1. 23 3月, 2015 1 次提交
  2. 17 3月, 2015 1 次提交
  3. 11 3月, 2015 1 次提交
  4. 10 3月, 2015 1 次提交
  5. 05 3月, 2015 1 次提交
  6. 27 2月, 2015 1 次提交
  7. 25 2月, 2015 1 次提交
  8. 06 2月, 2015 1 次提交
  9. 31 1月, 2015 1 次提交
  10. 29 1月, 2015 1 次提交
  11. 28 1月, 2015 1 次提交
  12. 27 1月, 2015 1 次提交
  13. 24 1月, 2015 1 次提交
  14. 22 1月, 2015 2 次提交
  15. 13 1月, 2015 1 次提交
  16. 05 1月, 2015 1 次提交
  17. 19 12月, 2014 1 次提交
  18. 18 12月, 2014 1 次提交
  19. 04 12月, 2014 1 次提交
  20. 03 12月, 2014 1 次提交
  21. 20 11月, 2014 2 次提交
  22. 09 8月, 2014 2 次提交
  23. 15 7月, 2014 2 次提交
  24. 07 7月, 2014 2 次提交
  25. 04 7月, 2014 1 次提交
  26. 01 7月, 2014 1 次提交
  27. 20 6月, 2014 1 次提交
  28. 09 5月, 2014 1 次提交
    • G
      s_client/s_server: support unix domain sockets · a9351320
      Geoff Thorpe 提交于
      The "-unix <path>" argument allows s_server and s_client to use a unix
      domain socket in the filesystem instead of IPv4 ("-connect", "-port",
      "-accept", etc). If s_server exits gracefully, such as when "-naccept"
      is used and the requested number of SSL/TLS connections have occurred,
      then the domain socket file is removed. On ctrl-C, it is likely that
      the stale socket file will be left over, such that s_server would
      normally fail to restart with the same arguments. For this reason,
      s_server also supports an "-unlink" option, which will clean up any
      stale socket file before starting.
      
      If you have any reason to want encrypted IPC within an O/S instance,
      this concept might come in handy. Otherwise it just demonstrates that
      there is nothing about SSL/TLS that limits it to TCP/IP in any way.
      
      (There might also be benchmarking and profiling use in this path, as
      unix domain sockets are much lower overhead than connecting over local
      IP addresses).
      Signed-off-by: NGeoff Thorpe <geoff@openssl.org>
      a9351320
  29. 05 5月, 2014 1 次提交
  30. 28 3月, 2014 3 次提交
    • D
      Security callback debug print out. · e03c5b59
      Dr. Stephen Henson 提交于
      Add a debugging security callback option to s_client/s_server. This will
      print out each security parameter as it is accepted or rejected.
      e03c5b59
    • D
      Auto DH support. · 09599b52
      Dr. Stephen Henson 提交于
      Add auto DH parameter support. This is roughly equivalent to the
      ECDH auto curve selection but for DH. An application can just call
      
      SSL_CTX_set_auto_dh(ctx, 1);
      
      and appropriate DH parameters will be used based on the size of the
      server key.
      
      Unlike ECDH there is no way a peer can indicate the range of DH parameters
      it supports. Some peers cannot handle DH keys larger that 1024 bits for
      example. In this case if you call:
      
      SSL_CTX_set_auto_dh(ctx, 2);
      
      Only 1024 bit DH parameters will be used.
      
      If the server key is 7680 bits or more in size then 8192 bit DH parameters
      will be used: these will be *very* slow.
      
      The old export ciphersuites aren't supported but those are very
      insecure anyway.
      09599b52
    • D
      Add -no_resumption_on_reneg to SSL_CONF. · f0ef019d
      Dr. Stephen Henson 提交于
      (cherry picked from commit 1f44dac24d1cb752b1a06be9091bb03a88a8598e)
      f0ef019d
  31. 06 2月, 2014 3 次提交