summaryrefslogtreecommitdiffstats
path: root/ssl
AgeCommit message (Collapse)Author
2001-12-09Improve back compatibility.Ben Laurie
2001-11-23For future portability reasons MIT is moving all macros to functionBodo Möller
calls. This patch allows compilation either way. Submitted by: Jeffrey Altman <jaltman@columbia.edu>
2001-11-14cast to unsigned int, not to int to avoid the warning -- all theseBodo Möller
values really are unsigned
2001-11-14unsigned int vs. int.Richard Levitte
2001-11-10make code a little more similar to what it looked like before the fixes,Bodo Möller
call ssl2_part_read again to parse error message
2001-11-10Implement msg_callback for SSL 2.0.Bodo Möller
Important SSL 2.0 bugfixes (bugs found while implementing msg_callback).
2001-10-30Change the shared library support so the shared libraries get builtRichard Levitte
sooner and the programs get built against the shared libraries. This requires a bit more work. Things like -rpath and the possibility to still link the programs statically should be included. Some cleanup is also needed. This will be worked on.
2001-10-29Addapt VMS scripts to the newer disk layout system ODS-5, which allows more ↵Richard Levitte
than one period and mixed size characters in file names
2001-10-25Consistency with s2_... and s23_... variants (no real functionalBodo Möller
change)
2001-10-25Assume TLS 1.0 when ClientHello fragment is too short.Bodo Möller
2001-10-24Fix SSL handshake functions and SSL_clear() such that SSL_clear()Bodo Möller
never resets s->method to s->ctx->method when called from within one of the SSL handshake functions.
2001-10-24Deprecate the macro MAC_OS_pre_X.Richard Levitte
2001-10-22Fix memory leak.Bodo Möller
2001-10-20Call msg_callback with correct length parameter if ssl3_write_bytes had toBodo Möller
be called multiple times
2001-10-20New functions SSL[_CTX]_set_msg_callback().Bodo Möller
New macros SSL[_CTX]_set_msg_callback_arg(). Message callback imlementation for SSL 3.0/TLS 1.0 (no SSL 2.0 yet). New '-msg' option for 'openssl s_client' and 'openssl s_server' that enable a message callback that displays all protocol messages. In ssl3_get_client_hello (ssl/s3_srvr.c), generate a fatal alert if client_version is smaller than the protocol version in use. Also change ssl23_get_client_hello (ssl/s23_srvr.c) to select TLS 1.0 if the client demanded SSL 3.0 but only TLS 1.0 is enabled; then the client will at least see that alert. Fix SSL[_CTX]_ctrl prototype (void * instead of char * for generic pointer). Add/update some OpenSSL copyright notices.
2001-10-17gcc complained about "write" being shadowed even though the "write"Bodo Möller
variable name occured just in a function *prototype* -- so rename it
2001-10-17Wrong place...Richard Levitte
2001-10-17The EVP_*Init_ex() functions take one extra argument. Let's defaultRichard Levitte
it to NULL.
2001-10-17Modify EVP cipher behaviour in a similar wayDr. Stephen Henson
to digests to retain compatibility.
2001-10-16Add per-SSL 'msg_callback' with 'msg_callback_arg'.Bodo Möller
Both have per-SSL_CTX defaults. These new values can be set by calling SSL[_CTX]_[callback_]ctrl with codes SSL_CTRL_SET_MSG_CALLBACK and SSL_CTRL_SET_MSG_CALLBACK_ARG. So far, the callback is never actually called. Also rearrange some SSL_CTX struct members (some exist just in SSL_CTXs, others are defaults for SSLs and are either copied during SSL_new, or used if the value in the SSL is not set; these three classes of members were not in a logical order), and add some missing assignments to SSL_dup.
2001-10-16Retain compatibility of EVP_DigestInit() and EVP_DigestFinal()Dr. Stephen Henson
with existing code. Modify library to use digest *_ex() functions.
2001-10-16The message header for fake SSL 3.0/TLS 1.0 client hellos created fromBodo Möller
SSL 2.0 client hellos added with the previous commit was totally wrong -- it must start with the message type, not the protocol version. (Not that this particular header is actually used anywhere ...)
2001-10-15For consistency, set s->init_num in the 'reuse_message' caseBodo Möller
(if s23_srvr.c faked the message, s->init_num is 0).
2001-10-15Change ssl3_get_message and the functions using it so that completeBodo Möller
'Handshake' protocol structures are kept in memory, including 'msg_type' and 'length'. (This is in preparation of future support for callbacks that get to peek at handshake messages and the like.)
