1. 08 3月, 2016 1 次提交
  2. 04 3月, 2016 1 次提交
  3. 03 3月, 2016 1 次提交
  4. 29 2月, 2016 1 次提交
    • M
      Refactor the async wait fd logic · ff75a257
      Matt Caswell 提交于
      Implementation experience has shown that the original plan for async wait
      fds was too simplistic. Originally the async logic created a pipe internally
      and user/engine code could then get access to it via API calls. It is more
      flexible if the engine is able to create its own fd and provide it to the
      async code.
      
      Another issue is that there can be a lot of churn in the fd value within
      the context of (say) a single SSL connection leading to continually adding
      and removing fds from (say) epoll. It is better if we can provide some
      stability of the fd value across a whole SSL connection. This is
      problematic because an engine has no concept of an SSL connection.
      
      This commit refactors things to introduce an ASYNC_WAIT_CTX which acts as a
      proxy for an SSL connection down at the engine layer.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      ff75a257
  5. 28 2月, 2016 1 次提交
    • J
      RT4354: Add some cross-refs · e0b5108c
      Jeffrey Walton 提交于
      Stack Overflow has a number of questions related to mutual authentication,
      the client and its certificate. Those visiting the man pages for functions
      like SSL_CTX_use_certificate and SSL_CTX_load_verify_locations don't
      receive the benefit of a cross reference to SSL_CTX_set_client_CA_list.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      e0b5108c
  6. 27 2月, 2016 1 次提交
  7. 24 2月, 2016 1 次提交
  8. 19 2月, 2016 2 次提交
    • R
      Remove outdated DEBUG flags. · d63a5e5e
      Rich Salz 提交于
      Add -DBIO_DEBUG to --strict-warnings.
      Remove comments about outdated debugging ifdef guards.
      Remove md_rand ifdef guarding an assert; it doesn't seem used.
      Remove the conf guards in conf_api since we use OPENSSL_assert, not assert.
      For pkcs12 stuff put OPENSSL_ in front of the macro name.
      Merge TLS_DEBUG into SSL_DEBUG.
      Various things just turned on/off asserts, mainly for checking non-NULL
      arguments, which is now removed: camellia, bn_ctx, crypto/modes.
      Remove some old debug code, that basically just printed things to stderr:
        DEBUG_PRINT_UNKNOWN_CIPHERSUITES, DEBUG_ZLIB, OPENSSL_RI_DEBUG,
        RL_DEBUG, RSA_DEBUG, SCRYPT_DEBUG.
      Remove OPENSSL_SSL_DEBUG_BROKEN_PROTOCOL.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      d63a5e5e
    • N
      Fix typo in SSL_CTX_set_msg_callback docs · 37b6fd83
      Neel Goyal 提交于
      Change `SSL_get_msg_callback_arg` to `SSL_set_msg_callback_arg`
      Signed-off-by: NRich Salz <rsalz@akamai.com>
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      37b6fd83
  9. 17 2月, 2016 1 次提交
  10. 11 2月, 2016 2 次提交
  11. 10 2月, 2016 1 次提交
  12. 09 2月, 2016 3 次提交
    • M
      Updates for auto init/deinit review comments · 35d8fa56
      Matt Caswell 提交于
      Fixes for the auto-init/deinit code based on review comments
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      35d8fa56
    • M
      Provide documentation for auto-init/auto-deinit · 8b75603c
      Matt Caswell 提交于
      Provide some man pages for auto-init/deinit. Also update the INSTALL
      documentation for information on the new Configure options implemented as
      part of this.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      8b75603c
    • V
      Suppress DANE TLSA reflection when verification fails · c0a445a9
      Viktor Dukhovni 提交于
      As documented both SSL_get0_dane_authority() and SSL_get0_dane_tlsa()
      are expected to return a negative match depth and nothing else when
      verification fails.  However, this only happened when verification
      failed during chain construction.  Errors in verification of the
      constructed chain did not have the intended effect on these functions.
      
