aboutsummaryrefslogtreecommitdiffstats
path: root/lib/ssl
AgeCommit message (Collapse)Author
2012-06-08ssl: Use ordered_set in cacheDan Gudmundsson
So we can use partial bound keys for matching
2012-06-08ssl: Move and avoid ets:select bottleneck in clientIngela Anderton Andin
Do not use ssl_manager process for selecting an id. It's unnecessary to involve the manager process at all on the client side.
2012-06-08ssl: Reuse session check optimizationIngela Anderton Andin
2012-06-08ssl: Avoid supervior bottleneckIngela Anderton Andin
This is done by using proc_lib and gen_fsm:enter_loop so that supervisor will not have to wait for the relative long initialization of an ssl connection process before starting another connection process.
2012-06-05Update to work with whitespace in exec pathLukas Larsson
OTP-10106 OTP-10107
2012-05-11Merge branch 'ia/ssl/doc-improvment' into maintIngela Anderton Andin
* ia/ssl/doc-improvment: Improved explanation of depth option
2012-04-27ssl: Fix parallel make for behavioursBjörn-Egil Dahlberg
2012-04-25Improved explanation of depth optionIngela Anderton Andin
2012-04-01Prepare releaseOTP_R15B01Erlang/OTP
2012-03-30Update copyright yearsBjörn-Egil Dahlberg
2012-03-27Corrected dialyzer specs and exported some dialyzer specsIngela Anderton Andin
2012-03-26Merge branch 'as/ssl-tls-prf-function' into maintGustav Simonsson
* as/ssl-tls-prf-function: Some protocols (e.g. EAP-PEAP, EAP-TLS, EAP-TTLS) that use TLS as transport layer need to generate additional application specific key material One way to generate such material is to use the TLS PRF and key material from the TLS session itself OTP-10024
2012-03-21Prepare for releaseIngela Anderton Andin
Distribution fixes so no need to soft upgrade.
2012-03-05Some protocols (e.g. EAP-PEAP, EAP-TLS, EAP-TTLS) that use TLS asAndreas Schultz
transport layer need to generate additional application specific key material. One way to generate such material is to use the TLS PRF and key material from the TLS session itself. This change makes it possible to use a TLS sessions PRF either with the session internal or caller supplied key material to generate additional key material.
2012-02-28Remove/add extra/missing white spacesRicardo Catalinas Jiménez
2012-02-16Merge branch 'rc/spell-registered' into maintHenrik Nord
* rc/spell-registered: Correct spelling of "registered" in various places in the source code OTP-9925
2012-02-14Merge branch 'pg/fix-ssl_tls_dist_proxy-setup-loop' into maintHenrik Nord
* pg/fix-ssl_tls_dist_proxy-setup-loop: Fix setup loop of SSL TLS dist proxy OTP-9915 OTP-9916
2012-02-14Merge branch 'pg/ssl_dist-fixes' into maintHenrik Nord
* pg/ssl_dist-fixes: Robustness and improvement to distribution over SSL
2012-02-14Robustness and improvement to distribution over SSLPaul Guyot
Fix a bug where the caller would timeout and ssl_tls_dist_proxy would crash. Fix a bug where a timeout from the SSL layer would block the distribution forever (typically when a non-SSL node tries to connect to an SSL node). Add this very case as a test (test_server tries to connect to SSL nodes). Run the proxy exclusively on the loopback interface.
2012-02-09Merge branch 'ia/ssl/test-maint/reject-sslv2-test' into maintIngela Anderton Andin
* ia/ssl/test-maint/reject-sslv2-test: Do not test sslv2 rejection with openssl-1.*
2012-02-08User defined verify_fun is now called correctlyIngela Anderton Andin
Background from erlang-questions: > We use this test suite to verify our PKIX-path-validation code, > granted we do not yet support CRL-handling but that is on its > way. Our verify_fun will let you work around the problem that it > is not yet supported. (Not so fun for you perhaps but a possible > solution for now). this is unfortunately not the case since for versions that contain commit 4dbf3c9e4ae7cfd19b247353369166d31b8f15e5 (it is in R14B04 and R15B) the documented behaviour (verify_fun will be called for every certificate) is broken: the verify_fun will only be called, if the certificate contains unknown extensions. it is therefore not useful as a CRL workaround (anymore). best regards Stefan Grundmann
2012-02-03Do not test sslv2 rejection with openssl-1.*Ingela Anderton Andin
Reason sslv2 support seems to be by default turned of.
