summaryrefslogtreecommitdiffstats
path: root/ssl/ssl_locl.h
AgeCommit message (Collapse)Author
2002-08-02get rid of OpenSSLDieBodo Möller
2002-07-10Ciphers with NULL encryption were not properly handled because they wereLutz Jänicke
not covered by the strength bit mask. Submitted by: Reviewed by: PR: 130
2001-03-09Consistently use 'void *' for SSL read, peek and write functions.Bodo Möller
2000-12-14The first step towards a SSL_peek fix.Bodo Möller
The main thing to verify about these changes is that nothing at all has changed, as far as behaviour is concerned (except that some SSLerr() invocations now have a different function code): SSL_read (ssl2_read, ssl3_read) behaves exactly as before, and SSL_peek refuses to do any work exactly as before. But now the functions actually doing the work have a 'peek' flag, so it should be easy to change them to behave accordingly.
2000-06-01The previous commit to crypto/stack/*.[ch] pulled the type-safety stringsGeoff Thorpe
yet tighter, and also put some heat on the rest of the library by insisting (correctly) that compare callbacks used in stacks are prototyped with "const" parameters. This has led to a depth-first explosion of compiler warnings in the code where 1 constification has led to 3 or 4 more. Fortunately these have all been resolved to completion and the code seems cleaner as a result - in particular many of the _cmp() functions should have been prototyped with "const"s, and now are. There was one little problem however; X509_cmp() should by rights compare "const X509 *" pointers, and it is now declared as such. However, it's internal workings can involve recalculating hash values and extensions if they have not already been setup. Someone with a more intricate understanding of the flow control of X509 might be able to tighten this up, but for now - this seemed the obvious place to stop the "depth-first" constification of the code by using an evil cast (they have migrated all the way here from safestack.h). Fortunately, this is the only place in the code where this was required to complete these type-safety changes, and it's reasonably clear and commented, and seemed the least unacceptable of the options. Trying to take the constification further ends up exploding out considerably, and indeed leads directly into generalised ASN functions which are not likely to cooperate well with this.
2000-02-21Fix some bugs and document othersBodo Möller
2000-02-20Move the registration of callback functions to special functionsRichard Levitte
designed for that. This removes the potential error to mix data and function pointers. Please note that I'm a little unsure how incorrect calls to the old ctrl functions should be handled, in som cases. I currently return 0 and that's it, but it may be more correct to generate a genuine error in those cases.
2000-02-20Tolerate fragmentation and interleaving in the SSL 3/TLS record layer.Bodo Möller
2000-02-03ispell (and minor modifications)Ulf Möller
2000-01-22Apply Lutz Behnke's 56 bit cipher patch with a fewDr. Stephen Henson
minor changes. Docs haven't been added at this stage. They are probably best included in the 'ciphers' program docs.
2000-01-06Use separate arrays for certificate verify and for finished hashes.Bodo Möller
2000-01-05Use prototypes.Bodo Möller
2000-01-05Slight code cleanup for handling finished labels.Bodo Möller
1999-06-09"extern" is a C++ reserved word.Ulf Möller
Pointed out by: Janez Jere <jj@void.si>
1999-05-21It was a very bad idea to use #include "../e_os.h" -- when this occursBodo Möller
in cryptlib.h (which is often included as "../cryptlib.h"), then the question remains relative to which directory this is to be interpreted. gcc went one further directory up, as intended; but makedepend thinks differently, and so probably do some C compilers. So the ../ must go away; thus e_os.h goes back into include/openssl (but I now use #include "openssl/e_os.h" instead of <openssl/e_os.h> to make the point) -- and we have another huge bunch of dependency changes. Argh.
1999-05-20Don't install e_os.h in include/openssl, use it only as a localBodo Möller
include file.
