authored
-
- Sep 22, 2013
-
-
Dr. Stephen Henson authored
Return an error if an attempt is made to enable the Dual EC DRBG: it is not used by default. (cherry picked from commit a4870de5)
-
- Sep 20, 2013
-
-
Ben Laurie authored
-
- Sep 18, 2013
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Make DTLS behave like TLS when negotiating version: record layer has DTLS 1.0, message version is 1.2. Tolerate different version numbers if version hasn't been negotiated yet. (cherry picked from commit 40088d8b)
-
Dr. Stephen Henson authored
Add DTLS record header parsing, different client hello format and add HelloVerifyRequest message type. Add code to d1_pkt.c to send message headers to the message callback. (cherry picked from commit 890f2f8b) Conflicts: ssl/ssl_locl.h
-
Dr. Stephen Henson authored
Check for Suite B support using method flags instead of version numbers: anything supporting TLS 1.2 cipher suites will also support Suite B. Return an error if an attempt to use DTLS 1.0 is made in Suite B mode. (cherry picked from commit 4544f0a6)
-
Dr. Stephen Henson authored
If we successfully match a cookie don't set return value to 2 as this results in other error conditions returning 2 as well. Instead set return value to -2 which can be checked later if everything else is OK. (cherry picked from commit c56f5b8e)
-
Dr. Stephen Henson authored
Add new methods DTLS_*_method() which support both DTLS 1.0 and DTLS 1.2 and pick the highest version the peer supports during negotiation. As with SSL/TLS options can change this behaviour specifically SSL_OP_NO_DTLSv1 and SSL_OP_NO_DTLSv1_2. (cherry picked from commit c6913eeb) Conflicts: CHANGES
-
Dr. Stephen Henson authored
Port TLS 1.2 GCM code to DTLS. Enable use of TLS 1.2 only ciphers when in DTLS 1.2 mode too. (cherry picked from commit 4221c0dd)
-
Dr. Stephen Henson authored
The relaxed signing requirements for fixed DH certificates apply to DTLS 1.2 too. (cherry picked from commit fbbaacca)
-
Dr. Stephen Henson authored
Add DTLS1.2 support for cached records when computing handshake macs instead of the MD5+SHA1 case for DTLS < 1.2 (this is a port of the equivalent TLS 1.2 code to DTLS). (cherry picked from commit 04fac500)
-
Dr. Stephen Henson authored
Add correct flags for DTLS 1.2, update s_server and s_client to handle DTLS 1.2 methods. Currently no support for version negotiation: i.e. if client/server selects DTLS 1.2 it is that or nothing. (cherry picked from commit c3b344e3) Conflicts: apps/s_server.c
-
Dr. Stephen Henson authored
Since this is always called from DTLS code it is safe to assume the header length should be the DTLS value. This avoids the need to check the version number and should work with any version of DTLS (not just 1.0). (cherry picked from commit 9cf0f187)
-
Dr. Stephen Henson authored
Extend DTLS method creation macros to support version numbers and encryption methods. Update existing code. (cherry picked from commit cfd298b7)
-
Dr. Stephen Henson authored
Some TLS extensions were disabled for DTLS. Possibly because they caused problems with the old duplicated code. Enable them again. (cherry picked from commit 874a18cf)
-
Dr. Stephen Henson authored
Use the enc_flags field to determine whether we should use explicit IV, signature algorithms or SHA256 default PRF instead of hard coding which versions support each requirement. (cherry picked from commit cbd64894) Conflicts: ssl/ssl_locl.h
-
Dr. Stephen Henson authored
(cherry picked from commit 6de2649a)
-
Dr. Stephen Henson authored
Revise DTLS code. There was a *lot* of code duplication in the DTLS code that generates records. This makes it harder to maintain and sometimes a TLS update is omitted by accident from the DTLS code. Specifically almost all of the record generation functions have code like this: some_pointer = buffer + HANDSHAKE_HEADER_LENGTH; ... Record creation stuff ... set_handshake_header(ssl, SSL_MT_SOMETHING, message_len); ... write_handshake_message(ssl); Where the "Record creation stuff" is identical between SSL/TLS and DTLS or in some cases has very minor differences. By adding a few fields to SSL3_ENC to include the header length, some flags and function pointers for handshake header setting and handshake writing the code can cope with both cases. (cherry picked from commit 173e72e6)
-