2012-01-29Fix setup loop of SSL TLS dist proxyPaul Guyot
The proxy socket or the SSL socket can be closed during the setup phase. In such situations, the proxy processes must exit nicely, to avoid any leak of processes waiting forever for data from closed sockets.
2012-01-03Correct spelling of "registered" in various places in the source codeRichard Carlsson
2011-12-12Prepare releaseErlang/OTP
2011-12-09Update copyright yearsBjörn-Egil Dahlberg
2011-12-07Merge branch 'ia/ssl/tcp-delivery-problem-may-cause-econnaborted'Ingela Anderton Andin
* ia/ssl/tcp-delivery-problem-may-cause-econnaborted: If if TLS/SSL-close-notify message is not delivered you can get econnaborted error.
2011-12-07Merge branch 'ia/ssl/public_key/test-maint'Ingela Anderton Andin
* ia/ssl/public_key/test-maint: Add default value for "user" if os:getenv("USER") returns false
2011-12-07Merge branch 'ia/ssl/session/cleanup-test'Ingela Anderton Andin
* ia/ssl/session/cleanup-test: Improve ssl session cleanup test
2011-12-07Add default value for "user" if os:getenv("USER") returns falseIngela Anderton Andin
2011-12-06If if TLS/SSL-close-notify message is not delivered you can get econnabortedIngela Anderton Andin
error.
2011-12-06Improve ssl session cleanup testIngela Anderton Andin
Check last delay timer for both client and server side to avoide timing issues.
2011-12-05Fix typos in ssl_cipher.erlTuncer Ayaz
2011-12-05Added tcp_delivery_workaround to the test case invalid_signature_serverIngela Anderton Andin
The workaround ought to have been added to this case when it was added to the test case invalid_signature_client
2011-12-05Merge branch 'ia/ssl/dialyzer-R15'Ingela Anderton Andin
* ia/ssl/dialyzer-R15: Callback specs now handled by -callback directive in the behaviour module.
2011-12-05Do not do the 1/n-1 split for RC4 as it is not vulnerable to the ↵Ingela Anderton Andin
Rizzo/Duong-Beast attack.
2011-12-02Missed two places in previous fixIngela Anderton Andin
2011-12-01Callback specs now handled by -callback directive in the behaviour module.Ingela Anderton Andin
2011-11-30Test cases where failing due to timing issues in test case codeIngela Anderton Andin
2011-11-28If a passive receive was ongoing during a renegotiation the processIngela Anderton Andin
evaluating ssl:recv could be left hanging for ever.
2011-11-28Send ssl_closed notification to active ssl user when a tcp error occursIngela Anderton Andin
2011-11-28Send ssl_closed notification to active ssl user when a tcp error occursIngela Anderton Andin
2011-11-23Implementation of 1/n-1 splitting countermeasure Rizzo/Duong-BeastIngela Anderton Andin
The code is refactored and improved to make it easier to insert the 1/n-1 splitting countermeasure Rizzo/Duong-Beast that is really done in one function clause in ssl:record_split_bin/3
2011-11-21Mitigate Computational DoS attackIngela Anderton Andin
2011-11-16Merge branch 'ia/ssl/ets-next-problem/OTP-9703'Ingela Anderton Andin
* ia/ssl/ets-next-problem/OTP-9703: Replaced ets:next traversal with ets:foldl and throw
2011-11-16Merge branch 'ia/ssl/badarith/OTP-9696'Ingela Anderton Andin
* ia/ssl/badarith/OTP-9696: Improved session cleanup handling Fix badarith in ssl_session:validate_session/2
2011-11-15Removed compiler warningsIngela Anderton Andin
2011-11-15Work around bug in openss-1.0.0eIngela Anderton Andin
2011-11-15Use ERL_FLAGS in plain_verify_options testIngela Anderton Andin
Windows do not handle long commands and would crash if many ssl arguments are passed on the command prompt
2011-11-15Adjustment to work with hipeIngela Anderton Andin
process_info(Pid, current_function) may return {current_function, undefined} in some cases but will not in the importante one!