| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
| |
Check for Suite B support using method flags instead of version numbers:
anything supporting TLS 1.2 cipher suites will also support Suite B.
Return an error if an attempt to use DTLS 1.0 is made in Suite B mode.
|
|
|
|
| |
error coded
|
| |
|
| |
|
| |
|
|
|
|
|
| |
a ciphersuite to position the SCSV value in different places for testing
purposes.
|
|
|
|
|
|
| |
client hello message. Previously this could only be retrieved on an initial
connection and it was impossible to determine the cipher IDs of any uknown
ciphersuites.
|
|
|
|
| |
instead of waiting until server key exchange
|
| |
|
| |
|
|
|
|
| |
PR: 2778
|
|
|
|
|
|
|
|
|
| |
The cipher definitions of these ciphersuites have been around since SSLeay
but were always disabled. Now OpenSSL supports DH certificates they can be
finally enabled.
Various additional changes were needed to make them work properly: many
unused fixed DH sections of code were untested.
|
|
|
|
|
|
| |
methods isn't presorted, it will be sorted on first read).
Submitted by: Adam Langley
|
| |
|
|
|
|
|
|
|
| |
invocation field.
Add complete support for AES GCM ciphersuites including all those in
RFC5288 and RFC5289.
|
|
|
|
| |
prohibit use of these ciphersuites for TLS < 1.2
|
|
|
|
| |
combos that can be implemented as AEAD ciphers.
|
| |
|
| |
|
|
|
|
|
|
|
| |
checking added, SHA256 PRF support added.
At present only RSA key exchange ciphersuites work with TLS v1.2 as the
new signature format is not yet implemented.
|
|
|
|
|
|
|
|
|
|
| |
OPENSSL_NO_SSL_INTERN all ssl related structures are opaque
and internals cannot be directly accessed. Many applications
will need some modification to support this and most likely some
additional functions added to OpenSSL.
The advantage of this option is that any application supporting
it will still be binary compatible if SSL structures change.
|
| |
|
| |
|
|
|
|
|
|
|
| |
Submitted by: Tomas Mraz <tmraz@redhat.com>
Approved by: steve@openssl.org
Constify SSL_CIPHER_description
|
| |
|
|
|
|
|
|
| |
Reviewed by: steve@openssl.org
Check return value of sk_SSL_COMP_find() properly.
|
|
|
|
|
|
| |
Some #include statements were not properly protected. This will go unnoted
on most systems as openssl/comp.h tends to be installed as a system header
file by default but may become visible when cross compiling.
|
|
|
|
| |
test for them!
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
| |
strength "FIPS" to represent all FIPS approved ciphersuites without NULL
encryption.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
of handshake failure
2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
(required for s3_srvr to accept GOST client certificates).
3. Changes to EVP
- adding of function EVP_PKEY_CTX_get0_peerkey
- Make function EVP_PKEY_derive_set_peerkey work for context with
ENCRYPT operation, because we use peerkey field in the context to
pass non-ephemeral secret key to GOST encrypt operation.
- added EVP_PKEY_CTRL_SET_IV control command. It is really
GOST-specific, but it is used in SSL code, so it has to go
in some header file, available during libssl compilation
4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data
5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
make debugging output which depends on constants defined there, work
and other KSSL_DEBUG output fixes
6. Declaration of real GOST ciphersuites, two authentication methods
SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST
7. Implementation of these methods.
8. Support for sending unsolicited serverhello extension if GOST
ciphersuite is selected. It is require for interoperability with
CryptoPro CSP 3.0 and 3.6 and controlled by
SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
This constant is added to SSL_OP_ALL, because it does nothing, if
non-GOST ciphersuite is selected, and all implementation of GOST
include compatibility with CryptoPro.
9. Support for CertificateVerify message without length field. It is
another CryptoPro bug, but support is made unconditional, because it
does no harm for draft-conforming implementation.
10. In tls1_mac extra copy of stream mac context is no more done.
When I've written currently commited code I haven't read
EVP_DigestSignFinal manual carefully enough and haven't noticed that
it does an internal digest ctx copying.
This implementation was tested against
1. CryptoPro CSP 3.6 client and server
2. Cryptopro CSP 3.0 server
|
|
|
|
| |
Fix additional gcc 4.2 value not used warnings.
|
|
|
|
| |
Submitted by: Victor B. Wagner <vitus@cryptocom.ru>
|
| |
|
|
|
|
|
|
| |
PR: 1503
Submitted by: KISA
Reviewed by: Bodo Moeller
|
|
|
|
|
| |
Submitted by: ran@cryptocom.ru
Reviewed by: steve@openssl.org
|
| |
|
| |
|
|
|
|
|
| |
Change ssl_create_cipher_list() to prefer ephemeral ECDH over
ephemeral DH.
|
| |
|
|
|
|
|
|
|
|
|
|
| |
ciphersuite string such as "DEFAULT:RSA" cannot enable
authentication-only ciphersuites.
Also, change ssl_create_cipher_list() so that it no longer
starts with an arbitrary ciphersuite ordering, but instead
uses the logic that we previously had in SSL_DEFEAULT_CIPHER_LIST.
SSL_DEFAULT_CIPHER_LIST simplifies into just "ALL:!aNULL:!eNULL".
|
|
|
|
|
|
|
|
|
|
| |
This change resolves a number of problems and obviates multiple kludges.
A new feature is that you can now say "AES256" or "AES128" (not just
"AES", which enables both).
In some cases the ciphersuite list generated from a given string is
affected by this change. I hope this is just in those cases where the
previous behaviour did not make sense.
|
| |
|
|
|
|
| |
ciphersuite as well
|
|
|
|
| |
Fix warnings.
|
|
|
|
|
| |
Also, change the default ciphersuite to give some prefererence to
ciphersuites with forwared secrecy (rather than using a random order).
|