1. 09 8月, 2014 1 次提交
  2. 15 7月, 2014 2 次提交
  3. 07 7月, 2014 2 次提交
  4. 04 7月, 2014 1 次提交
  5. 01 7月, 2014 1 次提交
  6. 20 6月, 2014 1 次提交
  7. 09 5月, 2014 1 次提交
    • G
      s_client/s_server: support unix domain sockets · a9351320
      Geoff Thorpe 提交于
      The "-unix <path>" argument allows s_server and s_client to use a unix
      domain socket in the filesystem instead of IPv4 ("-connect", "-port",
      "-accept", etc). If s_server exits gracefully, such as when "-naccept"
      is used and the requested number of SSL/TLS connections have occurred,
      then the domain socket file is removed. On ctrl-C, it is likely that
      the stale socket file will be left over, such that s_server would
      normally fail to restart with the same arguments. For this reason,
      s_server also supports an "-unlink" option, which will clean up any
      stale socket file before starting.
      
      If you have any reason to want encrypted IPC within an O/S instance,
      this concept might come in handy. Otherwise it just demonstrates that
      there is nothing about SSL/TLS that limits it to TCP/IP in any way.
      
      (There might also be benchmarking and profiling use in this path, as
      unix domain sockets are much lower overhead than connecting over local
      IP addresses).
      Signed-off-by: NGeoff Thorpe <geoff@openssl.org>
      a9351320
  8. 05 5月, 2014 1 次提交
  9. 28 3月, 2014 3 次提交
    • D
      Security callback debug print out. · e03c5b59
      Dr. Stephen Henson 提交于
      Add a debugging security callback option to s_client/s_server. This will
      print out each security parameter as it is accepted or rejected.
      e03c5b59
    • D
      Auto DH support. · 09599b52
      Dr. Stephen Henson 提交于
      Add auto DH parameter support. This is roughly equivalent to the
      ECDH auto curve selection but for DH. An application can just call
      
      SSL_CTX_set_auto_dh(ctx, 1);
      
      and appropriate DH parameters will be used based on the size of the
      server key.
      
      Unlike ECDH there is no way a peer can indicate the range of DH parameters
      it supports. Some peers cannot handle DH keys larger that 1024 bits for
      example. In this case if you call:
      
      SSL_CTX_set_auto_dh(ctx, 2);
      
      Only 1024 bit DH parameters will be used.
      
      If the server key is 7680 bits or more in size then 8192 bit DH parameters
      will be used: these will be *very* slow.
      
      The old export ciphersuites aren't supported but those are very
      insecure anyway.
      09599b52
    • D
      Add -no_resumption_on_reneg to SSL_CONF. · f0ef019d
      Dr. Stephen Henson 提交于
      (cherry picked from commit 1f44dac24d1cb752b1a06be9091bb03a88a8598e)
      f0ef019d
  10. 06 2月, 2014 3 次提交
  11. 27 1月, 2014 1 次提交
  12. 14 11月, 2013 1 次提交
  13. 25 9月, 2013 1 次提交
  14. 12 9月, 2013 1 次提交
  15. 06 9月, 2013 6 次提交
  16. 18 8月, 2013 1 次提交
  17. 22 7月, 2013 1 次提交
  18. 13 6月, 2013 1 次提交
  19. 09 4月, 2013 1 次提交
    • D
      Dual DTLS version methods. · c6913eeb
      Dr. Stephen Henson 提交于
      Add new methods DTLS_*_method() which support both DTLS 1.0 and DTLS 1.2 and
      pick the highest version the peer supports during negotiation.
      
      As with SSL/TLS options can change this behaviour specifically
      SSL_OP_NO_DTLSv1 and SSL_OP_NO_DTLSv1_2.
      c6913eeb
  20. 26 3月, 2013 1 次提交
    • D
      Provisional DTLS 1.2 support. · c3b344e3
      Dr. Stephen Henson 提交于
      Add correct flags for DTLS 1.2, update s_server and s_client to handle
      DTLS 1.2 methods.
      
      Currently no support for version negotiation: i.e. if client/server selects
      DTLS 1.2 it is that or nothing.
      c3b344e3
  21. 30 12月, 2012 1 次提交
  22. 27 12月, 2012 1 次提交
  23. 12 12月, 2012 1 次提交
  24. 07 12月, 2012 1 次提交
  25. 06 12月, 2012 1 次提交
  26. 03 12月, 2012 1 次提交
  27. 26 11月, 2012 1 次提交
  28. 24 11月, 2012 1 次提交
  29. 22 11月, 2012 1 次提交