1. 04 7月, 2014 1 次提交
  2. 03 7月, 2014 1 次提交
  3. 02 7月, 2014 2 次提交
  4. 20 6月, 2014 6 次提交
  5. 18 6月, 2014 1 次提交
  6. 11 6月, 2014 1 次提交
    • H
      add ECC strings to ciphers(1), point out difference between DH and ECDH · 343e5cf1
      Hubert Kario 提交于
       * Make a clear distinction between DH and ECDH key exchange.
       * Group all key exchange cipher suite identifiers, first DH then ECDH
       * add descriptions for all supported *DH* identifiers
       * add ECDSA authentication descriptions
       * add example showing how to disable all suites that offer no
         authentication or encryption
      343e5cf1
  7. 31 5月, 2014 2 次提交
  8. 27 5月, 2014 2 次提交
  9. 24 5月, 2014 1 次提交
  10. 22 5月, 2014 1 次提交
  11. 21 5月, 2014 1 次提交
  12. 16 5月, 2014 1 次提交
  13. 15 5月, 2014 2 次提交
  14. 13 5月, 2014 1 次提交
  15. 10 5月, 2014 1 次提交
  16. 26 4月, 2014 1 次提交
  17. 16 4月, 2014 1 次提交
  18. 07 4月, 2014 1 次提交
  19. 03 4月, 2014 1 次提交
  20. 29 3月, 2014 1 次提交
  21. 02 3月, 2014 1 次提交
    • D
      PKCS#8 support for alternative PRFs. · 5693a308
      Dr. Stephen Henson 提交于
      Add option to set an alternative to the default hmacWithSHA1 PRF
      for PKCS#8 private key encryptions. This is used automatically
      by PKCS8_encrypt if the nid specified is a PRF.
      
      Add option to pkcs8 utility.
      
      Update docs.
      (cherry picked from commit b60272b01fcb4f69201b3e1659b4f7e9e9298dfb)
      5693a308
  22. 15 2月, 2014 2 次提交
    • S
      Fix various spelling errors · 2b4ffc65
      Scott Schaefer 提交于
      2b4ffc65
    • S
      Document pkcs12 -password behavior · 856c6dfb
      Scott Schaefer 提交于
      apps/pkcs12.c accepts -password as an argument.  The document author
      almost certainly meant to write "-password, -passin".
      
      However, that is not correct, either.  Actually the code treats
      -password as equivalent to -passin, EXCEPT when -export is also
      specified, in which case -password as equivalent to -passout.
      856c6dfb
  23. 13 2月, 2014 1 次提交
  24. 09 1月, 2014 2 次提交
    • D
      update remaining documentation to move from EDH to DHE · 0ecfd920
      Daniel Kahn Gillmor 提交于
      change documentation and comments to indicate that we prefer the
      standard "DHE" naming scheme everywhere over the older "EDH"
      0ecfd920
    • D
      use SSL_kDHE throughout instead of SSL_kEDH · 5a21cadb
      Daniel Kahn Gillmor 提交于
      DHE is the standard term used by the RFCs and by other TLS
      implementations.  It's useful to have the internal variables use the
      standard terminology.
      
      This patch leaves a synonym SSL_kEDH in place, though, so that older
      code can still be built against it, since that has been the
      traditional API.  SSL_kEDH should probably be deprecated at some
      point, though.
      5a21cadb
  25. 09 11月, 2013 1 次提交
  26. 22 10月, 2013 1 次提交
    • L
      POD: Fix item numbering · c8919dde
      Lubomir Rintel 提交于
      Newer pod2man considers =item [1-9] part of a numbered list, while =item
      0 starts an unnumbered list. Add a zero effect formatting mark to override
      this.
      
      doc/apps/smime.pod around line 315: Expected text after =item, not a
      number
      ...
      
      PR#3146
      c8919dde
  27. 06 9月, 2013 3 次提交
    • S
      Add callbacks supporting generation and retrieval of supplemental data... · 36086186
      Scott Deboy 提交于
      Add callbacks supporting generation and retrieval of supplemental data entries, facilitating RFC 5878 (TLS auth extensions)
      Removed prior audit proof logic - audit proof support was implemented using the generic TLS extension API
      Tests exercising the new supplemental data registration and callback api can be found in ssltest.c.
      Implemented changes to s_server and s_client to exercise supplemental data callbacks via the -auth argument, as well as additional flags to exercise supplemental data being sent only during renegotiation.
      36086186
    • V
      478b50cf
    • C
      Add an "-xmpphost" option to s_client · b98af49d
      Carlos Alberto Lopez Perez 提交于
       * Many XMPP servers are configured with multiple domains (virtual hosts)
       * In order to establish successfully the TLS connection you have to specify
         which virtual host you are trying to connect.
       * Test this, for example with ::
         * Fail:
             openssl s_client -connect talk.google.com:5222 -starttls xmpp
         * Works:
             openssl s_client -connect talk.google.com:5222 -starttls xmpp -xmpphost gmail.com
      b98af49d