1. 26 3月, 2015 2 次提交
  2. 25 3月, 2015 1 次提交
  3. 23 3月, 2015 1 次提交
  4. 06 2月, 2015 1 次提交
  5. 22 1月, 2015 1 次提交
  6. 08 12月, 2014 1 次提交
  7. 04 12月, 2014 1 次提交
  8. 15 10月, 2014 2 次提交
  9. 29 8月, 2014 1 次提交
  10. 15 8月, 2014 1 次提交
  11. 04 7月, 2014 1 次提交
  12. 01 7月, 2014 1 次提交
  13. 28 3月, 2014 1 次提交
    • D
      Security framework. · b362ccab
      Dr. Stephen Henson 提交于
      Security callback: selects which parameters are permitted including
      sensible defaults based on bits of security.
      
      The "parameters" which can be selected include: ciphersuites,
      curves, key sizes, certificate signature algorithms, supported
      signature algorithms, DH parameters, SSL/TLS version, session tickets
      and compression.
      
      In some cases prohibiting the use of a parameters will mean they are
      not advertised to the peer: for example cipher suites and ECC curves.
      In other cases it will abort the handshake: e.g DH parameters or the
      peer key size.
      
      Documentation to follow...
      b362ccab
  14. 06 2月, 2014 2 次提交
  15. 21 10月, 2013 2 次提交
    • B
      Remove unused variable. · 9f944107
      Ben Laurie 提交于
      9f944107
    • N
      Do not include a timestamp in the Client/ServerHello Random field. · 2016265d
      Nick Mathewson 提交于
      Instead, send random bytes, unless SSL_SEND_{CLIENT,SERVER}RANDOM_MODE
      is set.
      
      This is a forward-port of commits:
        4af793036f6ef4f0a1078e5d7155426a98d50e37
        f4c93b46edb51da71f09eda99e83eaf193a33c08
        3da721dac9382c48812c8eba455528fd59af2eef
        2583270191a8b27eed303c03ece1da97b9b69fd3
      
      While the gmt_unix_time record was added in an ostensible attempt to
      mitigate the dangers of a bad RNG, its presence leaks the host's view
      of the current time in the clear.  This minor leak can help
      fingerprint TLS instances across networks and protocols... and what's
      worse, it's doubtful thet the gmt_unix_time record does any good at
      all for its intended purpose, since:
      
          * It's quite possible to open two TLS connections in one second.
      
          * If the PRNG output is prone to repeat itself, ephemeral
            handshakes (and who knows what else besides) are broken.
      2016265d
  16. 06 9月, 2013 1 次提交
    • S
      Add callbacks supporting generation and retrieval of supplemental data... · 36086186
      Scott Deboy 提交于
      Add callbacks supporting generation and retrieval of supplemental data entries, facilitating RFC 5878 (TLS auth extensions)
      Removed prior audit proof logic - audit proof support was implemented using the generic TLS extension API
      Tests exercising the new supplemental data registration and callback api can be found in ssltest.c.
      Implemented changes to s_server and s_client to exercise supplemental data callbacks via the -auth argument, as well as additional flags to exercise supplemental data being sent only during renegotiation.
      36086186
  17. 31 7月, 2013 1 次提交
  18. 08 12月, 2012 1 次提交
  19. 15 8月, 2012 1 次提交
  20. 30 5月, 2012 1 次提交
  21. 26 4月, 2012 1 次提交
  22. 17 4月, 2012 2 次提交
    • D
      Additional workaround for PR#2771 · 800e1cd9
      Dr. Stephen Henson 提交于
      If OPENSSL_MAX_TLS1_2_CIPHER_LENGTH is set then limit the size of client
      ciphersuites to this value. A value of 50 should be sufficient.
      
      Document workarounds in CHANGES.
      800e1cd9
    • D
      Partial workaround for PR#2771. · 293706e7
      Dr. Stephen Henson 提交于
      Some servers hang when presented with a client hello record length exceeding
      255 bytes but will work with longer client hellos if the TLS record version
      in client hello does not exceed TLS v1.0. Unfortunately this doesn't fix all
      cases...
      293706e7
  23. 20 5月, 2011 1 次提交
  24. 30 4月, 2011 1 次提交
  25. 13 3月, 2011 1 次提交
  26. 16 2月, 2010 1 次提交
    • D
      PR: 2171 · 8d934c25
      Dr. Stephen Henson 提交于
      Submitted by: Tomas Mraz <tmraz@redhat.com>
      
      Since SSLv2 doesn't support renegotiation at all don't reject it if
      legacy renegotiation isn't enabled.
      
      Also can now use SSL2 compatible client hello because RFC5746 supports it.
      8d934c25
  27. 28 12月, 2009 1 次提交
  28. 07 12月, 2009 1 次提交
  29. 18 11月, 2009 1 次提交
  30. 05 8月, 2009 1 次提交
  31. 09 4月, 2009 1 次提交
  32. 30 12月, 2008 1 次提交
  33. 03 9月, 2008 1 次提交
  34. 03 6月, 2008 1 次提交
  35. 27 9月, 2007 1 次提交