- Sep 19, 2012
-
-
Andy Polyakov authored
-
- Sep 14, 2012
-
-
Dr. Stephen Henson authored
by client and send back to server. Also prints an abbreviated summary of the connection parameters.
-
- Sep 12, 2012
-
-
Dr. Stephen Henson authored
New option -verify_quiet to shut up the verify callback unless there is an error.
-
Dr. Stephen Henson authored
client hello message. Previously this could only be retrieved on an initial connection and it was impossible to determine the cipher IDs of any uknown ciphersuites.
-
- Sep 11, 2012
-
-
Dr. Stephen Henson authored
change the current certificate (in s->cert->key) to the one used and then SSL_get_certificate and SSL_get_privatekey will automatically work.
-
Ben Laurie authored
right response is stapled. Also change SSL_get_certificate() so it returns the certificate actually sent. See http://rt.openssl.org/Ticket/Display.html?id=2836.
-
- Aug 29, 2012
-
-
Andy Polyakov authored
-
- Aug 15, 2012
-
-
Dr. Stephen Henson authored
-
- Aug 03, 2012
-
-
Dr. Stephen Henson authored
-
- Jul 27, 2012
-
-
Dr. Stephen Henson authored
by a certificate chain. Add additional tests to handle client certificates: checks for matching certificate type and issuer name comparison. Print out results of checks for each candidate chain tested in s_server/s_client.
-
- Jul 24, 2012
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Jul 23, 2012
-
-
Dr. Stephen Henson authored
possible to have different stores per SSL structure or one store in the parent SSL_CTX. Include distint stores for certificate chain verification and chain building. New ctrl SSL_CTRL_BUILD_CERT_CHAIN to build and store a certificate chain in CERT structure: returing an error if the chain cannot be built: this will allow applications to test if a chain is correctly configured. Note: if the CERT based stores are not set then the parent SSL_CTX store is used to retain compatibility with existing behaviour.
-
- Jul 18, 2012
-
-
Dr. Stephen Henson authored
that are disabled for this session (as opposed to always disabled by configuration).
-
- Jul 08, 2012
-
-
Dr. Stephen Henson authored
details in s_client. Also add ctrl to set client certificate types. If not used sensible values will be included based on supported signature algorithms: for example if we don't include any DSA signing algorithms the DSA certificate type is omitted. Fix restriction in old code where certificate types would be truncated if it exceeded TLS_CT_NUMBER.
-
- Jul 03, 2012
-
-
Dr. Stephen Henson authored
the permitted signature algorithms for server and client authentication are the same but it is now possible to set different algorithms for client authentication only.
-
- Jun 29, 2012
-
-
Dr. Stephen Henson authored
is required by client or server. An application can decide which certificate chain to present based on arbitrary criteria: for example supported signature algorithms. Add very simple example to s_server. This fixes many of the problems and restrictions of the existing client certificate callback: for example you can now clear existing certificates and specify the whole chain.
-
- Jun 28, 2012
-
-
Dr. Stephen Henson authored
the certificate can be used for (if anything). Set valid_flags field in new tls1_check_chain function. Simplify ssl_set_cert_masks which used to have similar checks in it. Add new "cert_flags" field to CERT structure and include a "strict mode". This enforces some TLS certificate requirements (such as only permitting certificate signature algorithms contained in the supported algorithms extension) which some implementations ignore: this option should be used with caution as it could cause interoperability issues.
-
- Jun 25, 2012
-
-
Dr. Stephen Henson authored
Only store encoded versions of peer and configured signature algorithms. Determine shared signature algorithms and cache the result along with NID equivalents of each algorithm.
-
- Jun 22, 2012
-
-
Dr. Stephen Henson authored
TLS v1.2. These are sent as an extension for clients and during a certificate request for servers. TODO: add support for shared signature algorithms, respect shared algorithms when deciding which ciphersuites and certificates to permit.
-
- Jun 18, 2012
-
-
Dr. Stephen Henson authored
-
- Jun 15, 2012
-
-
Dr. Stephen Henson authored
for debugging purposes. Needs "enable-ssl-trace" configuration option.
-
- Jun 13, 2012
-
-
Dr. Stephen Henson authored
-
- Jun 12, 2012
-
-
Dr. Stephen Henson authored
-
- May 30, 2012
-
-
Ben Laurie authored
-
- May 11, 2012
-
-
Dr. Stephen Henson authored
Reported by: Constantine Sapuntzakis <csapuntz@gmail.com> Fix possible deadlock when decoding public keys.
-
Dr. Stephen Henson authored
Reported by: Phil Pennock <openssl-dev@spodhuis.org> Make renegotiation work for TLS 1.2, 1.1 by not using a lower record version client hello workaround if renegotiating.
-
- May 10, 2012
-
-
Dr. Stephen Henson authored
DTLS to fix DoS attack. Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic fuzzing as a service testing platform. (CVE-2012-2333)
-
Dr. Stephen Henson authored
Make sure tkeylen is initialised properly when encrypting CMS messages.
-
- Apr 26, 2012
-
-
Dr. Stephen Henson authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
- Apr 25, 2012
-
-
Dr. Stephen Henson authored
OpenSSL 1.0.0. Add CHANGES entry noting the consequences.
-
Andy Polyakov authored
vector contiguous. PR: 2802
-
- Apr 19, 2012
-
-
Dr. Stephen Henson authored
BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer in CRYPTO_realloc_clean. Thanks to Tavis Ormandy, Google Security Team, for discovering this issue and to Adam Langley <agl@chromium.org> for fixing it. (CVE-2012-2110)
-
- Apr 17, 2012
-
-
Bodo Möller authored
(TLS 1.2 clients could end up negotiating these with an OpenSSL server with TLS 1.2 disabled, which is problematic.) Submitted by: Adam Langley
-
Dr. Stephen Henson authored
If OPENSSL_MAX_TLS1_2_CIPHER_LENGTH is set then limit the size of client ciphersuites to this value. A value of 50 should be sufficient. Document workarounds in CHANGES.
-
- Apr 05, 2012
-
-
Dr. Stephen Henson authored
enabled instead of requiring an application to hard code a (possibly inappropriate) parameter set and delve into EC internals we just automatically use the preferred curve.
-
- Mar 31, 2012
-
-
Andy Polyakov authored
-
- Mar 28, 2012
-
-
Dr. Stephen Henson authored
Tidy some code up. Don't allocate a structure to handle ECC extensions when it is used for default values. Make supported curves configurable. Add ctrls to retrieve shared curves: not fully integrated with rest of ECC code yet.
-