1. 568c9cf Add ecp_supported_curves and simplify some code by Manuel Pégourié-Gonnard · 12 years ago
  2. 7038039 Dissociate TLS and internal EC curve identifiers by Manuel Pégourié-Gonnard · 12 years ago
  3. a97c015 Rm useless/wrong DHM lenght test by Manuel Pégourié-Gonnard · 12 years ago
  4. 032c34e Don't use DH blinding for ephemeral DH by Manuel Pégourié-Gonnard · 12 years ago
  5. 2d62764 Change dhm_calc_secret() prototype by Manuel Pégourié-Gonnard · 12 years ago
  6. e09d2f8 Change ecp_mul() prototype to allow randomization by Manuel Pégourié-Gonnard · 12 years ago
  7. 9659dae Some extra code defined out by Paul Bakker · 12 years ago
  8. 577e006 Merged ECDSA-based key-exchange and ciphersuites into development by Paul Bakker · 12 years ago
  9. 9cc6f5c Fix some hash debugging by Manuel Pégourié-Gonnard · 12 years ago
  10. 4bd1284 Fix ECDSA hash selection bug with TLS 1.0 and 1.1 by Manuel Pégourié-Gonnard · 12 years ago
  11. 9c9812a Fix bug introduced in dbf69cf by Manuel Pégourié-Gonnard · 12 years ago
  12. e511ffc Allow compiling without RSA or DH by Manuel Pégourié-Gonnard · 12 years ago
  13. f484282 Rm a few unneeded tests by Manuel Pégourié-Gonnard · 12 years ago
  14. d11eb7c Fix sig_alg extension on client. by Manuel Pégourié-Gonnard · 12 years ago
  15. bfe32ef pk_{sign,verify}() now accept hash_len = 0 by Manuel Pégourié-Gonnard · 12 years ago
  16. a20c58c Use convert functions for SSL_SIG_* and SSL_HASH_* by Manuel Pégourié-Gonnard · 12 years ago
  17. 0d42049 Merge code for RSA and ECDSA in SSL by Manuel Pégourié-Gonnard · 12 years ago
  18. 070cc7f Use the new PK RSA-alt interface by Manuel Pégourié-Gonnard · 12 years ago
  19. a2d3f22 Add and use pk_encrypt(), pk_decrypt() by Manuel Pégourié-Gonnard · 12 years ago
  20. 8df2769 Introduce pk_sign() and use it in ssl by Manuel Pégourié-Gonnard · 12 years ago
  21. 583b608 Fix some return values by Manuel Pégourié-Gonnard · 12 years ago
  22. 76c18a1 Add client support for ECDSA client auth by Manuel Pégourié-Gonnard · 12 years ago
  23. 09edda8 Check key type against selected key exchange by Manuel Pégourié-Gonnard · 12 years ago
  24. 20846b1 Add client support for ECDHE_ECDSA key exchange by Manuel Pégourié-Gonnard · 12 years ago
  25. efebb0a Refactor ssl_parse_server_key_exchange() a bit by Manuel Pégourié-Gonnard · 12 years ago
  26. 0be444a Ability to disable server_name extension (RFC 6066) by Paul Bakker · 12 years ago
  27. d2f068e Ability to enable / disable SSL v3 / TLS 1.0 / TLS 1.1 / TLS 1.2 individually by Paul Bakker · 12 years ago
  28. b3d9187 PK: add nice interface functions by Manuel Pégourié-Gonnard · 12 years ago
  29. 04376b1 Fixed memory leak in ssl_parse_server_key_exchange from missing md_free_ctx() by Paul Bakker · 12 years ago
  30. 0b27267 Fix ifdef conditions for EC-related extensions. by Manuel Pégourié-Gonnard · 12 years ago
  31. 5734b2d Actually use the point format selected for ECDH by Manuel Pégourié-Gonnard · 12 years ago
  32. 7b19c16 Handle suported_point_formats in ServerHello by Manuel Pégourié-Gonnard · 12 years ago
  33. 6b8846d Stop advertising support for compressed points by Manuel Pégourié-Gonnard · 12 years ago
  34. 1f2bc62 Made support for the truncated_hmac extension configurable by Paul Bakker · 12 years ago
  35. 05decb2 Made support for the max_fragment_length extension configurable by Paul Bakker · 12 years ago
  36. a503a63 Made session tickets support configurable from config.h by Paul Bakker · 12 years ago
