1. 03 2月, 2015 2 次提交
  2. 29 1月, 2015 1 次提交
  3. 22 1月, 2015 3 次提交
  4. 31 12月, 2014 1 次提交
  5. 15 10月, 2014 1 次提交
  6. 08 9月, 2014 1 次提交
  7. 16 8月, 2014 1 次提交
  8. 04 7月, 2014 1 次提交
  9. 28 6月, 2014 1 次提交
  10. 07 6月, 2014 1 次提交
  11. 06 4月, 2014 1 次提交
  12. 28 3月, 2014 1 次提交
    • D
      Security framework. · b362ccab
      Dr. Stephen Henson 提交于
      Security callback: selects which parameters are permitted including
      sensible defaults based on bits of security.
      
      The "parameters" which can be selected include: ciphersuites,
      curves, key sizes, certificate signature algorithms, supported
      signature algorithms, DH parameters, SSL/TLS version, session tickets
      and compression.
      
      In some cases prohibiting the use of a parameters will mean they are
      not advertised to the peer: for example cipher suites and ECC curves.
      In other cases it will abort the handshake: e.g DH parameters or the
      peer key size.
      
      Documentation to follow...
      b362ccab
  13. 06 2月, 2014 1 次提交
  14. 09 1月, 2014 1 次提交
  15. 06 9月, 2013 1 次提交
    • S
      Add callbacks supporting generation and retrieval of supplemental data... · 36086186
      Scott Deboy 提交于
      Add callbacks supporting generation and retrieval of supplemental data entries, facilitating RFC 5878 (TLS auth extensions)
      Removed prior audit proof logic - audit proof support was implemented using the generic TLS extension API
      Tests exercising the new supplemental data registration and callback api can be found in ssltest.c.
      Implemented changes to s_server and s_client to exercise supplemental data callbacks via the -auth argument, as well as additional flags to exercise supplemental data being sent only during renegotiation.
      36086186
  16. 22 7月, 2013 1 次提交
  17. 15 8月, 2012 1 次提交
  18. 29 6月, 2012 1 次提交
    • D
      Add certificate callback. If set this is called whenever a certificate · 18d71588
      Dr. Stephen Henson 提交于
      is required by client or server. An application can decide which
      certificate chain to present based on arbitrary criteria: for example
      supported signature algorithms. Add very simple example to s_server.
      This fixes many of the problems and restrictions of the existing client
      certificate callback: for example you can now clear existing certificates
      and specify the whole chain.
      18d71588
  19. 25 6月, 2012 1 次提交
  20. 22 6月, 2012 1 次提交
  21. 30 5月, 2012 1 次提交
  22. 10 3月, 2012 1 次提交
  23. 06 3月, 2012 1 次提交
  24. 22 2月, 2012 1 次提交
  25. 01 1月, 2012 1 次提交
    • D
      PR: 2658 · 4817504d
      Dr. Stephen Henson 提交于
      Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>
      Reviewed by: steve
      
      Support for TLS/DTLS heartbeats.
      4817504d
  26. 25 11月, 2011 1 次提交
    • D
      PR: 1794 · ebba6c48
      Dr. Stephen Henson 提交于
      Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
      Reviewed by: steve
      
      Make SRP conformant to rfc 5054.
      
      Changes are:
      
      - removal of the addition state after client hello
      - removal of all pre-rfc srp alert ids
      - sending a fatal alert when there is no srp extension but when the
      server wants SRP
      - removal of unnecessary code in the client.
      ebba6c48
  27. 16 11月, 2011 2 次提交
  28. 07 10月, 2011 1 次提交
  29. 03 8月, 2011 1 次提交
  30. 26 7月, 2011 1 次提交
  31. 25 5月, 2011 1 次提交
  32. 06 5月, 2011 1 次提交
  33. 30 4月, 2011 1 次提交
  34. 13 3月, 2011 1 次提交
  35. 06 9月, 2010 1 次提交
  36. 28 7月, 2010 1 次提交