1. 24 3月, 2015 1 次提交
  2. 23 3月, 2015 1 次提交
  3. 20 3月, 2015 1 次提交
  4. 15 3月, 2015 1 次提交
  5. 11 3月, 2015 1 次提交
  6. 07 2月, 2015 1 次提交
  7. 06 2月, 2015 3 次提交
  8. 03 2月, 2015 3 次提交
  9. 29 1月, 2015 1 次提交
  10. 28 1月, 2015 1 次提交
  11. 22 1月, 2015 3 次提交
  12. 13 1月, 2015 1 次提交
  13. 07 1月, 2015 1 次提交
  14. 06 1月, 2015 2 次提交
  15. 05 1月, 2015 1 次提交
  16. 17 12月, 2014 1 次提交
  17. 16 12月, 2014 1 次提交
  18. 09 12月, 2014 1 次提交
  19. 08 12月, 2014 1 次提交
  20. 04 12月, 2014 1 次提交
  21. 03 12月, 2014 1 次提交
  22. 24 10月, 2014 1 次提交
  23. 22 10月, 2014 1 次提交
  24. 15 10月, 2014 1 次提交
  25. 29 8月, 2014 1 次提交
  26. 15 8月, 2014 1 次提交
  27. 04 7月, 2014 1 次提交
  28. 13 5月, 2014 1 次提交
  29. 12 5月, 2014 1 次提交
  30. 28 3月, 2014 3 次提交
    • D
      Security framework. · b362ccab
      Dr. Stephen Henson 提交于
      Security callback: selects which parameters are permitted including
      sensible defaults based on bits of security.
      
      The "parameters" which can be selected include: ciphersuites,
      curves, key sizes, certificate signature algorithms, supported
      signature algorithms, DH parameters, SSL/TLS version, session tickets
      and compression.
      
      In some cases prohibiting the use of a parameters will mean they are
      not advertised to the peer: for example cipher suites and ECC curves.
      In other cases it will abort the handshake: e.g DH parameters or the
      peer key size.
      
      Documentation to follow...
      b362ccab
    • D
      Allow return of supported ciphers. · 8b8e5bed
      Dr. Stephen Henson 提交于
      New function ssl_cipher_disabled.
      
      Check for disabled client ciphers using ssl_cipher_disabled.
      
      New function to return only supported ciphers.
      
      New option to ciphers utility to print only supported ciphers.
      8b8e5bed
    • D
      Auto DH support. · 09599b52
      Dr. Stephen Henson 提交于
      Add auto DH parameter support. This is roughly equivalent to the
      ECDH auto curve selection but for DH. An application can just call
      
      SSL_CTX_set_auto_dh(ctx, 1);
      
      and appropriate DH parameters will be used based on the size of the
      server key.
      
      Unlike ECDH there is no way a peer can indicate the range of DH parameters
      it supports. Some peers cannot handle DH keys larger that 1024 bits for
      example. In this case if you call:
      
      SSL_CTX_set_auto_dh(ctx, 2);
      
      Only 1024 bit DH parameters will be used.
      
      If the server key is 7680 bits or more in size then 8192 bit DH parameters
      will be used: these will be *very* slow.
      
      The old export ciphersuites aren't supported but those are very
      insecure anyway.
      09599b52
  31. 22 2月, 2014 1 次提交