  37. aa0d4d1 Add ssl_set_session_tickets() by Manuel Pégourié-Gonnard · 12 years ago
  38. 7cd5924 Rework NewSessionTicket handling in state machine by Manuel Pégourié-Gonnard · 12 years ago
  39. 6377e41 Complete client support for session tickets by Manuel Pégourié-Gonnard · 12 years ago
  40. a5cc602 Parse NewSessionTicket message by Manuel Pégourié-Gonnard · 12 years ago
  41. 60182ef ssl_cli: write & parse session ticket extension by Manuel Pégourié-Gonnard · 12 years ago
  42. 57c2852 Added truncated hmac negociation (without effect) by Manuel Pégourié-Gonnard · 12 years ago
  43. e048b67 Misc minor fixes by Manuel Pégourié-Gonnard · 12 years ago
  44. de600e5 Read max_fragment_length extension (client) by Manuel Pégourié-Gonnard · 12 years ago
  45. a052849 Send max_fragment_length extension (client) by Manuel Pégourié-Gonnard · 12 years ago
  46. ff56da3 Fix direct uses of x509_cert.rsa, now use pk_rsa() by Manuel Pégourié-Gonnard · 12 years ago
  47. 61d113b Init and free new contexts in the right place for SSL to prevent memory leaks by Paul Bakker · 12 years ago
  48. fa9b100 Also compiles / runs without time-based functions in OS by Paul Bakker · 12 years ago
  49. 9e36f04 SHA2 renamed to SHA256, SHA4 renamed to SHA512 and functions accordingly by Paul Bakker · 12 years ago
  50. 3866b9f Removed redundant inclusion by Paul Bakker · 12 years ago
  51. 5dc6b5f Made supported curves configurable by Paul Bakker · 12 years ago
  52. 2fbefde Client and server now filter sent and accepted ciphersuites on minimum by Paul Bakker · 12 years ago
  53. c5a79cc Fixed compiler warnings for unused parameter ssl by Paul Bakker · 12 years ago
  54. 73d4431 Fixed parse error in ssl_parse_certificate_request() by Paul Bakker · 12 years ago
  55. 48f7a5d DHE-PSK based ciphersuite support added and cleaner key exchange based by Paul Bakker · 12 years ago
  56. 188c8de Only allow missing SereverKeyExchange message in bare PSK mode by Paul Bakker · 12 years ago
  57. ed27a04 More granular define selections within code to allow for smaller code sizes by Paul Bakker · 12 years ago
  58. d4a56ec Added pre-shared key handling for the client side of SSL / TLS by Paul Bakker · 12 years ago
  59. f7abd42 Removed extra spaces on end of lines by Paul Bakker · 12 years ago
  60. 29e1f12 split parts of ssl_parse_server_key_exchange() into separate functions by Paul Bakker · 12 years ago
  61. 8f4ddae Ability to specify allowed ciphersuites based on the protocol version. by Paul Bakker · 12 years ago
  62. c70b982 OID functionality moved to a separate module. by Paul Bakker · 12 years ago
  63. 3b6a07b Prevented compiler warning on uninitialized end by Paul Bakker · 12 years ago
  64. d3edc86 Moved writing of client extensions to separate functions in ssl_cli.c by Paul Bakker · 12 years ago
  65. b7149bc Corrected behaviour for CBC-based suites using the SHA384 MAC and PRF by Paul Bakker · 12 years ago
  66. 41c83d3 Added Ephemeral Elliptic Curve Diffie Hellman ciphersuites to SSL/TLS by Paul Bakker · 12 years ago
  67. 68884e3 Moved to advanced ciphersuite representation and more dynamic SSL code by Paul Bakker · 13 years ago
  68. 1961b70 Added ssl_handshake_step() to allow single stepping the handshake process by Paul Bakker · 13 years ago
  69. 9c94cdd Correctly handle CertificateRequest with empty DN list in <= TLS 1.1 by Paul Bakker · 13 years ago
  70. 769075d Fixed dependency on POLARSSL_SHA4_C in ssl modules by Paul Bakker · 13 years ago
  71. 926af75 Fixed client certificate handling with TLS 1.2 by Paul Bakker · 13 years ago
