1. 18 4月, 2016 1 次提交
  2. 03 4月, 2016 1 次提交
    • V
      Move peer chain security checks into x509_vfy.c · fbb82a60
      Viktor Dukhovni 提交于
      A new X509_VERIFY_PARAM_set_auth_level() function sets the
      authentication security level.  For verification of SSL peers, this
      is automatically set from the SSL security level.  Otherwise, for
      now, the authentication security level remains at (effectively) 0
      by default.
      
      The new "-auth_level" verify(1) option is available in all the
      command-line tools that support the standard verify(1) options.
      
      New verify(1) tests added to check enforcement of chain signature
      and public key security levels.  Also added new tests of enforcement
      of the verify_depth limit.
      
      Updated documentation.
      Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
      fbb82a60
  3. 01 4月, 2016 1 次提交
  4. 31 3月, 2016 1 次提交
    • R
      Fix pointer size issues with argv on VMS · 087ca80a
      Richard Levitte 提交于
      The argument 'argv' in 'main' is a short pointer to a short pointer on
      VMS, regardless of initial pointer size.  We must therefore make sure
      that 'copy_argv' gets a 32-bit pointer for argv, and that the copied
      argv is used for the rest of main().
      
      This introduces the local type argv_t, which will have correct pointer
      size in all cases (and be harmless on all other platforms) as well as
      the macro Argv, which is defined as 'copied_argv' or 'argv', as the
      case may be.
      Reviewed-by: NAndy Polyakov <appro@openssl.org>
      087ca80a
  5. 22 3月, 2016 1 次提交
  6. 21 3月, 2016 1 次提交
  7. 20 3月, 2016 1 次提交
  8. 19 3月, 2016 1 次提交
  9. 18 3月, 2016 1 次提交
  10. 11 3月, 2016 1 次提交
  11. 10 3月, 2016 2 次提交
  12. 08 3月, 2016 1 次提交
    • T
      GH787: Fix ALPN · 817cd0d5
      Todd Short 提交于
      * Perform ALPN after the SNI callback; the SSL_CTX may change due to
        that processing
      * Add flags to indicate that we actually sent ALPN, to properly error
        out if unexpectedly received.
      * clean up ssl3_free() no need to explicitly clear when doing memset
      * document ALPN functions
      Signed-off-by: NRich Salz <rsalz@openssl.org>
      Reviewed-by: NEmilia Käsper <emilia@openssl.org>
      817cd0d5
  13. 04 3月, 2016 1 次提交
  14. 26 2月, 2016 1 次提交
  15. 23 2月, 2016 1 次提交
  16. 19 2月, 2016 1 次提交
  17. 17 2月, 2016 1 次提交
  18. 15 2月, 2016 1 次提交
  19. 11 2月, 2016 2 次提交
  20. 09 2月, 2016 1 次提交
  21. 07 2月, 2016 1 次提交
  22. 06 2月, 2016 1 次提交
  23. 04 2月, 2016 1 次提交
    • E
      RT3234: disable compression · dc5744cb
      Emilia Kasper 提交于
      CRIME protection: disable compression by default, even if OpenSSL is
      compiled with zlib enabled. Applications can still enable compression by
      calling SSL_CTX_clear_options(ctx, SSL_OP_NO_COMPRESSION), or by using
      the SSL_CONF library to configure compression. SSL_CONF continues to
      work as before:
      
      SSL_CONF_cmd(ctx, "Options", "Compression") enables compression.
      
      SSL_CONF_cmd(ctx, "Options", "-Compression") disables compression (now
      no-op by default).
      
      The command-line switch has changed from -no_comp to -comp.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      dc5744cb
  24. 03 2月, 2016 1 次提交
  25. 30 1月, 2016 2 次提交
  26. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  27. 21 1月, 2016 1 次提交
  28. 14 1月, 2016 2 次提交
  29. 13 1月, 2016 1 次提交
  30. 21 11月, 2015 1 次提交
  31. 25 9月, 2015 1 次提交
    • M
      Add support for -no-CApath and -no-CAfile options · 2b6bcb70
      Matt Caswell 提交于
      For those command line options that take the verification options
      -CApath and -CAfile, if those options are absent then the default path or
      file is used instead. It is not currently possible to specify *no* path or
      file at all. This change adds the options -no-CApath and -no-CAfile to
      specify that the default locations should not be used to all relevant
      applications.
      Reviewed-by: NAndy Polyakov <appro@openssl.org>
      2b6bcb70
  32. 18 9月, 2015 1 次提交
  33. 11 9月, 2015 1 次提交
  34. 06 9月, 2015 3 次提交
    • R
      Change the treatment of stdin and stdout to allow binary data · a60994df
      Richard Levitte 提交于
      If the output to stdout or the input from stdin is meant to be binary,
      it's deeply unsetting to get the occasional LF converted to CRLF or
      the other way around.  If someone happens to forget to redirect stdin
      or stdout, they will get gibberish anyway, line ending conversion will
      not change that.
      
      Therefore, let's not have dup_bio_* decide unilaterally what mode the
      BIO derived from stdin and stdout, and rather let the app decide by
      declaring the intended format.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      a60994df
    • R
      Change the way apps open their input and output files · bdd58d98
      Richard Levitte 提交于
      The different apps had the liberty to decide whether they would open their
      input and output files in binary mode or not, which could be confusing if
      two different apps were handling the same type of file in different ways.
      
      The solution is to centralise the decision of low level file organisation,
      and that the apps would use a selection of formats to state the intent of
      the file.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      bdd58d98
    • R
      Make the handling of output and input formats consistent · d303b9d8
      Richard Levitte 提交于
      Most of all, we needed to sort out which ones are binary and which
      ones are text, and make sure they are treated accordingly and
      consistently so
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      d303b9d8