summaryrefslogtreecommitdiff
path: root/ssl/ssl_ciph.c
Commit message (Collapse)AuthorAgeFilesLines
* Suite B support for DTLS 1.2Dr. Stephen Henson2013-04-091-3/+7
| | | | | | | Check for Suite B support using method flags instead of version numbers: anything supporting TLS 1.2 cipher suites will also support Suite B. Return an error if an attempt to use DTLS 1.0 is made in Suite B mode.
* return error if Suite B mode is selected and TLS 1.2 can't be used. Correct ↵Dr. Stephen Henson2012-12-011-0/+7
| | | | error coded
* set auto ecdh parameter selction for Suite BDr. Stephen Henson2012-11-261-0/+2
|
* add Suite B 128 bit mode offering only combination 2Dr. Stephen Henson2012-11-241-2/+10
|
* add "missing" TLSv1.2 cipher aliasDr. Stephen Henson2012-11-151-2/+3
|
* If OPENSSL_SSL_DEBUG_BROKEN_PROTOCOL is set allow the use of "SCSV" asDr. Stephen Henson2012-09-301-1/+4
| | | | | a ciphersuite to position the SCSV value in different places for testing purposes.
* Add ctrl and utility functions to retrieve raw cipher list sent by client inDr. Stephen Henson2012-09-121-0/+13
| | | | | | client hello message. Previously this could only be retrieved on an initial connection and it was impossible to determine the cipher IDs of any uknown ciphersuites.
* perform sanity checks on server certificate type as soon as it is received ↵Dr. Stephen Henson2012-08-311-1/+43
| | | | instead of waiting until server key exchange
* Add three Suite B modes to TLS code, supporting RFC6460.Dr. Stephen Henson2012-08-151-1/+44
|
* Don't try to use unvalidated composite ciphers in FIPS modeDr. Stephen Henson2012-04-261-0/+5
|
* ssl/ssl_ciph.c: interim solution for assertion in d1_pkt.c(444).Andy Polyakov2012-04-041-6/+7
| | | | PR: 2778
* Support for fixed DH ciphersuites.Dr. Stephen Henson2012-01-161-5/+3
| | | | | | | | | The cipher definitions of these ciphersuites have been around since SSLeay but were always disabled. Now OpenSSL supports DH certificates they can be finally enabled. Various additional changes were needed to make them work properly: many unused fixed DH sections of code were untested.
* Resolve a stack set-up race condition (if the list of compressionBodo Möller2011-12-021-0/+1
| | | | | | methods isn't presorted, it will be sorted on first read). Submitted by: Adam Langley
* disable GCM if not availableDr. Stephen Henson2011-10-101-0/+2
|
* Expand range of ctrls for AES GCM to support retrieval and setting ofDr. Stephen Henson2011-08-031-7/+31
| | | | | | | invocation field. Add complete support for AES GCM ciphersuites including all those in RFC5288 and RFC5289.
* Add HMAC ECC ciphersuites from RFC5289. Include SHA384 PRF support andDr. Stephen Henson2011-07-251-4/+21
| | | | prohibit use of these ciphersuites for TLS < 1.2
* ssl/ssl_ciph.c: allow to switch to predefined "composite" cipher/macAndy Polyakov2011-07-111-1/+22
| | | | combos that can be implemented as AEAD ciphers.
* Implement FIPS_mode and FIPS_mode_setDr. Stephen Henson2011-05-191-0/+7
|
* Disable SHA256 if not supported.Dr. Stephen Henson2011-05-011-0/+1
|
* Initial incomplete TLS v1.2 support. New ciphersuites added, new versionDr. Stephen Henson2011-04-291-6/+20
| | | | | | | checking added, SHA256 PRF support added. At present only RSA key exchange ciphersuites work with TLS v1.2 as the new signature format is not yet implemented.
* Initial "opaque SSL" framework. If an application definesDr. Stephen Henson2011-04-291-0/+5
| | | | | | | | | | OPENSSL_NO_SSL_INTERN all ssl related structures are opaque and internals cannot be directly accessed. Many applications will need some modification to support this and most likely some additional functions added to OpenSSL. The advantage of this option is that any application supporting it will still be binary compatible if SSL structures change.
* Add SRP support.Ben Laurie2011-03-121-0/+8
|
* Fix warnings.Ben Laurie2010-06-121-4/+2
|
* PR: 2025Dr. Stephen Henson2009-09-121-1/+1
| | | | | | | Submitted by: Tomas Mraz <tmraz@redhat.com> Approved by: steve@openssl.org Constify SSL_CIPHER_description
* Update from 0.9.8-stable.Dr. Stephen Henson2009-04-071-0/+1
|
* Submitted by: Victor Duchovni <Victor.Duchovni@morganstanley.com>Dr. Stephen Henson2009-03-121-1/+1
| | | | | | Reviewed by: steve@openssl.org Check return value of sk_SSL_COMP_find() properly.
* Fix compilation with -no-comp by adding some more #ifndef OPENSSL_NO_COMPLutz Jänicke2009-01-051-0/+2
| | | | | | Some #include statements were not properly protected. This will go unnoted on most systems as openssl/comp.h tends to be installed as a system header file by default but may become visible when cross compiling.
* If we're going to return errors (no matter how stupid), then we shouldBen Laurie2008-12-291-0/+3
| | | | test for them!