  72. 645ce3a - Moved ciphersuite naming scheme to IANA reserved names by Paul Bakker · 13 years ago
  73. 993d11d - Send ClientHello with 'minimal version' by Paul Bakker · 13 years ago
  74. 23f3680 - Added proper support for TLS 1.2 signature_algorithm extension on server by Paul Bakker · 13 years ago
  75. 1d29fb5 - Added option to add minimum accepted SSL/TLS protocol version by Paul Bakker · 13 years ago
  76. eb2c658 - Generalized external private key implementation handling (like PKCS#11) in SSL/TLS by Paul Bakker · 13 years ago
  77. 0a59707 - Added simple SSL session cache implementation by Paul Bakker · 13 years ago
  78. 29b6476 - Added predefined DHM groups from RFC 5114 by Paul Bakker · 13 years ago
  79. d0f6fa7 - Sending of handshake_failures during renegotiation added by Paul Bakker · 13 years ago
  80. 48916f9 - Added Secure Renegotiation (RFC 5746) by Paul Bakker · 13 years ago
  81. 2770fbd - Added DEFLATE compression support as per RFC3749 (requires zlib) by Paul Bakker · 13 years ago
  82. 380da53 - Abstracted checksum updating during handshake by Paul Bakker · 13 years ago
  83. ca4ab49 - Added GCM ciphersuites to TLS implementation by Paul Bakker · 13 years ago
  84. 10cd225 - Added support for the SHA256 ciphersuites of AES and Camellia by Paul Bakker · 13 years ago
  85. bf63b36 - Updated comments by Paul Bakker · 13 years ago
  86. c3f177a - Added client side support for signature_algorithm extension and affiliated handling by Paul Bakker · 13 years ago
  87. 1ef83d6 - Initial bare version of TLS 1.2 by Paul Bakker · 13 years ago
  88. 1504af5 - Removed redundant POLARSSL_DEBUG_MSG define by Paul Bakker · 13 years ago
  89. fab5c82 - Added support for NULL cipher (POLARSSL_CIPHER_NULL_CIPHER) and weak ciphersuites (POLARSSL_ENABLE_WEAK_CIPHERSUITES). They are disabled by default! by Paul Bakker · 13 years ago
  90. 87e5cda - Fixed warning for t if no debugging defined by Paul Bakker · 14 years ago
  91. 55d3fd9 - Enlarged maximum size of DHM a client accepts to 512 bytes by Paul Bakker · 14 years ago
  92. a3d195c - Changed the used random function pointer to more flexible format. Renamed havege_rand() to havege_random() to prevent mistakes. Lots of changes as a consequence in library code and programs by Paul Bakker · 14 years ago
  93. 490ecc8 - Added ssl_set_max_version() to set the client's maximum sent version number by Paul Bakker · 14 years ago
  94. 5690efc - Fixed a whole bunch of dependencies on defines between files, examples and tests by Paul Bakker · 14 years ago
  95. 23986e5 - Major type rewrite of int to size_t for most variables and arguments used for buffer lengths and loops by Paul Bakker · 14 years ago
  96. 99a03af - Fixed possible uninitialized values by Paul Bakker · 14 years ago
  97. 9dcc322 - Added support for PKCS#1 v2.1 encoding and thus support for the RSAES-OAEP and RSASSA-PSS operations (enabled by POLARSSL_PKCS1_V21) by Paul Bakker · 14 years ago
  98. e2a39cc - Do not bail out if no client certificate specified. Try to negotiate anonymous connection (Fixes ticket #12) by Paul Bakker · 14 years ago
  99. e3166ce - Renamed ciphers member of ssl_context and cipher member of ssl_session to ciphersuites and ciphersuite respectively. This clarifies the difference with the generic cipher layer and is better naming altogether by Paul Bakker · 15 years ago
  100. 43b7e35 - Support for PKCS#11 through the use of the pkcs11-helper library by Paul Bakker · 15 years ago