1. 08 7月, 2012 1 次提交
    • D
      Add new ctrl to retrieve client certificate types, print out · 9f27b1ee
      Dr. Stephen Henson 提交于
      details in s_client.
      
      Also add ctrl to set client certificate types. If not used sensible values
      will be included based on supported signature algorithms: for example if
      we don't include any DSA signing algorithms the DSA certificate type is
      omitted.
      
      Fix restriction in old code where certificate types would be truncated
      if it exceeded TLS_CT_NUMBER.
      9f27b1ee
  2. 03 7月, 2012 2 次提交
  3. 29 6月, 2012 1 次提交
    • D
      Add certificate callback. If set this is called whenever a certificate · 18d71588
      Dr. Stephen Henson 提交于
      is required by client or server. An application can decide which
      certificate chain to present based on arbitrary criteria: for example
      supported signature algorithms. Add very simple example to s_server.
      This fixes many of the problems and restrictions of the existing client
      certificate callback: for example you can now clear existing certificates
      and specify the whole chain.
      18d71588
  4. 28 6月, 2012 1 次提交
    • D
      Add new "valid_flags" field to CERT_PKEY structure which determines what · d61ff83b
      Dr. Stephen Henson 提交于
      the certificate can be used for (if anything). Set valid_flags field
      in new tls1_check_chain function. Simplify ssl_set_cert_masks which used
      to have similar checks in it.
      
      Add new "cert_flags" field to CERT structure and include a "strict mode".
      This enforces some TLS certificate requirements (such as only permitting
      certificate signature algorithms contained in the supported algorithms
      extension) which some implementations ignore: this option should be used
      with caution as it could cause interoperability issues.
      d61ff83b
  5. 25 6月, 2012 1 次提交
  6. 22 6月, 2012 1 次提交
  7. 18 6月, 2012 2 次提交
  8. 15 6月, 2012 1 次提交
  9. 07 6月, 2012 1 次提交
  10. 04 6月, 2012 1 次提交
  11. 30 5月, 2012 1 次提交
  12. 26 4月, 2012 1 次提交
  13. 24 4月, 2012 3 次提交
  14. 18 4月, 2012 1 次提交
  15. 05 4月, 2012 1 次提交
  16. 28 3月, 2012 1 次提交
    • D
      Initial revision of ECC extension handling. · d0595f17
      Dr. Stephen Henson 提交于
      Tidy some code up.
      
      Don't allocate a structure to handle ECC extensions when it is used for
      default values.
      
      Make supported curves configurable.
      
      Add ctrls to retrieve shared curves: not fully integrated with rest of
      ECC code yet.
      d0595f17
  17. 14 3月, 2012 2 次提交
  18. 06 3月, 2012 1 次提交
  19. 24 2月, 2012 1 次提交
  20. 22 2月, 2012 1 次提交
  21. 10 2月, 2012 1 次提交
  22. 31 1月, 2012 1 次提交
  23. 26 1月, 2012 1 次提交
    • D
      Tidy/enhance certificate chain output code. · 4379d0e4
      Dr. Stephen Henson 提交于
      New function ssl_add_cert_chain which adds a certificate chain to
      SSL internal BUF_MEM. Use this function in ssl3_output_cert_chain
      and dtls1_output_cert_chain instead of partly duplicating code.
      4379d0e4
  24. 17 1月, 2012 1 次提交
    • D
      Support for fixed DH ciphersuites. · 8e1dc4d7
      Dr. Stephen Henson 提交于
      The cipher definitions of these ciphersuites have been around since SSLeay
      but were always disabled. Now OpenSSL supports DH certificates they can be
      finally enabled.
      
      Various additional changes were needed to make them work properly: many
      unused fixed DH sections of code were untested.
      8e1dc4d7
  25. 05 1月, 2012 1 次提交
  26. 04 1月, 2012 2 次提交
  27. 01 1月, 2012 1 次提交
    • D
      PR: 2658 · 4817504d
      Dr. Stephen Henson 提交于
      Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>
      Reviewed by: steve
      
      Support for TLS/DTLS heartbeats.
      4817504d
  28. 23 12月, 2011 3 次提交
  29. 22 12月, 2011 1 次提交
  30. 15 12月, 2011 1 次提交
    • D
      PR: 1794 · f2fc3075
      Dr. Stephen Henson 提交于
      Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
      Reviewed by: steve
      
      Remove unnecessary code for srp and to add some comments to
      s_client.
      
      - the callback to provide a user during client connect is
      no longer necessary since rfc 5054 a connection attempt
      with an srp cipher and no user is terminated when the
      cipher is acceptable
      
      - comments to indicate in s_client the (non-)usefulness of
      th primalaty tests for non known group parameters.
      f2fc3075
  31. 13 12月, 2011 1 次提交
  32. 25 11月, 2011 1 次提交
    • D
      PR: 1794 · ebba6c48
      Dr. Stephen Henson 提交于
      Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
      Reviewed by: steve
      
      Make SRP conformant to rfc 5054.
      
      Changes are:
      
      - removal of the addition state after client hello
      - removal of all pre-rfc srp alert ids
      - sending a fatal alert when there is no srp extension but when the
      server wants SRP
      - removal of unnecessary code in the client.
      ebba6c48