* Make no-engine work again.Dr. Stephen Henson2008-12-201-3/+23
|
* Stop warning about different const qualifiers.Dr. Stephen Henson2008-11-241-1/+1
|
* Fix warning.Ben Laurie2008-10-291-3/+3
|
* Win32 fixes... add new directory to build system. Fix warnings.Dr. Stephen Henson2008-10-271-1/+1
|
* Type-checked (and modern C compliant) OBJ_bsearch.Ben Laurie2008-10-121-10/+9
|
* Add SSL_FIPS flag for FIPS 140-2 approved ciphersuites and add a newDr. Stephen Henson2008-09-101-0/+2
| | | | | strength "FIPS" to represent all FIPS approved ciphersuites without NULL encryption.
* 1. Changes for s_client.c to make it return non-zero exit code in caseDr. Stephen Henson2007-10-261-2/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | of handshake failure 2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH (required for s3_srvr to accept GOST client certificates). 3. Changes to EVP - adding of function EVP_PKEY_CTX_get0_peerkey - Make function EVP_PKEY_derive_set_peerkey work for context with ENCRYPT operation, because we use peerkey field in the context to pass non-ephemeral secret key to GOST encrypt operation. - added EVP_PKEY_CTRL_SET_IV control command. It is really GOST-specific, but it is used in SSL code, so it has to go in some header file, available during libssl compilation 4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data 5. Include des.h if KSSL_DEBUG is defined into some libssl files, to make debugging output which depends on constants defined there, work and other KSSL_DEBUG output fixes 6. Declaration of real GOST ciphersuites, two authentication methods SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST 7. Implementation of these methods. 8. Support for sending unsolicited serverhello extension if GOST ciphersuite is selected. It is require for interoperability with CryptoPro CSP 3.0 and 3.6 and controlled by SSL_OP_CRYPTOPRO_TLSEXT_BUG constant. This constant is added to SSL_OP_ALL, because it does nothing, if non-GOST ciphersuite is selected, and all implementation of GOST include compatibility with CryptoPro. 9. Support for CertificateVerify message without length field. It is another CryptoPro bug, but support is made unconditional, because it does no harm for draft-conforming implementation. 10. In tls1_mac extra copy of stream mac context is no more done. When I've written currently commited code I haven't read EVP_DigestSignFinal manual carefully enough and haven't noticed that it does an internal digest ctx copying. This implementation was tested against 1. CryptoPro CSP 3.6 client and server 2. Cryptopro CSP 3.0 server
* Change safestack reimplementation to match 0.9.8.Dr. Stephen Henson2007-09-071-1/+1
| | | | Fix additional gcc 4.2 value not used warnings.
* Update ssl code to support digests other than MD5+SHA1 in handshake.Dr. Stephen Henson2007-08-311-13/+54
| | | | Submitted by: Victor B. Wagner <vitus@cryptocom.ru>
* Update ssl library to support EVP_PKEY MAC API. Include generic MAC support.Dr. Stephen Henson2007-06-041-7/+66
|
* Add SEED encryption algorithm.Bodo Möller2007-04-231-2/+13
| | | | | | PR: 1503 Submitted by: KISA Reviewed by: Bodo Moeller
* Stage 1 GOST ciphersuite support.Dr. Stephen Henson2007-03-231-2/+9
| | | | | Submitted by: ran@cryptocom.ru Reviewed by: steve@openssl.org
* prefer SHA1 over MD5 (this affects the Kerberos ciphersuites)Bodo Möller2007-02-211-2/+5
|
* SSL_kKRB5 ciphersuites shouldn't be preferred by defaultBodo Möller2007-02-201-0/+1
|
* Improve ciphersuite order stability when disabling ciphersuites.Bodo Möller2007-02-201-20/+77
| | | | | Change ssl_create_cipher_list() to prefer ephemeral ECDH over ephemeral DH.
* fix a typo in the new ciphersuite ordering codeBodo Möller2007-02-201-2/+3
|
* Include "!eNULL" in SSL_DEFAULT_CIPHER_LIST to make sure that aBodo Möller2007-02-191-0/+35
| | | | | | | | | | ciphersuite string such as "DEFAULT:RSA" cannot enable authentication-only ciphersuites. Also, change ssl_create_cipher_list() so that it no longer starts with an arbitrary ciphersuite ordering, but instead uses the logic that we previously had in SSL_DEFEAULT_CIPHER_LIST. SSL_DEFAULT_CIPHER_LIST simplifies into just "ALL:!aNULL:!eNULL".
* Reorganize the data used for SSL ciphersuite pattern matching.Bodo Möller2007-02-171-235/+337
| | | | | | | | | | This change resolves a number of problems and obviates multiple kludges. A new feature is that you can now say "AES256" or "AES128" (not just "AES", which enables both). In some cases the ciphersuite list generated from a given string is affected by this change. I hope this is just in those cases where the previous behaviour did not make sense.
* remove undefined constantNils Larsch2007-01-031-1/+1
|
* ensure that ciphersuite strings such as "RC4-MD5" match the SSL 2.0Bodo Möller2006-09-111-12/+16
| | | | ciphersuite as well
* Make things static that should be. Declare stuff in headers that should be.Ben Laurie2006-08-281-1/+1
| | | | Fix warnings.
* Error messages for client ECC cert verification.Bodo Möller2006-06-151-1/+1
| | | | | Also, change the default ciphersuite to give some prefererence to ciphersuites with forwared secrecy (rather than using a random order).