1. 08 3月, 2016 2 次提交
  2. 04 3月, 2016 1 次提交
  3. 28 2月, 2016 1 次提交
  4. 23 2月, 2016 2 次提交
  5. 20 2月, 2016 1 次提交
  6. 19 2月, 2016 1 次提交
  7. 17 2月, 2016 1 次提交
  8. 15 2月, 2016 1 次提交
  9. 09 2月, 2016 3 次提交
    • M
      Auto init/deinit libcrypto · 7b9f8f7f
      Matt Caswell 提交于
      This builds on the previous commit to auto initialise/deinitialise
      libcrypto.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      7b9f8f7f
    • V
      Suppress DANE TLSA reflection when verification fails · c0a445a9
      Viktor Dukhovni 提交于
      As documented both SSL_get0_dane_authority() and SSL_get0_dane_tlsa()
      are expected to return a negative match depth and nothing else when
      verification fails.  However, this only happened when verification
      failed during chain construction.  Errors in verification of the
      constructed chain did not have the intended effect on these functions.
      
      This commit updates the functions to check for verify_result ==
      X509_V_OK, and no longer erases any accumulated match information
      when chain construction fails.  Sophisticated developers can, with
      care, use SSL_set_verify_result(ssl, X509_V_OK) to "peek" at TLSA
      info even when verification fail.  They must of course first check
      and save the real error, and restore the original error as quickly
      as possible.  Hiding by default seems to be the safer interface.
      
      Introduced X509_V_ERR_DANE_NO_MATCH code to signal failure to find
      matching TLSA records.  Previously reported via X509_V_ERR_CERT_UNTRUSTED.
      
      This also changes the "-brief" output from s_client to include
      verification results and TLSA match information.
      
      Mentioned session resumption in code example in SSL_CTX_dane_enable(3).
      Also mentioned that depths returned are relative to the verified chain
      which is now available via SSL_get0_verified_chain(3).
      
      Added a few more test-cases to danetest, that exercise the new
      code.
      
      Resolved thread safety issue in use of static buffer in
      X509_verify_cert_error_string().
      
      Fixed long-stating issue in apps/s_cb.c which always sets verify_error
      to either X509_V_OK or "chain to long", code elsewhere (e.g.
      s_time.c), seems to expect the actual error.  [ The new chain
      construction code is expected to correctly generate "chain
      too long" errors, so at some point we need to drop the
      work-arounds, once SSL_set_verify_depth() is also fixed to
      propagate the depth to X509_STORE_CTX reliably. ]
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      c0a445a9
    • D
      Deprecate undocumented SSL_cache_hit(). · b577fd0b
      Dr. Stephen Henson 提交于
      Deprecate undocumented SSL_cache_hit(). Make SSL_session_reused() into a
      real function.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      b577fd0b
  10. 04 2月, 2016 1 次提交
    • R
      Refactoring BIO: Adapt s_client and s_server · ab69ac00
      Richard Levitte 提交于
      s_socket.c gets brutally cleaned out and now consists of only two
      functions, one for client and the other for server.  They both handle
      AF_INET, AF_INET6 and additionally AF_UNIX where supported.  The rest
      is just easy adaptation.
      
      Both s_client and s_server get the new flags -4 and -6 to force the
      use of IPv4 or IPv6 only.
      
      Also, the default host "localhost" in s_client is removed.  It's not
      certain that this host is set up for both IPv4 and IPv6.  For example,
      Debian has "ip6-localhost" as the default hostname for [::1].  The
      better way is to default |host| to NULL and rely on BIO_lookup() to
      return a BIO_ADDRINFO with the appropriate loopback address for IPv4
      or IPv6 as indicated by the |family| parameter.
      Reviewed-by: NKurt Roeckx <kurt@openssl.org>
      ab69ac00
  11. 29 1月, 2016 1 次提交
  12. 21 1月, 2016 1 次提交
  13. 19 1月, 2016 1 次提交
    • V
      Support disabling any or all TLS or DTLS versions · 6b01bed2
      Viktor Dukhovni 提交于
      Some users want to disable SSL 3.0/TLS 1.0/TLS 1.1, and enable just
      TLS 1.2.  In the future they might want to disable TLS 1.2 and
      enable just TLS 1.3, ...
      
      This commit makes it possible to disable any or all of the TLS or
      DTLS protocols.  It also considerably simplifies the SSL/TLS tests,
      by auto-generating the min/max version tests based on the set of
      supported protocols (425 explicitly written out tests got replaced
      by two loops that generate all 425 tests if all protocols are
      enabled, fewer otherwise).
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      6b01bed2
  14. 15 1月, 2016 1 次提交
  15. 09 1月, 2016 2 次提交
  16. 08 1月, 2016 1 次提交
  17. 22 12月, 2015 1 次提交
  18. 15 12月, 2015 2 次提交
  19. 12 12月, 2015 1 次提交
  20. 25 11月, 2015 1 次提交
  21. 21 11月, 2015 4 次提交
  22. 14 11月, 2015 1 次提交
  23. 03 11月, 2015 1 次提交
  24. 13 10月, 2015 1 次提交
    • M
      Centralise loading default apps config file · a0a82324
      Matt Caswell 提交于
      Loading the config file after processing command line options can
      cause problems, e.g. where an engine provides new ciphers/digests
      these are not then recoginised on the command line. Move the
      default config file loading to before the command line option
      processing. Whilst we're doing this we might as well centralise
      this instead of doing it individually for each application. Finally
      if we do it before the OpenSSL_add_ssl_algorithms() call then
      ciphersuites provided by an engine (e.g. GOST) can be available to
      the apps.
      
      RT#4085
      RT#4086
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      a0a82324
  25. 28 9月, 2015 1 次提交
  26. 25 9月, 2015 1 次提交
    • M
      Add support for -no-CApath and -no-CAfile options · 2b6bcb70
      Matt Caswell 提交于
      For those command line options that take the verification options
      -CApath and -CAfile, if those options are absent then the default path or
      file is used instead. It is not currently possible to specify *no* path or
      file at all. This change adds the options -no-CApath and -no-CAfile to
      specify that the default locations should not be used to all relevant
      applications.
      Reviewed-by: NAndy Polyakov <appro@openssl.org>
      2b6bcb70
  27. 11 9月, 2015 1 次提交
  28. 06 9月, 2015 1 次提交
    • R
      Change the treatment of stdin and stdout to allow binary data · a60994df
      Richard Levitte 提交于
      If the output to stdout or the input from stdin is meant to be binary,
      it's deeply unsetting to get the occasional LF converted to CRLF or
      the other way around.  If someone happens to forget to redirect stdin
      or stdout, they will get gibberish anyway, line ending conversion will
      not change that.
      
      Therefore, let's not have dup_bio_* decide unilaterally what mode the
      BIO derived from stdin and stdout, and rather let the app decide by
      declaring the intended format.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      a60994df
  29. 02 9月, 2015 1 次提交
  30. 05 8月, 2015 1 次提交
  31. 02 8月, 2015 1 次提交