2001-10-15Fix ssl3_get_message handle message fragmentation correctly.Bodo Möller
2001-10-15the previous commit accidentily removed 'ret = 1' from the SSL_ST_OKBodo Möller
case of ssl3_accept
2001-10-10To avoid commit wars over dependencies, let's make it so things thatRichard Levitte
depend on the environment, like the presence of the OpenBSD crypto device or of Kerberos, do not change the dependencies within OpenSSL.
2001-10-04SSL_add_dir_cert_subjects_to_stack for Win32 finally implemented.Richard Levitte
Submitted by Massimo Santin <msantin@santineassociati.com>.
2001-10-04'make update'Richard Levitte
2001-09-24commentBodo Möller
2001-09-24avoid everything resembling a magic trigraphBodo Möller
2001-09-21bugfix: handle HelloRequest received during handshake correctlyBodo Möller
2001-09-21Disable session related stuff in SSL_ST_OK case of ssl3_accept if weBodo Möller
just sent a HelloRequest.
2001-09-21Bugfix: correct cleanup after sending a HelloRequestBodo Möller
2001-09-20New function SSL_renegotiate_pending().Bodo Möller
New option SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION.
2001-09-20fix ssl3_accept: don't call ssl_init_wbio_buffer() in HelloRequest caseBodo Möller
2001-09-20Fix ssl/s3_enc.c, ssl/t1_enc.c and ssl/s3_pkt.c so that we don'tBodo Möller
reveal whether illegal block cipher padding was found or a MAC verification error occured. In ssl/s2_pkt.c, verify that the purported number of padding bytes is in the legal range.
2001-09-14add commentBodo Möller
2001-09-11Make maximum certifcate chain size accepted from the peer applicationLutz Jänicke
settable (proposed by "Douglas E. Engert" <deengert@anl.gov>).
2001-09-10Fix apps/openssl.c and ssl/ssltest.c so that they useBodo Möller
CRYPTO_set_mem_debug_options() instead of CRYPTO_dbg_set_options(), which is the default implementation of the former and should usually not be directly used by applications (at least if we assume that the options accepted by the default implementation will also be meaningful to any other implementations). Also fix apps/openssl.c and ssl/ssltest such that environment variable setting 'OPENSSL_DEBUG_MEMORY=off' actively disables the compiled-in library defaults (i.e. such that CRYPTO_MDEBUG is ignored in this case).
2001-09-03Rename recently introduced functions for improved code clarity:Bodo Möller
[DR]SA_up => [DR]SA_up_ref
2001-09-01Make the necessary changes to work with the recent "ex_data" overhaul.Geoff Thorpe
See the commit log message for that for more information. NB: X509_STORE_CTX's use of "ex_data" support was actually misimplemented (initialisation by "memset" won't/can't/doesn't work). This fixes that but requires that X509_STORE_CTX_init() be able to handle errors - so its prototype has been changed to return 'int' rather than 'void'. All uses of that function throughout the source code have been tracked down and adjusted.
2001-08-28(A version of) gcc had been giving somewhat odd "trigraph" warnings aboutGeoff Thorpe
this construct, and Ulf provided the following insight as to why; > ANSI C compliant compilers must substitute "??)" for "]" because your > terminal might not have a "]" key if you bought it in the early 1970s. So we escape the final '?' to avoid this pathological case.
2001-08-28Fix SSL memory leak.Ben Laurie
2001-08-25Changes crypto/evp/ and ssl/ code from directly incrementing referenceGeoff Thorpe
counts in DH, DSA, and RSA structures. Instead they use the new "***_up()" functions that handle this.
2001-08-25Allow client certificate lists > 16kB ("Douglas E. Engert" <deengert@anl.gov>.)Lutz Jänicke
2001-08-23More manual pages. Constify.Lutz Jänicke
2001-08-21Checked in from the wrong !@#$%&*() copy...Lutz Jänicke
2001-08-19Alert description strings for TLSv1 and documentation.Lutz Jänicke
2001-08-12The indexes returned by ***_get_ex_new_index() functions are used whenGeoff Thorpe
setting stack (actually, array) values in ex_data. So only increment the global counters if the underlying CRYPTO_get_ex_new_index() call succeeds. This change doesn't make "ex_data" right (see the comment at the head of ex_data.c to know why), but at least makes the source code marginally less frustrating.