1. 21 2月, 2014 1 次提交
  2. 20 2月, 2014 1 次提交
  3. 19 2月, 2014 1 次提交
  4. 15 2月, 2014 2 次提交
    • K
      Use defaults bits in req when not given · 33432203
      Kurt Roeckx 提交于
      If you use "-newkey rsa" it's supposed to read the default number of bits from the
      config file.  However the value isn't used to generate the key, but it does
      print it's generating such a key.  The set_keygen_ctx() doesn't call
      EVP_PKEY_CTX_set_rsa_keygen_bits() and you end up with the default set in
      pkey_rsa_init() (1024).  Afterwards the number of bits gets read from the config
      file, but nothing is done with that anymore.
      
      We now read the config first and use the value from the config file when no size
      is given.
      
      PR: 2592
      33432203
    • S
      Fix various spelling errors · 2b4ffc65
      Scott Schaefer 提交于
      2b4ffc65
  5. 13 2月, 2014 1 次提交
  6. 06 2月, 2014 3 次提交
  7. 27 1月, 2014 1 次提交
  8. 14 11月, 2013 1 次提交
  9. 21 10月, 2013 1 次提交
    • D
      Extend SSL_CONF · ec2f7e56
      Dr. Stephen Henson 提交于
      Extend SSL_CONF to return command value types.
      
      Add certificate and key options.
      
      Update documentation.
      ec2f7e56
  10. 07 10月, 2013 1 次提交
  11. 25 9月, 2013 2 次提交
  12. 13 9月, 2013 1 次提交
    • M
      typo · 5628ec66
      Mat 提交于
      5628ec66
  13. 12 9月, 2013 1 次提交
  14. 08 9月, 2013 1 次提交
    • D
      Experimental encrypt-then-mac support. · 5e3ff62c
      Dr. Stephen Henson 提交于
      Experimental support for encrypt then mac from
      draft-gutmann-tls-encrypt-then-mac-02.txt
      
      To enable it set the appropriate extension number (0x10 for the test server)
      using e.g. -DTLSEXT_TYPE_encrypt_then_mac=0x10
      
      For non-compliant peers (i.e. just about everything) this should have no
      effect.
      5e3ff62c
  15. 06 9月, 2013 10 次提交
  16. 19 8月, 2013 1 次提交
  17. 18 8月, 2013 1 次提交
  18. 22 7月, 2013 2 次提交
  19. 18 7月, 2013 1 次提交
  20. 22 6月, 2013 1 次提交
  21. 13 6月, 2013 1 次提交
  22. 09 4月, 2013 1 次提交
    • D
      Dual DTLS version methods. · c6913eeb
      Dr. Stephen Henson 提交于
      Add new methods DTLS_*_method() which support both DTLS 1.0 and DTLS 1.2 and
      pick the highest version the peer supports during negotiation.
      
      As with SSL/TLS options can change this behaviour specifically
      SSL_OP_NO_DTLSv1 and SSL_OP_NO_DTLSv1_2.
      c6913eeb
  23. 28 3月, 2013 1 次提交
  24. 26 3月, 2013 1 次提交
    • D
      Provisional DTLS 1.2 support. · c3b344e3
      Dr. Stephen Henson 提交于
      Add correct flags for DTLS 1.2, update s_server and s_client to handle
      DTLS 1.2 methods.
      
      Currently no support for version negotiation: i.e. if client/server selects
      DTLS 1.2 it is that or nothing.
      c3b344e3
  25. 20 1月, 2013 1 次提交
  26. 18 1月, 2013 1 次提交