Issues
- 0
support TLS-ECJPAKE-WITH-AES-128-CCM-8 cipher
#42 opened by dakhnod - 0
Connecting to IPv6 address does not work
#41 opened by JKRhb - 4
DTLS Server Side implementation
#37 opened by pdulapalli - 0
Client connection to openssl server fails
#39 opened by KEGustafsson - 1
doesnt work
#38 opened by amiiigh - 9
Add use_srtp extension
#30 opened by ibc - 0
Resume session
#34 opened by reklatsmasters - 0
add connection_id extension
#36 opened by reklatsmasters - 0
Server side implementation
#15 opened by reklatsmasters - 3
- 0
- 0
- 0
Explicitly verify server finished checksum
#28 opened by reklatsmasters - 0
Improve chacha20-poly1305 detection.
#33 opened by reklatsmasters - 8
- 0
RFC7905: ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS)
#17 opened by reklatsmasters - 7
- 0
remove `bl`, use `binary-data` instead
#29 opened by reklatsmasters - 4
Specified custom port doesn't seem to work
#27 opened by Milannv - 0
- 0
- 0
Drop aes-ccm block cipher
#26 opened by reklatsmasters - 6
- 0
- 0
Improve errors and alerts handling
#8 opened by reklatsmasters - 0
- 0
Incorrect CertificateRequest message
#22 opened by reklatsmasters - 0
Error: Invalid key length when TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 cipher selected
#21 opened by reklatsmasters - 2
Client-side certificate support
#13 opened by reklatsmasters - 0
- 0
Server certificate verify callback
#14 opened by reklatsmasters - 0
Add handshake reordering
#7 opened by reklatsmasters - 0
Add ECDHE_ECDSA key exchange
#12 opened by reklatsmasters - 0
Add ECDHE_RSA key exchange
#11 opened by reklatsmasters - 0
Add npmignore
#4 opened by reklatsmasters - 0
Add changelog
#5 opened by reklatsmasters - 0
Add Extended Master Secret Extension
#10 opened by reklatsmasters - 0
Add AES_CCM
#9 opened by reklatsmasters - 1
- 0
- 0
Merge outgoing handshake messages
#1 opened by reklatsmasters