1. 11 2月, 2016 2 次提交
  2. 10 2月, 2016 2 次提交
  3. 09 2月, 2016 4 次提交
    • M
      Updates for auto init/deinit review comments · 35d8fa56
      Matt Caswell 提交于
      Fixes for the auto-init/deinit code based on review comments
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      35d8fa56
    • M
      Provide documentation for auto-init/auto-deinit · 8b75603c
      Matt Caswell 提交于
      Provide some man pages for auto-init/deinit. Also update the INSTALL
      documentation for information on the new Configure options implemented as
      part of this.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      8b75603c
    • R
      Small fixes · e5a82bfd
      Richard Levitte 提交于
      - One typo fixed in crypto/bio/b_addr.c
      - Add a comment in doc/crypto/BIO_parse_hostserv.pod to explain the
        blank lines with one lonely space each.
      Reviewed-by: NAndy Polyakov <appro@openssl.org>
      e5a82bfd
    • V
      Suppress DANE TLSA reflection when verification fails · c0a445a9
      Viktor Dukhovni 提交于
      As documented both SSL_get0_dane_authority() and SSL_get0_dane_tlsa()
      are expected to return a negative match depth and nothing else when
      verification fails.  However, this only happened when verification
      failed during chain construction.  Errors in verification of the
      constructed chain did not have the intended effect on these functions.
      
      This commit updates the functions to check for verify_result ==
      X509_V_OK, and no longer erases any accumulated match information
      when chain construction fails.  Sophisticated developers can, with
      care, use SSL_set_verify_result(ssl, X509_V_OK) to "peek" at TLSA
      info even when verification fail.  They must of course first check
      and save the real error, and restore the original error as quickly
      as possible.  Hiding by default seems to be the safer interface.
      
      Introduced X509_V_ERR_DANE_NO_MATCH code to signal failure to find
      matching TLSA records.  Previously reported via X509_V_ERR_CERT_UNTRUSTED.
      
      This also changes the "-brief" output from s_client to include
      verification results and TLSA match information.
      
      Mentioned session resumption in code example in SSL_CTX_dane_enable(3).
      Also mentioned that depths returned are relative to the verified chain
      which is now available via SSL_get0_verified_chain(3).
      
      Added a few more test-cases to danetest, that exercise the new
      code.
      
      Resolved thread safety issue in use of static buffer in
      X509_verify_cert_error_string().
      
      Fixed long-stating issue in apps/s_cb.c which always sets verify_error
      to either X509_V_OK or "chain to long", code elsewhere (e.g.
      s_time.c), seems to expect the actual error.  [ The new chain
      construction code is expected to correctly generate "chain
      too long" errors, so at some point we need to drop the
      work-arounds, once SSL_set_verify_depth() is also fixed to
      propagate the depth to X509_STORE_CTX reliably. ]
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      c0a445a9
  4. 08 2月, 2016 2 次提交
  5. 07 2月, 2016 4 次提交
  6. 06 2月, 2016 11 次提交
  7. 04 2月, 2016 5 次提交
    • D
      Add ec -check option · 7565cbc4
      Dr. Stephen Henson 提交于
      Reviewed-by: NAndy Polyakov <appro@openssl.org>
      7565cbc4
    • R
      417be660
    • R
      Refactoring BIO: new socket-handling functions, deprecate older ones · d33b215b
      Richard Levitte 提交于
      Added functions:
      
      BIO_socket
      BIO_connect
      BIO_listen
      BIO_accept_ex
      BIO_closesocket
      BIO_sock_info
      
      These get deprecated:
      
      BIO_gethostbyname
      BIO_get_port
      BIO_get_host_ip
      BIO_get_accept_socket
      BIO_accept
      Reviewed-by: NKurt Roeckx <kurt@openssl.org>
      d33b215b
    • R
      Refactoring BIO: add wrappers around sockaddr et al · 28a0841b
      Richard Levitte 提交于
      Because different platforms have different levels of support for IPv6,
      different kinds of sockaddr variants, and some have getaddrinfo et al
      while others don't, we could end up with a mess if ifdefs, duplicate
      code and other maintainance nightmares.
      
      Instead, we're introducing wrappers around the common form for socket
      communication:
      BIO_ADDR, closely related to struct sockaddr and some of its variants.
      BIO_ADDRINFO, closely related to struct addrinfo.
      
      With that comes support routines, both convenient creators and
      accessors, plus a few utility functions:
      
      BIO_parse_hostserv, takes a string of the form host:service and
      splits it into host and service.  It checks for * in both parts, and
      converts any [ipv6-address] syntax to ust the IPv6 address.
      
      BIO_lookup, looks up information on a host.
      
      All routines handle IPv4 (AF_INET) and IPv6 (AF_INET6) addresses, and
      there is support for local sockets (AF_UNIX) as well.
      Reviewed-by: NKurt Roeckx <kurt@openssl.org>
      28a0841b
    • E
      RT3234: disable compression · dc5744cb
      Emilia Kasper 提交于
      CRIME protection: disable compression by default, even if OpenSSL is
      compiled with zlib enabled. Applications can still enable compression by
      calling SSL_CTX_clear_options(ctx, SSL_OP_NO_COMPRESSION), or by using
      the SSL_CONF library to configure compression. SSL_CONF continues to
      work as before:
      
      SSL_CONF_cmd(ctx, "Options", "Compression") enables compression.
      
      SSL_CONF_cmd(ctx, "Options", "-Compression") disables compression (now
      no-op by default).
      
      The command-line switch has changed from -no_comp to -comp.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      dc5744cb
  8. 03 2月, 2016 3 次提交
  9. 02 2月, 2016 1 次提交
  10. 01 2月, 2016 6 次提交