1. 10 3月, 2016 1 次提交
  2. 08 3月, 2016 1 次提交
    • T
      GH787: Fix ALPN · 817cd0d5
      Todd Short 提交于
      * Perform ALPN after the SNI callback; the SSL_CTX may change due to
        that processing
      * Add flags to indicate that we actually sent ALPN, to properly error
        out if unexpectedly received.
      * clean up ssl3_free() no need to explicitly clear when doing memset
      * document ALPN functions
      Signed-off-by: NRich Salz <rsalz@openssl.org>
      Reviewed-by: NEmilia Käsper <emilia@openssl.org>
      817cd0d5
  3. 04 3月, 2016 1 次提交
  4. 26 2月, 2016 1 次提交
  5. 23 2月, 2016 1 次提交
  6. 19 2月, 2016 1 次提交
  7. 17 2月, 2016 1 次提交
  8. 15 2月, 2016 1 次提交
  9. 11 2月, 2016 2 次提交
  10. 09 2月, 2016 1 次提交
  11. 07 2月, 2016 1 次提交
  12. 06 2月, 2016 1 次提交
  13. 04 2月, 2016 1 次提交
    • E
      RT3234: disable compression · dc5744cb
      Emilia Kasper 提交于
      CRIME protection: disable compression by default, even if OpenSSL is
      compiled with zlib enabled. Applications can still enable compression by
      calling SSL_CTX_clear_options(ctx, SSL_OP_NO_COMPRESSION), or by using
      the SSL_CONF library to configure compression. SSL_CONF continues to
      work as before:
      
      SSL_CONF_cmd(ctx, "Options", "Compression") enables compression.
      
      SSL_CONF_cmd(ctx, "Options", "-Compression") disables compression (now
      no-op by default).
      
      The command-line switch has changed from -no_comp to -comp.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      dc5744cb
  14. 03 2月, 2016 1 次提交
  15. 30 1月, 2016 2 次提交
  16. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  17. 21 1月, 2016 1 次提交
  18. 14 1月, 2016 2 次提交
  19. 13 1月, 2016 1 次提交
  20. 21 11月, 2015 1 次提交
  21. 25 9月, 2015 1 次提交
    • M
      Add support for -no-CApath and -no-CAfile options · 2b6bcb70
      Matt Caswell 提交于
      For those command line options that take the verification options
      -CApath and -CAfile, if those options are absent then the default path or
      file is used instead. It is not currently possible to specify *no* path or
      file at all. This change adds the options -no-CApath and -no-CAfile to
      specify that the default locations should not be used to all relevant
      applications.
      Reviewed-by: NAndy Polyakov <appro@openssl.org>
      2b6bcb70
  22. 18 9月, 2015 1 次提交
  23. 11 9月, 2015 1 次提交
  24. 06 9月, 2015 4 次提交
  25. 27 8月, 2015 1 次提交
  26. 11 8月, 2015 1 次提交
  27. 30 7月, 2015 1 次提交
  28. 16 7月, 2015 1 次提交
  29. 16 6月, 2015 1 次提交
    • R
      RT2547: Tighten perms on generated privkey files · 3b061a00
      Rich Salz 提交于
      When generating a private key, try to make the output file be readable
      only by the owner.  Put it in CHANGES file since it might be noticeable.
      
      Add "int private" flag to apps that write private keys, and check that it's
      set whenever we do write a private key.  Checked via assert so that this
      bug (security-related) gets fixed.  Thanks to Viktor for help in tracing
      the code-paths where private keys are written.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      3b061a00
  30. 29 5月, 2015 2 次提交
  31. 23 5月, 2015 1 次提交
  32. 21 5月, 2015 1 次提交
  33. 01 5月, 2015 1 次提交