- Dec 26, 2012
-
-
Dr. Stephen Henson authored
that are disabled for this session (as opposed to always disabled by configuration). (backport from HEAD)
-
Dr. Stephen Henson authored
details in s_client. Also add ctrl to set client certificate types. If not used sensible values will be included based on supported signature algorithms: for example if we don't include any DSA signing algorithms the DSA certificate type is omitted. Fix restriction in old code where certificate types would be truncated if it exceeded TLS_CT_NUMBER. (backport from HEAD)
-
Dr. Stephen Henson authored
(backport from HEAD)
-
Dr. Stephen Henson authored
(backport from HEAD)
-
Dr. Stephen Henson authored
(backport from HEAD)
-
Dr. Stephen Henson authored
(backport from HEAD)
-
Dr. Stephen Henson authored
the permitted signature algorithms for server and client authentication are the same but it is now possible to set different algorithms for client authentication only. (backport from HEAD)
-
Dr. Stephen Henson authored
is required by client or server. An application can decide which certificate chain to present based on arbitrary criteria: for example supported signature algorithms. Add very simple example to s_server. This fixes many of the problems and restrictions of the existing client certificate callback: for example you can now clear existing certificates and specify the whole chain. (backport from HEAD)
-
Dr. Stephen Henson authored
(backport from HEAD)
-
Dr. Stephen Henson authored
appropriate checks in tls1_check_chain. (backport from HEAD)
-
Dr. Stephen Henson authored
the certificate can be used for (if anything). Set valid_flags field in new tls1_check_chain function. Simplify ssl_set_cert_masks which used to have similar checks in it. Add new "cert_flags" field to CERT structure and include a "strict mode". This enforces some TLS certificate requirements (such as only permitting certificate signature algorithms contained in the supported algorithms extension) which some implementations ignore: this option should be used with caution as it could cause interoperability issues. (backport from HEAD)
-
Dr. Stephen Henson authored
Only store encoded versions of peer and configured signature algorithms. Determine shared signature algorithms and cache the result along with NID equivalents of each algorithm. (backport from HEAD)
-
Dr. Stephen Henson authored
TLS v1.2. These are sent as an extension for clients and during a certificate request for servers. TODO: add support for shared signature algorithms, respect shared algorithms when deciding which ciphersuites and certificates to permit. (backport from HEAD)
-
Dr. Stephen Henson authored
(backport from HEAD)
-
Dr. Stephen Henson authored
Make partial chain chekcing work with EE certificates only. Remove unneeded -trust_other option from tocsp. (Backport from HEAD)
-
- Dec 23, 2012
-
-
Dr. Stephen Henson authored
-
- Dec 21, 2012
-
-
Dr. Stephen Henson authored
-
- Dec 20, 2012
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Support - as a file for standard input or output. Add -badsig option to generate invalid signatures for testing. New -rmd option to specify digest to sign OCSP responses with.
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Dec 19, 2012
-
-
Dr. Stephen Henson authored
Add new verify options to set checks. (backport from HEAD)
-
Dr. Stephen Henson authored
Don't verify our own responses. (backport from HEAD)
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
modification to the OCSP helper purpose breaks normal OCSP verification. It is no longer needed now we can trust partial chains.
-
- Dec 16, 2012
-
-
Andy Polyakov authored
Submitted by: Pierre Delaage
-
- Dec 14, 2012
-
-
Dr. Stephen Henson authored
(backport from HEAD)
-
Dr. Stephen Henson authored
store instead of the default which is to return an error if we can't build the complete chain. [backport from HEAD]
-
Ben Laurie authored
-
Ben Laurie authored
-
- Dec 13, 2012
-
-
Ben Laurie authored
-
Ben Laurie authored
-
Ben Laurie authored
-
- Dec 12, 2012
-
-
Ben Laurie authored
-
- Dec 06, 2012
-
-
Dr. Stephen Henson authored
Use -1 to check all extensions in CRLs. Always set flag for freshest CRL.
-
- Dec 05, 2012
-
-
Andy Polyakov authored
-
- Dec 04, 2012
-
-
Dr. Stephen Henson authored
-
- Dec 03, 2012
-
-
Dr. Stephen Henson authored
-
- Dec 01, 2012
-
-
Andy Polyakov authored
-