      This commit updates the functions to check for verify_result ==
      X509_V_OK, and no longer erases any accumulated match information
      when chain construction fails.  Sophisticated developers can, with
      care, use SSL_set_verify_result(ssl, X509_V_OK) to "peek" at TLSA
      info even when verification fail.  They must of course first check
      and save the real error, and restore the original error as quickly
      as possible.  Hiding by default seems to be the safer interface.
      
      Introduced X509_V_ERR_DANE_NO_MATCH code to signal failure to find
      matching TLSA records.  Previously reported via X509_V_ERR_CERT_UNTRUSTED.
      
      This also changes the "-brief" output from s_client to include
      verification results and TLSA match information.
      
      Mentioned session resumption in code example in SSL_CTX_dane_enable(3).
      Also mentioned that depths returned are relative to the verified chain
      which is now available via SSL_get0_verified_chain(3).
      
      Added a few more test-cases to danetest, that exercise the new
      code.
      
      Resolved thread safety issue in use of static buffer in
      X509_verify_cert_error_string().
      
      Fixed long-stating issue in apps/s_cb.c which always sets verify_error
      to either X509_V_OK or "chain to long", code elsewhere (e.g.
      s_time.c), seems to expect the actual error.  [ The new chain
      construction code is expected to correctly generate "chain
      too long" errors, so at some point we need to drop the
      work-arounds, once SSL_set_verify_depth() is also fixed to
      propagate the depth to X509_STORE_CTX reliably. ]
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      c0a445a9
  13. 08 2月, 2016 1 次提交
  14. 07 2月, 2016 1 次提交
  15. 06 2月, 2016 5 次提交
  16. 04 2月, 2016 1 次提交
    • E
      RT3234: disable compression · dc5744cb
      Emilia Kasper 提交于
      CRIME protection: disable compression by default, even if OpenSSL is
      compiled with zlib enabled. Applications can still enable compression by
      calling SSL_CTX_clear_options(ctx, SSL_OP_NO_COMPRESSION), or by using
      the SSL_CONF library to configure compression. SSL_CONF continues to
      work as before:
      
      SSL_CONF_cmd(ctx, "Options", "Compression") enables compression.
      
      SSL_CONF_cmd(ctx, "Options", "-Compression") disables compression (now
      no-op by default).
      
      The command-line switch has changed from -no_comp to -comp.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      dc5744cb
  17. 01 2月, 2016 1 次提交
  18. 27 1月, 2016 1 次提交
  19. 26 1月, 2016 1 次提交
  20. 23 1月, 2016 1 次提交
  21. 17 1月, 2016 2 次提交
  22. 12 1月, 2016 1 次提交
  23. 11 1月, 2016 1 次提交
  24. 10 1月, 2016 1 次提交
  25. 08 1月, 2016 1 次提交
    • R
      mem functions cleanup · bbd86bf5
      Rich Salz 提交于
      Only two macros CRYPTO_MDEBUG and CRYPTO_MDEBUG_ABORT to control this.
      If CRYPTO_MDEBUG is not set, #ifdef out the whole debug machinery.
              (Thanks to Jakob Bohm for the suggestion!)
      Make the "change wrapper functions" be the only paradigm.
      Wrote documentation!
      Format the 'set func' functions so their paramlists are legible.
      Format some multi-line comments.
      Remove ability to get/set the "memory debug" functions at runtme.
      Remove MemCheck_* and CRYPTO_malloc_debug_init macros.
      Add CRYPTO_mem_debug(int flag) function.
      Add test/memleaktest.
      Rename CRYPTO_malloc_init to OPENSSL_malloc_init; remove needless calls.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      bbd86bf5
  26. 07 1月, 2016 1 次提交
  27. 06 1月, 2016 1 次提交
  28. 02 1月, 2016 2 次提交
  29. 28 12月, 2015 1 次提交
  30. 24 12月, 2015 1 次提交