1. 11 2月, 2016 1 次提交
  2. 10 2月, 2016 6 次提交
  3. 09 2月, 2016 9 次提交
    • A
      GH646: Update help for s_server command. · 32eabe34
      A J Mohan Rao 提交于
          * added missing help option messages
          * ecdh_single option is removed as it is a no-op and not an option
          supported in earlier versions
          * ssl_ctx_security_debug() was invoked before ctx check for NULL
          * trusted_first option can be removed, as it is always enabled in 1.1.
          But not removed the option, require confirmation.
      Signed-off-by: NRich Salz <rsalz@openssl.org>
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      32eabe34
    • M
      Updates for auto init/deinit review comments · 35d8fa56
      Matt Caswell 提交于
      Fixes for the auto-init/deinit code based on review comments
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      35d8fa56
    • M
      Get the apps to use auto-init/de-init · b9f75707
      Matt Caswell 提交于
      Clean up the apps so that we make use of the new auto-init/de-init feature.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      b9f75707
    • M
      Auto init/deinit libcrypto · 7b9f8f7f
      Matt Caswell 提交于
      This builds on the previous commit to auto initialise/deinitialise
      libcrypto.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      7b9f8f7f
    • V
      Suppress DANE TLSA reflection when verification fails · c0a445a9
      Viktor Dukhovni 提交于
      As documented both SSL_get0_dane_authority() and SSL_get0_dane_tlsa()
      are expected to return a negative match depth and nothing else when
      verification fails.  However, this only happened when verification
      failed during chain construction.  Errors in verification of the
      constructed chain did not have the intended effect on these functions.
      
      This commit updates the functions to check for verify_result ==
      X509_V_OK, and no longer erases any accumulated match information
      when chain construction fails.  Sophisticated developers can, with
      care, use SSL_set_verify_result(ssl, X509_V_OK) to "peek" at TLSA
      info even when verification fail.  They must of course first check
      and save the real error, and restore the original error as quickly
      as possible.  Hiding by default seems to be the safer interface.
      
      Introduced X509_V_ERR_DANE_NO_MATCH code to signal failure to find
      matching TLSA records.  Previously reported via X509_V_ERR_CERT_UNTRUSTED.
      
      This also changes the "-brief" output from s_client to include
      verification results and TLSA match information.
      
      Mentioned session resumption in code example in SSL_CTX_dane_enable(3).
      Also mentioned that depths returned are relative to the verified chain
      which is now available via SSL_get0_verified_chain(3).
      
      Added a few more test-cases to danetest, that exercise the new
      code.
      
      Resolved thread safety issue in use of static buffer in
      X509_verify_cert_error_string().
      
      Fixed long-stating issue in apps/s_cb.c which always sets verify_error
      to either X509_V_OK or "chain to long", code elsewhere (e.g.
      s_time.c), seems to expect the actual error.  [ The new chain
      construction code is expected to correctly generate "chain
      too long" errors, so at some point we need to drop the
      work-arounds, once SSL_set_verify_depth() is also fixed to
      propagate the depth to X509_STORE_CTX reliably. ]
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      c0a445a9
    • D
      fix various formatting issues · c9018bdf
      Dr. Stephen Henson 提交于
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      c9018bdf
    • D
      Use new names · 762ee38d
      Dr. Stephen Henson 提交于
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      762ee38d
    • D
      Use accessors in pkcs12 app. · 776cfa9b
      Dr. Stephen Henson 提交于
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      776cfa9b
    • D
      Deprecate undocumented SSL_cache_hit(). · b577fd0b
      Dr. Stephen Henson 提交于
      Deprecate undocumented SSL_cache_hit(). Make SSL_session_reused() into a
      real function.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      b577fd0b
  4. 08 2月, 2016 2 次提交
  5. 07 2月, 2016 2 次提交
    • A
      commands help cleanup · 6755ff11
      A J Mohan Rao 提交于
      opt_valtype 0 is same as '-' while printing cmd usage
      asn1parse/ca/ciphers help cleanup
      Signed-off-by: NRich Salz <rsalz@openssl.org>
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      6755ff11
    • R
      Enhance and clear the support of linker flags · c86ddbe6
      Richard Levitte 提交于
      Some time ago, we had a ex_libs configuration setting that could be
      divided into lflags and ex_libs.  These got divided in two settings,
      lflags and ex_libs, and the former was interpreted to be general
      linking flags.
      
