fix typos in README, ssl.c
This commit is contained in:
parent
2c87cfa983
commit
207859cde8
12
README
12
README
@ -14,7 +14,7 @@ key cipher suites with
|
||||
though static key cipher suites are deprecated and will be removed from future
|
||||
versions of TLS. They also lower your security by removing PFS.
|
||||
|
||||
When compiling ssl.c wolfSSL will now issue a comipler error if no cipher suites
|
||||
When compiling ssl.c wolfSSL will now issue a compiler error if no cipher suites
|
||||
are available. You can remove this error by defining WOLFSSL_ALLOW_NO_SUITES
|
||||
in the event that you desire that, i.e., you're not using TLS cipher suites.
|
||||
|
||||
@ -41,16 +41,16 @@ includes bug fixes and new features including:
|
||||
a) If using wolfSSL for DTLS on the server side of a publicly accessible
|
||||
machine you MUST update.
|
||||
b) If using wolfSSL for TLS on the server side with private RSA keys allowing
|
||||
ephemeral key exchange without low memory optimziations you MUST update and
|
||||
ephemeral key exchange without low memory optimizations you MUST update and
|
||||
regenerate the private RSA keys.
|
||||
|
||||
Please see https://www.wolfssl.com/wolfSSL/Blog/Blog.html for more details
|
||||
|
||||
- No filesystem build fixes for various configurations
|
||||
- Certificate generation now supports several extensions including KeyUsage,
|
||||
SKID, AKID, and Ceritifcate Policies
|
||||
SKID, AKID, and Certificate Policies
|
||||
- CRLs can be loaded from buffers as well as files now
|
||||
- SHA-512 Ceritifcate Signing generation
|
||||
- SHA-512 Certificate Signing generation
|
||||
- Fixes for sniffer reassembly processing
|
||||
|
||||
See INSTALL file for build instructions.
|
||||
@ -74,7 +74,7 @@ Release 3.6.6 of wolfSSL has bug fixes and new features including:
|
||||
size is smaller than the total message size, no user action required.
|
||||
- DTLS duplicate message fixes
|
||||
- Visual Studio project files now support DLL and static builds for 32/64bit.
|
||||
- Support for new Freesacle I/O
|
||||
- Support for new Freescale I/O
|
||||
- FreeRTOS FIPS support
|
||||
|
||||
- No high level security fixes that requires an update though we always
|
||||
@ -186,7 +186,7 @@ Release 3.4.0 wolfSSL has bug fixes and new features including:
|
||||
the Prosecco team at INRIA Paris-Rocquencourt for the report.
|
||||
- FIPS version submitted
|
||||
- Removes SSLv2 Client Hello processing, can be enabled with OLD_HELLO_ALLOWED
|
||||
- User can set mimimum downgrade version with CyaSSL_SetMinVersion()
|
||||
- User can set minimum downgrade version with CyaSSL_SetMinVersion()
|
||||
- Small stack improvements at TLS/SSL layer
|
||||
- TLS Master Secret generation and Key Expansion are now exposed
|
||||
- Adds client side Secure Renegotiation, * not recommended *
|
||||
|
10
src/ssl.c
10
src/ssl.c
@ -44,7 +44,7 @@
|
||||
#ifndef WOLFSSL_ALLOW_NO_SUITES
|
||||
#if defined(NO_DH) && !defined(HAVE_ECC) && !defined(WOLFSSL_STATIC_RSA) \
|
||||
&& !defined(WOLFSSL_STATIC_DH) && !defined(WOLFSSL_STATIC_PSK)
|
||||
#error "No cipher suites defined becuase DH disabled, ECC disabled, and no static suites defined. Please see top of README"
|
||||
#error "No cipher suites defined because DH disabled, ECC disabled, and no static suites defined. Please see top of README"
|
||||
#endif
|
||||
#endif
|
||||
|
||||
@ -373,7 +373,7 @@ int wolfSSL_dtls_get_peer(WOLFSSL* ssl, void* peer, unsigned int* peerSz)
|
||||
#endif /* WOLFSSL_LEANPSK */
|
||||
|
||||
|
||||
/* return underlyig connect or accept, SSL_SUCCESS on ok */
|
||||
/* return underlying connect or accept, SSL_SUCCESS on ok */
|
||||
int wolfSSL_negotiate(WOLFSSL* ssl)
|
||||
{
|
||||
int err = SSL_FATAL_ERROR;
|
||||
@ -1732,7 +1732,7 @@ int wolfSSL_pending(WOLFSSL* ssl)
|
||||
|
||||
|
||||
#ifndef WOLFSSL_LEANPSK
|
||||
/* trun on handshake group messages for context */
|
||||
/* turn on handshake group messages for context */
|
||||
int wolfSSL_CTX_set_group_messages(WOLFSSL_CTX* ctx)
|
||||
{
|
||||
if (ctx == NULL)
|
||||
@ -1764,7 +1764,7 @@ int wolfSSL_connect_cert(WOLFSSL* ssl)
|
||||
|
||||
|
||||
#ifndef WOLFSSL_LEANPSK
|
||||
/* trun on handshake group messages for ssl object */
|
||||
/* turn on handshake group messages for ssl object */
|
||||
int wolfSSL_set_group_messages(WOLFSSL* ssl)
|
||||
{
|
||||
if (ssl == NULL)
|
||||
@ -1776,7 +1776,7 @@ int wolfSSL_set_group_messages(WOLFSSL* ssl)
|
||||
}
|
||||
|
||||
|
||||
/* make minVersion the internal equivilant SSL version */
|
||||
/* make minVersion the internal equivalent SSL version */
|
||||
static int SetMinVersionHelper(byte* minVersion, int version)
|
||||
{
|
||||
switch (version) {
|
||||
|
Loading…
x
Reference in New Issue
Block a user