1999-05-15OPENSSL_EXTERNBodo Möller
1999-05-13Some tiny clean-ups related to the cert_st / sess_cert_st change.Bodo Möller
1999-05-13New structure type SESS_CERT used instead of CERT inside SSL_SESSION.Bodo Möller
While modifying the sources, I found some inconsistencies on the use of s->cert vs. s->session->sess_cert; I don't know if those could really have caused problems, but possibly this is a proper bug-fix and not just a clean-up.
1999-05-13VMS support.Ulf Möller
Submitted by: Richard Levitte <richard@levitte.org>
1999-05-13Spacing in comment corrected.Bodo Möller
1999-05-13First tiny changes in preparation of changing of "sess_cert" handling.Bodo Möller
Also I've subsituted real tabs for 8-spaces sequences in some lines so that things don't look that weird with a tab-width of 4.
1999-05-09Create a duplicate of the SSL_CTX's CERT in SSL_new instead of copyingBodo Möller
pointers. The cert_st handling is changed by this in various ways. Submitted by: Reviewed by: PR:
1999-05-09One comment was in the wrong line ... some others are new.Bodo Möller
Submitted by: Reviewed by: PR:
1999-05-09Some tiny changes to the source code to make future diffs smallerBodo Möller
when restructuring the cert_st handling (removed unnused parts, and the like). Submitted by: Reviewed by: PR:
1999-04-27New Configure option no-<cipher> (rsa, idea, rc5, ...).Ulf Möller
1999-04-26Remove NOPROTO definitions and error code comments.Ulf Möller
1999-04-23Change #include filenames from <foo.h> to <openssl.h>.Bodo Möller
Submitted by: Reviewed by: PR:
1999-04-23Work with -pedantic!Ben Laurie
1999-04-21Fix DES export ciphersuites.Ben Laurie
1999-04-17Massive constification.Ben Laurie
1999-04-12Add type-safe STACKs and SETs.Ben Laurie
1999-03-06Fix export ciphersuites, again.Ben Laurie
1999-02-25Add a bunch of SSL_xxx() functions for configuring the temporary RSA and DHRalf S. Engelschall
private keys and/or callback functions which directly correspond to their SSL_CTX_xxx() counterparts but work on a per-connection basis. This is needed for applications which have to configure certificates on a per-connection basis (e.g. Apache+mod_ssl) instead of a per-context basis (e.g. s_server). For the RSA certificate situation is makes no difference, but for the DSA certificate situation this fixes the "no shared cipher" problem where the OpenSSL cipher selection procedure failed because the temporary keys were not overtaken from the context and the API provided no way to reconfigure them. The new functions now let applications reconfigure the stuff and they are in detail: SSL_need_tmp_RSA, SSL_set_tmp_rsa, SSL_set_tmp_dh, SSL_set_tmp_rsa_callback and SSL_set_tmp_dh_callback. Additionally a new non-public-API function ssl_cert_instantiate() is used as a helper function and also to reduce code redundancy inside ssl_rsa.c. Submitted by: Ralf S. Engelschall Reviewed by: Ben Laurie
1999-02-21More stuff for new TLS ciphersuites.Ben Laurie
1999-02-21Undo a couple of kludges.Ben Laurie
1999-02-21Add support for new TLS export ciphersuites.Ben Laurie
1999-02-16Updates to the new SSL compression codeMark J. Cox
[Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)] Fix so that the version number in the master secret, when passed via RSA, checks that if TLS was proposed, but we roll back to SSLv3 (because the server will not accept higher), that the version number is 0x03,0x01, not 0x03,0x00 [Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)] Submitted by: Reviewed by: PR:
1999-01-16More prototypes.Ben Laurie
1998-12-22Various cleanups and fixed by Marc and Ralf to start the OpenTLS projectRalf S. Engelschall
1998-12-21Import of old SSLeay release: SSLeay 0.9.1b (unreleased)SSLeayRalf S. Engelschall
1998-12-21Import of old SSLeay release: SSLeay 0.9.0bRalf S. Engelschall
1998-12-21Import of old SSLeay release: SSLeay 0.8.1bRalf S. Engelschall