1. 10 6月, 2016 1 次提交
  2. 27 5月, 2016 2 次提交
    • M
      Fix intermittent windows failures in TLSProxy tests · cb2e10f2
      Matt Caswell 提交于
      When closing down the socket in s_client Windows will close it immediately
      even if there is data in the write buffer still waiting to be sent. This
      was causing tests to fail in Msys/Mingw builds because TLSProxy doesn't see
      the final CloseNotify.
      
      I have experimented with various ways of doing this "properly" (e.g.
      shutting down the socket before closing, setting SO_LINGER etc). I can't
      seem to find the "magic" formula that will make Windows do this. Inserting
      a short 50ms sleep seems to do the trick...but its not very "nice" so I've
      inserted a TODO on this item. Perhaps someone else will have better luck
      in figuring this out.
      
      RT#4255
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      cb2e10f2
    • M
      Fix s_client/s_server waiting for stdin on Windows · 75dd6c1a
      Matt Caswell 提交于
      On Windows we were using the function _kbhit() to determine whether there
      was input waiting in stdin for us to read. Actually all this does is work
      out whether there is a keyboard press event waiting to be processed in the
      input buffer. This only seems to work in a standard Windows console (not
      Msys console) and also doesn't work if you redirect the input from some
      other source (as we do in TLSProxy tests). This commit changes things to
      work differently depending on whether we are on the Windows console or not.
      
      RT#4255
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      75dd6c1a
  3. 18 5月, 2016 3 次提交
  4. 17 5月, 2016 2 次提交
  5. 06 5月, 2016 1 次提交
    • M
      Handle no async jobs in libssl · fc7f190c
      Matt Caswell 提交于
      If the application has limited the size of the async pool using
      ASYNC_init_thread() then we could run out of jobs while trying to start a
      libssl io operation. However libssl was failing to handle this and treating
      it like a fatal error. It should not be fatal...we just need to retry when
      there are jobs available again.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      fc7f190c
  6. 21 4月, 2016 1 次提交
  7. 11 4月, 2016 1 次提交
  8. 08 4月, 2016 1 次提交
    • V
      Suppress CT callback as appropriate · 43341433
      Viktor Dukhovni 提交于
      Suppress CT callbacks with aNULL or PSK ciphersuites that involve
      no certificates.  Ditto when the certificate chain is validated via
      DANE-TA(2) or DANE-EE(3) TLSA records.  Also skip SCT processing
      when the chain is fails verification.
      
      Move and consolidate CT callbacks from libcrypto to libssl.  We
      also simplify the interface to SSL_{,CTX_}_enable_ct() which can
      specify either a permissive mode that just collects information or
      a strict mode that requires at least one valid SCT or else asks to
      abort the connection.
      
      Simplified SCT processing and options in s_client(1) which now has
      just a simple pair of "-noct" vs. "-ct" options, the latter enables
      the permissive callback so that we can complete the handshake and
      report all relevant information.  When printing SCTs, print the
      validation status if set and not valid.
      Signed-off-by: NRob Percival <robpercival@google.com>
      Reviewed-by: NEmilia Käsper <emilia@openssl.org>
      43341433
  9. 06 4月, 2016 1 次提交
  10. 22 3月, 2016 1 次提交
  11. 21 3月, 2016 1 次提交
  12. 19 3月, 2016 1 次提交
  13. 18 3月, 2016 1 次提交
  14. 11 3月, 2016 3 次提交
  15. 10 3月, 2016 4 次提交
  16. 08 3月, 2016 7 次提交
  17. 04 3月, 2016 1 次提交
  18. 28 2月, 2016 1 次提交
  19. 23 2月, 2016 2 次提交
  20. 20 2月, 2016 1 次提交
  21. 19 2月, 2016 1 次提交
  22. 17 2月, 2016 1 次提交
  23. 15 2月, 2016 1 次提交
  24. 09 2月, 2016 1 次提交