      Unfortunately, that conclusion wasn't entirely accurate.  Most of
      those linking were meant to end up in a very precise position on the
      linking command line, just before the spec of libraries the linking
      depends on.
      
      Back to the drawing board, we're diving things further, now having
      lflags, which are linking flags that aren't depending on command line
      position, plib_lflags, which are linking flags that should show up just
      before the spec of libraries to depend on, and finally ex_libs, which
      is the spec of extra libraries to depend on.
      
      Also, documentation is changed in Configurations/README.  This was
      previously forgotten.
      Reviewed-by: NKurt Roeckx <kurt@openssl.org>
      c86ddbe6
  6. 06 2月, 2016 6 次提交
  7. 05 2月, 2016 1 次提交
  8. 04 2月, 2016 5 次提交
    • D
      Add ec -check option · 7565cbc4
      Dr. Stephen Henson 提交于
      Reviewed-by: NAndy Polyakov <appro@openssl.org>
      7565cbc4
    • D
      RT2887: Add more packet and handshake types · 7429b398
      Daniel Black 提交于
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      7429b398
    • R
      Refactoring BIO: Adapt s_client and s_server · ab69ac00
      Richard Levitte 提交于
      s_socket.c gets brutally cleaned out and now consists of only two
      functions, one for client and the other for server.  They both handle
      AF_INET, AF_INET6 and additionally AF_UNIX where supported.  The rest
      is just easy adaptation.
      
      Both s_client and s_server get the new flags -4 and -6 to force the
      use of IPv4 or IPv6 only.
      
      Also, the default host "localhost" in s_client is removed.  It's not
      certain that this host is set up for both IPv4 and IPv6.  For example,
      Debian has "ip6-localhost" as the default hostname for [::1].  The
      better way is to default |host| to NULL and rely on BIO_lookup() to
      return a BIO_ADDRINFO with the appropriate loopback address for IPv4
      or IPv6 as indicated by the |family| parameter.
      Reviewed-by: NKurt Roeckx <kurt@openssl.org>
      ab69ac00
    • R
      Refactoring BIO: Adapt BIO_s_datagram and all that depends on it · d858c876
      Richard Levitte 提交于
      The control commands that previously took a struct sockaddr * have
      been changed to take a BIO_ADDR * instead.
      Reviewed-by: NKurt Roeckx <kurt@openssl.org>
      d858c876
    • E
      RT3234: disable compression · dc5744cb
      Emilia Kasper 提交于
      CRIME protection: disable compression by default, even if OpenSSL is
      compiled with zlib enabled. Applications can still enable compression by
      calling SSL_CTX_clear_options(ctx, SSL_OP_NO_COMPRESSION), or by using
      the SSL_CONF library to configure compression. SSL_CONF continues to
      work as before:
      
      SSL_CONF_cmd(ctx, "Options", "Compression") enables compression.
      
      SSL_CONF_cmd(ctx, "Options", "-Compression") disables compression (now
      no-op by default).
      
      The command-line switch has changed from -no_comp to -comp.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      dc5744cb
  9. 03 2月, 2016 1 次提交
  10. 01 2月, 2016 5 次提交
  11. 31 1月, 2016 1 次提交
  12. 30 1月, 2016 1 次提交
    • R
      Fix opt_imax() call · 33254e1c
      Richard Levitte 提交于
      Not all architectures have a time_t defined the same way.  To make
      sure we get the same result, we need to cast &checkoffset to (intmax_t *)
      and make sure that intmax_t is defined somehow.
      
      To make really sure we don't pass a variable with the wrong size down
      to opt_imax(), we use a temporary intmax_t.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      33254e1c