1. 06 Sep, 2013 1 commit
    • Scott Deboy's avatar
      Add callbacks supporting generation and retrieval of supplemental data... · 36086186
      Scott Deboy authored
      Add callbacks supporting generation and retrieval of supplemental data entries, facilitating RFC 5878 (TLS auth extensions)
      Removed prior audit proof logic - audit proof support was implemented using the generic TLS extension API
      Tests exercising the new supplemental data registration and callback api can be found in ssltest.c.
      Implemented changes to s_server and s_client to exercise supplemental data callbacks via the -auth argument, as well as additional flags to exercise supplemental data being sent only during renegotiation.
      36086186
  2. 05 Sep, 2013 1 commit
  3. 17 Jul, 2013 1 commit
    • Dr. Stephen Henson's avatar
      EVP support for wrapping algorithms. · 97cf1f6c
      Dr. Stephen Henson authored
      Add support for key wrap algorithms via EVP interface.
      
      Generalise AES wrap algorithm and add to modes, making existing
      AES wrap algorithm a special case.
      
      Move test code to evptests.txt
      97cf1f6c
  4. 04 Jul, 2013 1 commit
  5. 21 Jun, 2013 1 commit
  6. 12 Jun, 2013 2 commits
  7. 09 Apr, 2013 1 commit
    • Dr. Stephen Henson's avatar
      Dual DTLS version methods. · c6913eeb
      Dr. Stephen Henson authored
      Add new methods DTLS_*_method() which support both DTLS 1.0 and DTLS 1.2 and
      pick the highest version the peer supports during negotiation.
      
      As with SSL/TLS options can change this behaviour specifically
      SSL_OP_NO_DTLSv1 and SSL_OP_NO_DTLSv1_2.
      c6913eeb
  8. 19 Dec, 2012 1 commit
  9. 11 Dec, 2012 1 commit
  10. 07 Dec, 2012 1 commit
  11. 06 Dec, 2012 1 commit
  12. 05 Dec, 2012 1 commit
  13. 04 Dec, 2012 1 commit
  14. 02 Dec, 2012 1 commit
  15. 28 Nov, 2012 1 commit
  16. 27 Nov, 2012 1 commit
  17. 22 Nov, 2012 1 commit
  18. 19 Nov, 2012 1 commit
  19. 18 Nov, 2012 1 commit
    • Dr. Stephen Henson's avatar
      PR: 2909 · d88926f1
      Dr. Stephen Henson authored
      Contributed by: Florian Weimer <fweimer@redhat.com>
      
      Fixes to X509 hostname and email address checking. Wildcard matching support.
      New test program and manual page.
      d88926f1
  20. 16 Nov, 2012 1 commit
  21. 08 Oct, 2012 1 commit
  22. 19 Sep, 2012 1 commit
  23. 14 Sep, 2012 1 commit
  24. 12 Sep, 2012 2 commits
  25. 11 Sep, 2012 2 commits
  26. 29 Aug, 2012 1 commit
  27. 15 Aug, 2012 1 commit
  28. 03 Aug, 2012 1 commit
  29. 27 Jul, 2012 1 commit
  30. 24 Jul, 2012 2 commits
  31. 23 Jul, 2012 1 commit
    • Dr. Stephen Henson's avatar
      Add support for certificate stores in CERT structure. This makes it · 74ecfab4
      Dr. Stephen Henson authored
      possible to have different stores per SSL structure or one store in
      the parent SSL_CTX. Include distint stores for certificate chain
      verification and chain building. New ctrl SSL_CTRL_BUILD_CERT_CHAIN
      to build and store a certificate chain in CERT structure: returing
      an error if the chain cannot be built: this will allow applications
      to test if a chain is correctly configured.
      
      Note: if the CERT based stores are not set then the parent SSL_CTX
      store is used to retain compatibility with existing behaviour.
      74ecfab4
  32. 18 Jul, 2012 1 commit
  33. 08 Jul, 2012 1 commit
    • Dr. Stephen Henson's avatar
      Add new ctrl to retrieve client certificate types, print out · 9f27b1ee
      Dr. Stephen Henson authored
      details in s_client.
      
      Also add ctrl to set client certificate types. If not used sensible values
      will be included based on supported signature algorithms: for example if
      we don't include any DSA signing algorithms the DSA certificate type is
      omitted.
      
      Fix restriction in old code where certificate types would be truncated
      if it exceeded TLS_CT_NUMBER.
      9f27b1ee
  34. 03 Jul, 2012 1 commit
  35. 29 Jun, 2012 1 commit
    • Dr. Stephen Henson's avatar
      Add certificate callback. If set this is called whenever a certificate · 18d71588
      Dr. Stephen Henson authored
      is required by client or server. An application can decide which
      certificate chain to present based on arbitrary criteria: for example
      supported signature algorithms. Add very simple example to s_server.
      This fixes many of the problems and restrictions of the existing client
      certificate callback: for example you can now clear existing certificates
      and specify the whole chain.
      18d71588
  36. 28 Jun, 2012 1 commit
    • Dr. Stephen Henson's avatar
      Add new "valid_flags" field to CERT_PKEY structure which determines what · d61ff83b
      Dr. Stephen Henson authored
      the certificate can be used for (if anything). Set valid_flags field
      in new tls1_check_chain function. Simplify ssl_set_cert_masks which used
      to have similar checks in it.
      
      Add new "cert_flags" field to CERT structure and include a "strict mode".
      This enforces some TLS certificate requirements (such as only permitting
      certificate signature algorithms contained in the supported algorithms
      extension) which some implementations ignore: this option should be used
      with caution as it could cause interoperability issues.
      d61ff83b