1. 11 5月, 2018 1 次提交
  2. 20 3月, 2018 1 次提交
  3. 14 3月, 2018 1 次提交
  4. 30 11月, 2017 1 次提交
  5. 19 10月, 2017 1 次提交
  6. 17 7月, 2017 1 次提交
    • R
      Standardize apps use of -rand, etc. · 3ee1eac2
      Rich Salz 提交于
      Standardized the -rand flag and added a new one:
          -rand file...
                  Always reads the specified files
          -writerand file
                  Always writes to the file on exit
      
      For apps that use a config file, the RANDFILE config parameter reads
      the file at startup (to seed the RNG) and write to it on exit if
      the -writerand flag isn't used.
      
      Ensured that every app that took -rand also took -writerand, and
      made sure all of that agreed with all the documentation.
      
      Fix error reporting in write_file and -rand
      Reviewed-by: NPaul Dale <paul.dale@oracle.com>
      (Merged from https://github.com/openssl/openssl/pull/3862)
      3ee1eac2
  7. 07 7月, 2017 1 次提交
  8. 17 6月, 2017 1 次提交
  9. 09 6月, 2017 2 次提交
  10. 06 6月, 2017 2 次提交
  11. 28 4月, 2017 1 次提交
  12. 25 4月, 2017 1 次提交
  13. 30 3月, 2017 1 次提交
  14. 29 3月, 2017 1 次提交
  15. 18 3月, 2017 1 次提交
  16. 03 3月, 2017 2 次提交
  17. 22 2月, 2017 1 次提交
  18. 08 2月, 2017 1 次提交
  19. 23 11月, 2016 1 次提交
  20. 13 11月, 2016 1 次提交
  21. 02 11月, 2016 1 次提交
  22. 27 10月, 2016 1 次提交
  23. 21 9月, 2016 1 次提交
  24. 15 9月, 2016 1 次提交
  25. 08 6月, 2016 1 次提交
  26. 21 5月, 2016 1 次提交
  27. 20 5月, 2016 1 次提交
  28. 19 5月, 2016 1 次提交
  29. 03 5月, 2016 1 次提交
  30. 03 4月, 2016 1 次提交
    • V
      Move peer chain security checks into x509_vfy.c · fbb82a60
      Viktor Dukhovni 提交于
      A new X509_VERIFY_PARAM_set_auth_level() function sets the
      authentication security level.  For verification of SSL peers, this
      is automatically set from the SSL security level.  Otherwise, for
      now, the authentication security level remains at (effectively) 0
      by default.
      
      The new "-auth_level" verify(1) option is available in all the
      command-line tools that support the standard verify(1) options.
      
      New verify(1) tests added to check enforcement of chain signature
      and public key security levels.  Also added new tests of enforcement
      of the verify_depth limit.
      
      Updated documentation.
      Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
      fbb82a60
  31. 20 3月, 2016 1 次提交
  32. 08 3月, 2016 1 次提交
  33. 24 2月, 2016 1 次提交
  34. 11 2月, 2016 1 次提交
  35. 06 2月, 2016 2 次提交
  36. 15 12月, 2015 1 次提交
    • M
      Fix s_server problem with no-ec · 8caab744
      Matt Caswell 提交于
      s_server was trying to set the ECDH curve when no-ec was defined. This also
      highlighted the fact that the -no_ecdhe option to s_server is broken, and
      doesn't make any sense any more (ECDHE is on by default and the only way it
      can be disabled is through the cipherstring). Therefore this commit removes
      the option.
      Reviewed-by: NKurt Roeckx <kurt@openssl.org>
      8caab744