1. 18 7月, 2012 1 次提交
  2. 08 7月, 2012 1 次提交
    • D
      Add new ctrl to retrieve client certificate types, print out · 9f27b1ee
      Dr. Stephen Henson 提交于
      details in s_client.
      
      Also add ctrl to set client certificate types. If not used sensible values
      will be included based on supported signature algorithms: for example if
      we don't include any DSA signing algorithms the DSA certificate type is
      omitted.
      
      Fix restriction in old code where certificate types would be truncated
      if it exceeded TLS_CT_NUMBER.
      9f27b1ee
  3. 03 7月, 2012 1 次提交
  4. 29 6月, 2012 1 次提交
    • D
      Add certificate callback. If set this is called whenever a certificate · 18d71588
      Dr. Stephen Henson 提交于
      is required by client or server. An application can decide which
      certificate chain to present based on arbitrary criteria: for example
      supported signature algorithms. Add very simple example to s_server.
      This fixes many of the problems and restrictions of the existing client
      certificate callback: for example you can now clear existing certificates
      and specify the whole chain.
      18d71588
  5. 28 6月, 2012 1 次提交
    • D
      Add new "valid_flags" field to CERT_PKEY structure which determines what · d61ff83b
      Dr. Stephen Henson 提交于
      the certificate can be used for (if anything). Set valid_flags field
      in new tls1_check_chain function. Simplify ssl_set_cert_masks which used
      to have similar checks in it.
      
      Add new "cert_flags" field to CERT structure and include a "strict mode".
      This enforces some TLS certificate requirements (such as only permitting
      certificate signature algorithms contained in the supported algorithms
      extension) which some implementations ignore: this option should be used
      with caution as it could cause interoperability issues.
      d61ff83b
  6. 25 6月, 2012 1 次提交
  7. 22 6月, 2012 1 次提交
  8. 18 6月, 2012 1 次提交
  9. 15 6月, 2012 1 次提交
  10. 13 6月, 2012 1 次提交
  11. 12 6月, 2012 1 次提交
  12. 30 5月, 2012 1 次提交
  13. 11 5月, 2012 3 次提交
  14. 10 5月, 2012 1 次提交
  15. 27 4月, 2012 1 次提交
  16. 26 4月, 2012 4 次提交
  17. 20 4月, 2012 1 次提交
  18. 17 4月, 2012 2 次提交
  19. 05 4月, 2012 1 次提交
  20. 01 4月, 2012 1 次提交
  21. 28 3月, 2012 1 次提交
    • D
      Initial revision of ECC extension handling. · d0595f17
      Dr. Stephen Henson 提交于
      Tidy some code up.
      
      Don't allocate a structure to handle ECC extensions when it is used for
      default values.
      
      Make supported curves configurable.
      
      Add ctrls to retrieve shared curves: not fully integrated with rest of
      ECC code yet.
      d0595f17
  22. 06 3月, 2012 1 次提交
  23. 21 2月, 2012 1 次提交
  24. 16 2月, 2012 1 次提交
  25. 15 2月, 2012 2 次提交
    • D
      Additional compatibility fix for MDC2 signature format. · 58631637
      Dr. Stephen Henson 提交于
      Update RSA EVP_PKEY_METHOD to use the OCTET STRING form of MDC2 signature:
      this will make all versions of MDC2 signature equivalent.
      58631637
    • D
      An incompatibility has always existed between the format used for RSA · 83cb7c46
      Dr. Stephen Henson 提交于
      signatures and MDC2 using EVP or RSA_sign. This has become more apparent
      when the dgst utility in OpenSSL 1.0.0 and later switched to using the
      EVP_DigestSign functions which call RSA_sign.
      
      This means that the signature format OpenSSL 1.0.0 and later used with
      dgst -sign and MDC2 is incompatible with previous versions.
      
      Add detection in RSA_verify so either format works.
      
      Note: MDC2 is disabled by default in OpenSSL and very rarely used in practice.
      83cb7c46
  26. 09 2月, 2012 1 次提交
  27. 31 1月, 2012 1 次提交
  28. 25 1月, 2012 1 次提交
  29. 19 1月, 2012 1 次提交
  30. 17 1月, 2012 2 次提交
    • D
      fix CHANGES entry · ac07bc86
      Dr. Stephen Henson 提交于
      ac07bc86
    • D
      Support for fixed DH ciphersuites. · 8e1dc4d7
      Dr. Stephen Henson 提交于
      The cipher definitions of these ciphersuites have been around since SSLeay
      but were always disabled. Now OpenSSL supports DH certificates they can be
      finally enabled.
      
      Various additional changes were needed to make them work properly: many
      unused fixed DH sections of code were untested.
      8e1dc4d7
  31. 05 1月, 2012 2 次提交