Age | Commit message (Collapse) | Author | |
---|---|---|---|
2016-06-13 | ssl: introduce the notion of flights for dtls and tls | Andreas Schultz | |
The flight concept was introduced by DTLS (RFC 4347) to optimize the packing of DTLS records into UDP packets. This change implments the flight concept in the the generic SSL connection logic and add the queue logic to the TLS and DTLS stack. The DTLS required resend handling is not implemented yet. While the flight handling is only required for DTSL, it turns out that the same mechanism can be usefull to TCP based TLS as well. With the current scheme each TLS record will be mapped into a separate TCP frame. This causes more TCP frames to be generate that necessary. On fast network this will have no impact, but reducing the number of frames and thereby the number of round trips can result in significant speedups on slow and unreliable networks. Conflicts: lib/ssl/src/tls_connection.erl | |||
2016-05-03 | ssl: Use gen_statem instead of gen_fsm | Ingela Anderton Andin | |
Also reduce timing issues in tests | |||
2015-10-09 | Update SSL | Hans Bolinder | |
Record field types have been modified due to commit 8ce35b2: "Take out automatic insertion of 'undefined' from typed record fields". | |||
2015-06-18 | Change license text to APLv2 | Bruce Yinhe | |
2015-05-12 | ssl: add SNI server support | Qijiang Fan | |
2015-03-17 | ssl: Add TLS-ALPN support | Loïc Hoguin | |
This commit adds support for RFC7301, application-layer protocol negotiation. ALPN is the standard based approach to the NPN extension, and is required for HTTP/2. ALPN lives side by side with NPN and provides an equivalent feature but in this case it is the server that decides what protocol to use, not the client. When both ALPN and NPN are sent by a client, and the server is configured with both ALPN and NPN options, ALPN will always take precedence. This behavior can also be found in the OpenSSL implementation of ALPN. ALPN and NPN share the ssl:negotiated_protocol/1 function for retrieving the negotiated protocol. The previously existing function ssl:negotiated_next_protocol/1 still exists, but has been deprecated and removed from the documentation. The tests against OpenSSL require OpenSSL version 1.0.2+. | |||
2015-03-09 | ssl: Integrate public_key CRL verification with the ssl application | Ingela Anderton Andin | |
2014-12-01 | ssl: Change code to reflect that state data may be secret | Ingela Anderton Andin | |
2014-06-11 | ssl: Make sure change cipher spec is correctly handled | Ingela Anderton Andin | |
2014-05-26 | ssl: Add ssl options to listen options tracker | Ingela Anderton Andin | |
2014-03-25 | ssl: Improve type specs | Ingela Anderton Andin | |
Conflicts: lib/ssl/src/dtls_record.erl | |||
2014-02-23 | Deprecate pre-defined built-in types | Hans Bolinder | |
The types array(), dict(), digraph(), gb_set(), gb_tree(), queue(), set(), and tid() have been deprecated. They will be removed in OTP 18.0. Instead the types array:array(), dict:dict(), digraph:graph(), gb_set:set(), gb_tree:tree(), queue:queue(), sets:set(), and ets:tid() can be used. (Note: it has always been necessary to use ets:tid().) It is allowed in OTP 17.0 to locally re-define the types array(), dict(), and so on. New types array:array/1, dict:dict/2, gb_sets:set/1, gb_trees:tree/2, queue:queue/1, and sets:set/1 have been added. | |||
2014-01-28 | Fix incorrect type reference (inet:ipaddress() -> inet:ip_address()) | Tuncer Ayaz | |
2013-12-02 | ssl: Refactor connetion handling | Ingela Anderton Andin | |
2013-12-02 | ssl, public_key: Dialyzer fixes | Ingela Anderton Andin | |
2013-12-02 | ssl: Refactor connection and handshake handling | Ingela Anderton Andin | |