1. 29 4月, 2016 1 次提交
  2. 28 4月, 2016 1 次提交
  3. 27 4月, 2016 4 次提交
  4. 26 4月, 2016 1 次提交
  5. 22 4月, 2016 4 次提交
  6. 20 4月, 2016 1 次提交
  7. 18 4月, 2016 1 次提交
  8. 16 4月, 2016 1 次提交
  9. 14 4月, 2016 3 次提交
  10. 13 4月, 2016 4 次提交
  11. 11 4月, 2016 3 次提交
  12. 09 4月, 2016 1 次提交
  13. 08 4月, 2016 6 次提交
  14. 06 4月, 2016 1 次提交
  15. 05 4月, 2016 5 次提交
    • E
      New SSL test framework · 453dfd8d
      Emilia Kasper 提交于
      Currently, SSL tests are configured via command-line switches to
      ssltest.c. This results in a lot of duplication between ssltest.c and
      apps, and a complex setup. ssltest.c is also simply old and needs
      maintenance.
      
      Instead, we already have a way to configure SSL servers and clients, so
      we leverage that. SSL tests can now be configured from a configuration
      file. Test servers and clients are configured using the standard
      ssl_conf module. Additional test settings are configured via a test
      configuration.
      
      Moreover, since the CONF language involves unnecessary boilerplate, the
      test conf itself is generated from a shorter Perl syntax.
      
      The generated testcase files are checked in to the repo to make
      it easier to verify that the intended test cases are in fact run; and to
      simplify debugging failures.
      
      To demonstrate the approach, min/max protocol tests are converted to the
      new format. This change also fixes MinProtocol and MaxProtocol
      handling. It was previously requested that an SSL_CTX have both the
      server and client flags set for these commands; this clearly can never work.
      
      Guide to this PR:
       - test/ssl_test.c - test framework
       - test/ssl_test_ctx.* - test configuration structure
       - test/handshake_helper.* - new SSL test handshaking code
       - test/ssl-tests/ - test configurations
       - test/generate_ssl_tests.pl - script for generating CONF-style test
         configurations from perl inputs
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      453dfd8d
    • R
      Revert "various spelling fixes" · e771eea6
      Rich Salz 提交于
      This reverts commit 620d540b.
      It wasn't reviewed.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      e771eea6
    • R
      Revert "Fix an error code spelling." · 9f2a142b
      Rich Salz 提交于
      This reverts commit 2b0bcfaf.
      It wasn't reviewed.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      9f2a142b
    • F
      Fix an error code spelling. · 2b0bcfaf
      FdaSilvaYY 提交于
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      2b0bcfaf
    • F
      various spelling fixes · 620d540b
      FdaSilvaYY 提交于
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      620d540b
  16. 03 4月, 2016 1 次提交
    • V
      Move peer chain security checks into x509_vfy.c · fbb82a60
      Viktor Dukhovni 提交于
      A new X509_VERIFY_PARAM_set_auth_level() function sets the
      authentication security level.  For verification of SSL peers, this
      is automatically set from the SSL security level.  Otherwise, for
      now, the authentication security level remains at (effectively) 0
      by default.
      
      The new "-auth_level" verify(1) option is available in all the
      command-line tools that support the standard verify(1) options.
      
      New verify(1) tests added to check enforcement of chain signature
      and public key security levels.  Also added new tests of enforcement
      of the verify_depth limit.
      
      Updated documentation.
      Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
      fbb82a60
  17. 01 4月, 2016 1 次提交
  18. 31 3月, 2016 1 次提交