summaryrefslogtreecommitdiffstats
path: root/ssl/ssl_err.c
AgeCommit message (Collapse)Author
2001-07-09Patches from Vern Staats <staatsvr@asc.hpc.mil> to get Kerberos 5 inRichard Levitte
SSL according to RFC 2712. His comment is: This is a patch to openssl-SNAP-20010702 to support Kerberized SSL authentication. I'm expecting to have the full kssl-0.5 kit up on sourceforge by the end of the week. The full kit includes patches for mod-ssl, apache, and a few text clients. The sourceforge URL is http://sourceforge.net/projects/kssl/ . Thanks to a note from Simon Wilkinson I've replaced my KRB5 AP_REQ message with a real KerberosWrapper struct. I think this is fully RFC 2712 compliant now, including support for the optional authenticator field. I also added openssl-style ASN.1 macros for a few Kerberos structs; see crypto/krb5/ if you're interested.
2001-04-08Avoid assert() in the library.Bodo Möller
2001-03-08add ssl23_peekBodo Möller
2001-03-07Fix ERR_R_... problems.Bodo Möller
2001-03-05Move ec.h to ec2.h because it is not compatible with what we will use.Bodo Möller
Add EC vaporware: change relevant Makefiles and add some empty source files. "make update".
2001-02-21This change allows a callback to be used to override the generation ofGeoff Thorpe
SSL/TLS session IDs in a server. According to RFC2246, the session ID is an arbitrary value chosen by the server. It can be useful to have some control over this "arbitrary value" so as to choose it in ways that can aid in things like external session caching and balancing (eg. clustering). The default session ID generation is to fill the ID with random data. The callback used by default is built in to ssl_sess.c, but registering a callback in an SSL_CTX or in a particular SSL overrides this. BTW: SSL callbacks will override SSL_CTX callbacks, and a new SSL structure inherits any callback set in its 'parent' SSL_CTX. The header comments describe how this mechanism ticks, and source code comments describe (hopefully) why it ticks the way it does. Man pages are on the way ... [NB: Lutz was also hacking away and helping me to figure out how best to do this.]
2001-02-20Use new-style system-id macros everywhere possible. I hope I haven'tRichard Levitte
missed any. This compiles and runs on Linux, and external applications have no problems with it. The definite test will be to build this on VMS.
2000-12-27Get rid of unused error code.Bodo Möller
2000-12-14First step towards SSL_peek fix.Bodo Möller
2000-11-28Disable SSL_peek until it is fixed.Bodo Möller
2000-11-26modular arithmeticsBodo Möller
"make update"
2000-09-22Avoid protocol rollback.Bodo Möller
2000-03-14Use correct function names in SSLerr macros.Bodo Möller
2000-03-05Preserve reason strings in automatically build tables.Bodo Möller
2000-02-25Allow code which calls RSA temp key callback to copeDr. Stephen Henson
with a failure. Fix typos in some error codes.
2000-02-23make updateRichard Levitte
2000-02-20Tolerate fragmentation and interleaving in the SSL 3/TLS record layer.Bodo Möller
2000-02-03ispell (and minor modifications)Ulf Möller
2000-01-22Apply Lutz Behnke's 56 bit cipher patch with a fewDr. Stephen Henson
minor changes. Docs haven't been added at this stage. They are probably best included in the 'ciphers' program docs.
2000-01-13Precautions against using the PRNG uninitialized: RAND_bytes() nowUlf Möller
returns int (1 = ok, 0 = not seeded). New function RAND_add() is the same as RAND_seed() but takes an estimate of the entropy as an additional argument.
2000-01-11Clean up some of the SSL server code.Bodo Möller
1999-11-29Remainder of SSL purpose and trust code: trust and purpose setting inDr. Stephen Henson
SSL_CTX and SSL, functions to set them and defaults if no values set.
1999-05-17Additional, more descriptive error message for rejection of a session IDBodo Möller
because of missing session ID context (so that application programmers are directly pointed to what they should do differently).
1999-05-13New structure type SESS_CERT used instead of CERT inside SSL_SESSION.Bodo Möller
While modifying the sources, I found some inconsistencies on the use of s->cert vs. s->session->sess_cert; I don't know if those could really have caused problems, but possibly this is a proper bug-fix and not just a clean-up.
1999-05-11And I thought I could spell ... but in caps really everything looks the same.Bodo Möller
Submitted by: Reviewed by: PR:
1999-05-11Make SSL library a little more fool-proof by not requiring any longerBodo Möller
that SSL_set_{accept,connect}_state be called before SSL_{accept,connect} may be used. Submitted by: Reviewed by: PR:
1999-05-09Create a duplicate of the SSL_CTX's CERT in SSL_new instead of copyingBodo Möller
pointers. The cert_st handling is changed by this in various ways. Submitted by: Reviewed by: PR:
1999-05-01New function SSL_CTX_use_certificate_chain_file.Bodo Möller
Submitted by: Reviewed by: PR:
1999-04-30New function SSL_CTX_set_session_id_context.Bodo Möller
Submitted by: Reviewed by: PR:
1999-04-24Complete rewrite of the error code generation script. It now runs as a singleDr. Stephen Henson
script, translates function codes better and doesn't need the K&R function prototypes to work (NB. the K&R prototypes can't be wiped just yet: they are still needed by the DEF generator...). I also ran the script with the -rewrite option to update all the header and source files.
1999-04-23Change #include filenames from <foo.h> to <openssl.h>.Bodo Möller
Submitted by: Reviewed by: PR:
1999-04-19Change functions to ANSI C.Ulf Möller
1999-03-22Fix security hole.Ben Laurie
1999-03-06Fix names of cert stack functions.Ben Laurie
1999-02-28Add functions to add certs to stacks, used for CA file/path stuff in servers.Ben Laurie
1999-02-25Add a bunch of SSL_xxx() functions for configuring the temporary RSA and DHRalf S. Engelschall
private keys and/or callback functions which directly correspond to their SSL_CTX_xxx() counterparts but work on a per-connection basis. This is needed for applications which have to configure certificates on a per-connection basis (e.g. Apache+mod_ssl) instead of a per-context basis (e.g. s_server). For the RSA certificate situation is makes no difference, but for the DSA certificate situation this fixes the "no shared cipher" problem where the OpenSSL cipher selection procedure failed because the temporary keys were not overtaken from the context and the API provided no way to reconfigure them. The new functions now let applications reconfigure the stuff and they are in detail: SSL_need_tmp_RSA, SSL_set_tmp_rsa, SSL_set_tmp_dh, SSL_set_tmp_rsa_callback and SSL_set_tmp_dh_callback. Additionally a new non-public-API function ssl_cert_instantiate() is used as a helper function and also to reduce code redundancy inside ssl_rsa.c. Submitted by: Ralf S. Engelschall Reviewed by: Ben Laurie
1999-02-20Generate errors when public/private key check is done.Ben Laurie
1999-02-16Updates to the new SSL compression codeMark J. Cox
[Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)] Fix so that the version number in the master secret, when passed via RSA, checks that if TLS was proposed, but we roll back to SSLv3 (because the server will not accept higher), that the version number is 0x03,0x01, not 0x03,0x00 [Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)] Submitted by: Reviewed by: PR:
1998-12-21Import of old SSLeay release: SSLeay 0.9.1b (unreleased)SSLeayRalf S. Engelschall
1998-12-21Import of old SSLeay release: SSLeay 0.9.0bRalf S. Engelschall
1998-12-21Import of old SSLeay release: SSLeay 0.8.1bRalf S. Engelschall