1. 08 3月, 2016 1 次提交
  2. 04 3月, 2016 1 次提交
  3. 24 2月, 2016 1 次提交
  4. 11 2月, 2016 1 次提交
  5. 09 2月, 2016 1 次提交
    • V
      Suppress DANE TLSA reflection when verification fails · c0a445a9
      Viktor Dukhovni 提交于
      As documented both SSL_get0_dane_authority() and SSL_get0_dane_tlsa()
      are expected to return a negative match depth and nothing else when
      verification fails.  However, this only happened when verification
      failed during chain construction.  Errors in verification of the
      constructed chain did not have the intended effect on these functions.
      
      This commit updates the functions to check for verify_result ==
      X509_V_OK, and no longer erases any accumulated match information
      when chain construction fails.  Sophisticated developers can, with
      care, use SSL_set_verify_result(ssl, X509_V_OK) to "peek" at TLSA
      info even when verification fail.  They must of course first check
      and save the real error, and restore the original error as quickly
      as possible.  Hiding by default seems to be the safer interface.
      
      Introduced X509_V_ERR_DANE_NO_MATCH code to signal failure to find
      matching TLSA records.  Previously reported via X509_V_ERR_CERT_UNTRUSTED.
      
      This also changes the "-brief" output from s_client to include
      verification results and TLSA match information.
      
      Mentioned session resumption in code example in SSL_CTX_dane_enable(3).
      Also mentioned that depths returned are relative to the verified chain
      which is now available via SSL_get0_verified_chain(3).
      
      Added a few more test-cases to danetest, that exercise the new
      code.
      
      Resolved thread safety issue in use of static buffer in
      X509_verify_cert_error_string().
      
      Fixed long-stating issue in apps/s_cb.c which always sets verify_error
      to either X509_V_OK or "chain to long", code elsewhere (e.g.
      s_time.c), seems to expect the actual error.  [ The new chain
      construction code is expected to correctly generate "chain
      too long" errors, so at some point we need to drop the
      work-arounds, once SSL_set_verify_depth() is also fixed to
      propagate the depth to X509_STORE_CTX reliably. ]
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      c0a445a9
  6. 06 2月, 2016 2 次提交
  7. 15 1月, 2016 1 次提交
  8. 08 1月, 2016 1 次提交
  9. 21 11月, 2015 1 次提交
  10. 14 11月, 2015 1 次提交
  11. 25 9月, 2015 1 次提交
  12. 22 8月, 2015 1 次提交
  13. 31 7月, 2015 1 次提交
  14. 23 5月, 2015 1 次提交
  15. 03 5月, 2015 1 次提交
  16. 25 2月, 2015 1 次提交
  17. 04 12月, 2014 1 次提交
  18. 15 10月, 2014 1 次提交
  19. 15 7月, 2014 1 次提交
  20. 07 7月, 2014 1 次提交
  21. 04 7月, 2014 1 次提交
  22. 03 7月, 2014 1 次提交
  23. 20 6月, 2014 2 次提交
  24. 07 4月, 2014 1 次提交
  25. 06 9月, 2013 3 次提交
    • S
      Add callbacks supporting generation and retrieval of supplemental data... · 36086186
      Scott Deboy 提交于
      Add callbacks supporting generation and retrieval of supplemental data entries, facilitating RFC 5878 (TLS auth extensions)
      Removed prior audit proof logic - audit proof support was implemented using the generic TLS extension API
      Tests exercising the new supplemental data registration and callback api can be found in ssltest.c.
      Implemented changes to s_server and s_client to exercise supplemental data callbacks via the -auth argument, as well as additional flags to exercise supplemental data being sent only during renegotiation.
      36086186
    • C
      Add an "-xmpphost" option to s_client · b98af49d
      Carlos Alberto Lopez Perez 提交于
       * Many XMPP servers are configured with multiple domains (virtual hosts)
       * In order to establish successfully the TLS connection you have to specify
         which virtual host you are trying to connect.
       * Test this, for example with ::
         * Fail:
             openssl s_client -connect talk.google.com:5222 -starttls xmpp
         * Works:
             openssl s_client -connect talk.google.com:5222 -starttls xmpp -xmpphost gmail.com
      b98af49d
    • C
  26. 18 6月, 2013 1 次提交
    • T
      Cleanup of custom extension stuff. · 9cd50f73
      Trevor 提交于
      serverinfo rejects non-empty extensions.
      
      Omit extension if no relevant serverinfo data.
      
      Improve error-handling in serverinfo callback.
      
      Cosmetic cleanups.
      
      s_client documentation.
      
      s_server documentation.
      
      SSL_CTX_serverinfo documentation.
      
      Cleaup -1 and NULL callback handling for custom extensions, add tests.
      
      Cleanup ssl_rsa.c serverinfo code.
      
      Whitespace cleanup.
      
      Improve comments in ssl.h for serverinfo.
      
      Whitespace.
      
      Cosmetic cleanup.
      
      Reject non-zero-len serverinfo extensions.
      
      Whitespace.
      
      Make it build.
      9cd50f73
  27. 20 11月, 2012 3 次提交
  28. 26 6月, 2009 1 次提交
  29. 15 4月, 2009 1 次提交
  30. 23 8月, 2007 1 次提交
  31. 17 2月, 2007 1 次提交
  32. 11 3月, 2006 1 次提交
  33. 17 11月, 2004 1 次提交
    • D
      PR: 910 · 826a42a0
      Dr. Stephen Henson 提交于
      Add command line options -certform, -keyform and -pass to s_client and
      s_server. This supports the use of alternative passphrase sources, key formats
      and keys handled by an ENGINE.
      
      Update docs.
      826a42a0
  34. 05 1月, 2004 1 次提交