1. 07 11月, 2013 1 次提交
    • D
      Experimental workaround TLS filler (WTF) extension. · 0467ea68
      Dr. Stephen Henson 提交于
      Based on a suggested workaround for the "TLS hang bug" (see FAQ and PR#2771):
      if the TLS Client Hello record length value would otherwise be > 255 and less
      that 512 pad with a dummy extension containing zeroes so it is at least 512.
      
      To enable it use an unused extension number (for example 0x4242) using
      e.g. -DTLSEXT_TYPE_wtf=0x4242
      
      WARNING: EXPERIMENTAL, SUBJECT TO CHANGE.
      0467ea68
  2. 22 10月, 2013 1 次提交
  3. 18 9月, 2013 1 次提交
  4. 17 9月, 2013 2 次提交
  5. 16 9月, 2013 1 次提交
  6. 14 9月, 2013 1 次提交
  7. 08 9月, 2013 2 次提交
  8. 06 9月, 2013 2 次提交
    • S
      Add callbacks supporting generation and retrieval of supplemental data... · 36086186
      Scott Deboy 提交于
      Add callbacks supporting generation and retrieval of supplemental data entries, facilitating RFC 5878 (TLS auth extensions)
      Removed prior audit proof logic - audit proof support was implemented using the generic TLS extension API
      Tests exercising the new supplemental data registration and callback api can be found in ssltest.c.
      Implemented changes to s_server and s_client to exercise supplemental data callbacks via the -auth argument, as well as additional flags to exercise supplemental data being sent only during renegotiation.
      36086186
    • V
      478b50cf
  9. 18 7月, 2013 1 次提交
    • D
      EVP support for wrapping algorithms. · 97cf1f6c
      Dr. Stephen Henson 提交于
      Add support for key wrap algorithms via EVP interface.
      
      Generalise AES wrap algorithm and add to modes, making existing
      AES wrap algorithm a special case.
      
      Move test code to evptests.txt
      97cf1f6c
  10. 05 7月, 2013 1 次提交
  11. 22 6月, 2013 1 次提交
  12. 13 6月, 2013 2 次提交
  13. 09 4月, 2013 1 次提交
    • D
      Dual DTLS version methods. · c6913eeb
      Dr. Stephen Henson 提交于
      Add new methods DTLS_*_method() which support both DTLS 1.0 and DTLS 1.2 and
      pick the highest version the peer supports during negotiation.
      
      As with SSL/TLS options can change this behaviour specifically
      SSL_OP_NO_DTLSv1 and SSL_OP_NO_DTLSv1_2.
      c6913eeb
  14. 19 12月, 2012 1 次提交
  15. 12 12月, 2012 1 次提交
  16. 08 12月, 2012 1 次提交
  17. 07 12月, 2012 1 次提交
  18. 06 12月, 2012 1 次提交
  19. 05 12月, 2012 1 次提交
  20. 03 12月, 2012 1 次提交
  21. 29 11月, 2012 1 次提交
  22. 28 11月, 2012 1 次提交
  23. 22 11月, 2012 1 次提交
  24. 19 11月, 2012 1 次提交
  25. 18 11月, 2012 1 次提交
    • D
      PR: 2909 · d88926f1
      Dr. Stephen Henson 提交于
      Contributed by: Florian Weimer <fweimer@redhat.com>
      
      Fixes to X509 hostname and email address checking. Wildcard matching support.
      New test program and manual page.
      d88926f1
  26. 17 11月, 2012 1 次提交
  27. 08 10月, 2012 1 次提交
  28. 20 9月, 2012 1 次提交
  29. 14 9月, 2012 1 次提交
  30. 13 9月, 2012 1 次提交
  31. 12 9月, 2012 1 次提交
  32. 11 9月, 2012 2 次提交
  33. 29 8月, 2012 1 次提交
  34. 15 8月, 2012 1 次提交
  35. 03 8月, 2012 1 次提交