1. 19 11月, 2013 1 次提交
  2. 14 11月, 2013 1 次提交
  3. 06 9月, 2013 2 次提交
    • B
      More cleanup. · 5eda213e
      Ben Laurie 提交于
      5eda213e
    • S
      Add callbacks supporting generation and retrieval of supplemental data... · 36086186
      Scott Deboy 提交于
      Add callbacks supporting generation and retrieval of supplemental data entries, facilitating RFC 5878 (TLS auth extensions)
      Removed prior audit proof logic - audit proof support was implemented using the generic TLS extension API
      Tests exercising the new supplemental data registration and callback api can be found in ssltest.c.
      Implemented changes to s_server and s_client to exercise supplemental data callbacks via the -auth argument, as well as additional flags to exercise supplemental data being sent only during renegotiation.
      36086186
  4. 18 8月, 2013 1 次提交
  5. 22 7月, 2013 1 次提交
  6. 28 6月, 2013 1 次提交
  7. 13 6月, 2013 1 次提交
  8. 19 3月, 2013 1 次提交
  9. 18 3月, 2013 1 次提交
  10. 19 11月, 2012 1 次提交
  11. 08 11月, 2012 1 次提交
  12. 30 9月, 2012 1 次提交
  13. 12 9月, 2012 1 次提交
  14. 11 9月, 2012 2 次提交
  15. 31 8月, 2012 1 次提交
  16. 29 8月, 2012 1 次提交
  17. 15 8月, 2012 1 次提交
  18. 27 7月, 2012 1 次提交
  19. 18 7月, 2012 1 次提交
  20. 03 7月, 2012 1 次提交
  21. 29 6月, 2012 1 次提交
    • D
      Add certificate callback. If set this is called whenever a certificate · 18d71588
      Dr. Stephen Henson 提交于
      is required by client or server. An application can decide which
      certificate chain to present based on arbitrary criteria: for example
      supported signature algorithms. Add very simple example to s_server.
      This fixes many of the problems and restrictions of the existing client
      certificate callback: for example you can now clear existing certificates
      and specify the whole chain.
      18d71588
  22. 28 6月, 2012 1 次提交
    • D
      Add new "valid_flags" field to CERT_PKEY structure which determines what · d61ff83b
      Dr. Stephen Henson 提交于
      the certificate can be used for (if anything). Set valid_flags field
      in new tls1_check_chain function. Simplify ssl_set_cert_masks which used
      to have similar checks in it.
      
      Add new "cert_flags" field to CERT structure and include a "strict mode".
      This enforces some TLS certificate requirements (such as only permitting
      certificate signature algorithms contained in the supported algorithms
      extension) which some implementations ignore: this option should be used
      with caution as it could cause interoperability issues.
      d61ff83b
  23. 18 6月, 2012 1 次提交
  24. 04 6月, 2012 1 次提交
  25. 30 5月, 2012 1 次提交
  26. 24 4月, 2012 2 次提交
  27. 05 4月, 2012 1 次提交
  28. 28 3月, 2012 1 次提交
    • D
      Initial revision of ECC extension handling. · d0595f17
      Dr. Stephen Henson 提交于
      Tidy some code up.
      
      Don't allocate a structure to handle ECC extensions when it is used for
      default values.
      
      Make supported curves configurable.
      
      Add ctrls to retrieve shared curves: not fully integrated with rest of
      ECC code yet.
      d0595f17
  29. 22 2月, 2012 2 次提交
  30. 27 1月, 2012 1 次提交
  31. 17 1月, 2012 1 次提交
    • D
      Support for fixed DH ciphersuites. · 8e1dc4d7
      Dr. Stephen Henson 提交于
      The cipher definitions of these ciphersuites have been around since SSLeay
      but were always disabled. Now OpenSSL supports DH certificates they can be
      finally enabled.
      
      Various additional changes were needed to make them work properly: many
      unused fixed DH sections of code were untested.
      8e1dc4d7
  32. 05 1月, 2012 1 次提交
  33. 16 11月, 2011 2 次提交
  34. 10 10月, 2011 1 次提交
  35. 07 10月, 2011 1 次提交