1. 06 4月, 2013 18 次提交
  2. 05 4月, 2013 1 次提交
    • D
      Make TLS 1.2 ciphers work again. · 1e2d4cb0
      Dr. Stephen Henson 提交于
      Since s->method does not reflect the final client version when a client
      hello is sent for SSLv23_client_method it can't be relied on to indicate
      if TLS 1.2 ciphers should be used. So use the client version instead.
      1e2d4cb0
  3. 04 4月, 2013 7 次提交
  4. 01 4月, 2013 1 次提交
  5. 31 3月, 2013 2 次提交
  6. 30 3月, 2013 2 次提交
  7. 28 3月, 2013 4 次提交
  8. 27 3月, 2013 1 次提交
  9. 26 3月, 2013 4 次提交
    • D
      Provisional DTLS 1.2 support. · c3b344e3
      Dr. Stephen Henson 提交于
      Add correct flags for DTLS 1.2, update s_server and s_client to handle
      DTLS 1.2 methods.
      
      Currently no support for version negotiation: i.e. if client/server selects
      DTLS 1.2 it is that or nothing.
      c3b344e3
    • D
      Remove versions test from dtls1_buffer_message · 9cf0f187
      Dr. Stephen Henson 提交于
      Since this is always called from DTLS code it is safe to assume the header
      length should be the DTLS value. This avoids the need to check the version
      number and should work with any version of DTLS (not just 1.0).
      9cf0f187
    • D
      Extend DTLS method macros. · cfd298b7
      Dr. Stephen Henson 提交于
      Extend DTLS method creation macros to support version numbers and encryption
      methods. Update existing code.
      cfd298b7
    • D
      Enable various DTLS extensions. · 874a18cf
      Dr. Stephen Henson 提交于
      Some TLS extensions were disabled for DTLS. Possibly because they caused
      problems with the old duplicated code. Enable them again.
      874a18cf