1. 06 9月, 2013 8 次提交
    • B
      More cleanup. · 5eda213e
      Ben Laurie 提交于
      5eda213e
    • B
      Make it build. · a6a48e87
      Ben Laurie 提交于
      a6a48e87
    • S
      Add callbacks supporting generation and retrieval of supplemental data... · 36086186
      Scott Deboy 提交于
      Add callbacks supporting generation and retrieval of supplemental data entries, facilitating RFC 5878 (TLS auth extensions)
      Removed prior audit proof logic - audit proof support was implemented using the generic TLS extension API
      Tests exercising the new supplemental data registration and callback api can be found in ssltest.c.
      Implemented changes to s_server and s_client to exercise supplemental data callbacks via the -auth argument, as well as additional flags to exercise supplemental data being sent only during renegotiation.
      36086186
    • V
      478b50cf
    • B
      Clean up layout. · d2625fd6
      Ben Laurie 提交于
      d2625fd6
    • C
      Add an "-xmpphost" option to s_client · b98af49d
      Carlos Alberto Lopez Perez 提交于
       * Many XMPP servers are configured with multiple domains (virtual hosts)
       * In order to establish successfully the TLS connection you have to specify
         which virtual host you are trying to connect.
       * Test this, for example with ::
         * Fail:
             openssl s_client -connect talk.google.com:5222 -starttls xmpp
         * Works:
             openssl s_client -connect talk.google.com:5222 -starttls xmpp -xmpphost gmail.com
      b98af49d
    • C
      Fix infinite loop on s_client starttls xmpp · 4249d4ba
      Carlos Alberto Lopez Perez 提交于
       * When the host used in "-connect" is not what the remote XMPP server expects
         the server will return an error like this:
           <stream:error>
             <host-unknown xmlns='urn:ietf:params:xml:ns:xmpp-streams'/>
           </stream:error>
       * But the actual code will stay on the loop forever because the stop condition
         "/stream:features>" will never happen,
       * Make this more robust: The stop condition should be that BIO_read failed
       * Test if for example with ::
      
          openssl s_client  -connect random.jabb3r.net:5222 -starttls xmpp
      4249d4ba
    • C
      Fix XMPP code detection on s_client starttls xmpp · 4e48c775
      Carlos Alberto Lopez Perez 提交于
       * Some XMPP Servers (OpenFire) use double quotes.
       * This makes s_client starttls work with this servers.
       * Tested with OpenFire servers from http://xmpp.net/ ::
      
           openssl s_client -connect coderollers.com:5222 -starttls xmpp
      4e48c775
  2. 22 7月, 2013 2 次提交
  3. 13 6月, 2013 1 次提交
  4. 09 4月, 2013 1 次提交
    • D
      Dual DTLS version methods. · c6913eeb
      Dr. Stephen Henson 提交于
      Add new methods DTLS_*_method() which support both DTLS 1.0 and DTLS 1.2 and
      pick the highest version the peer supports during negotiation.
      
      As with SSL/TLS options can change this behaviour specifically
      SSL_OP_NO_DTLSv1 and SSL_OP_NO_DTLSv1_2.
      c6913eeb
  5. 26 3月, 2013 1 次提交
    • D
      Provisional DTLS 1.2 support. · c3b344e3
      Dr. Stephen Henson 提交于
      Add correct flags for DTLS 1.2, update s_server and s_client to handle
      DTLS 1.2 methods.
      
      Currently no support for version negotiation: i.e. if client/server selects
      DTLS 1.2 it is that or nothing.
      c3b344e3
  6. 30 12月, 2012 1 次提交
  7. 12 12月, 2012 1 次提交
  8. 07 12月, 2012 1 次提交
  9. 06 12月, 2012 1 次提交
  10. 03 12月, 2012 4 次提交
  11. 24 11月, 2012 1 次提交
  12. 22 11月, 2012 2 次提交
  13. 20 11月, 2012 2 次提交
  14. 17 11月, 2012 1 次提交
  15. 06 11月, 2012 1 次提交
  16. 08 10月, 2012 1 次提交
  17. 13 9月, 2012 1 次提交
  18. 08 9月, 2012 1 次提交
  19. 29 8月, 2012 1 次提交
  20. 24 7月, 2012 1 次提交
    • D
      Add support for certificate stores in CERT structure. This makes it · 74ecfab4
      Dr. Stephen Henson 提交于
      possible to have different stores per SSL structure or one store in
      the parent SSL_CTX. Include distint stores for certificate chain
      verification and chain building. New ctrl SSL_CTRL_BUILD_CERT_CHAIN
      to build and store a certificate chain in CERT structure: returing
      an error if the chain cannot be built: this will allow applications
      to test if a chain is correctly configured.
      
      Note: if the CERT based stores are not set then the parent SSL_CTX
      store is used to retain compatibility with existing behaviour.
      74ecfab4
  21. 08 7月, 2012 1 次提交
    • D
      Add new ctrl to retrieve client certificate types, print out · 9f27b1ee
      Dr. Stephen Henson 提交于
      details in s_client.
      
      Also add ctrl to set client certificate types. If not used sensible values
      will be included based on supported signature algorithms: for example if
      we don't include any DSA signing algorithms the DSA certificate type is
      omitted.
      
      Fix restriction in old code where certificate types would be truncated
      if it exceeded TLS_CT_NUMBER.
      9f27b1ee
  22. 04 7月, 2012 1 次提交
    • D
      Fix memory leak. · dd251659
      Dr. Stephen Henson 提交于
      Always perform nexproto callback argument initialisation in s_server
      otherwise we use uninitialised data if -nocert is specified.
      dd251659
  23. 03 7月, 2012 3 次提交
  24. 25 6月, 2012 1 次提交
  25. 22 6月, 2012 1 次提交