- 21 2月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 20 2月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 19 2月, 2014 1 次提交
-
-
由 Rob Stradling 提交于
Add the extension parser in the s_client, ocsp and x509 apps.
-
- 15 2月, 2014 2 次提交
-
-
由 Kurt Roeckx 提交于
If you use "-newkey rsa" it's supposed to read the default number of bits from the config file. However the value isn't used to generate the key, but it does print it's generating such a key. The set_keygen_ctx() doesn't call EVP_PKEY_CTX_set_rsa_keygen_bits() and you end up with the default set in pkey_rsa_init() (1024). Afterwards the number of bits gets read from the config file, but nothing is done with that anymore. We now read the config first and use the value from the config file when no size is given. PR: 2592
-
由 Scott Schaefer 提交于
-
- 13 2月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 06 2月, 2014 3 次提交
-
-
由 Ben Laurie 提交于
-
由 Scott Deboy 提交于
Whitespace fixes
-
由 Scott Deboy 提交于
If multiple TLS extensions are expected but not received, the TLS extension and supplemental data 'generate' callbacks are the only chance for the receive-side to trigger a specific TLS alert during the handshake. Removed logic which no-op'd TLS extension generate callbacks (as the generate callbacks need to always be called in order to trigger alerts), and updated the serverinfo-specific custom TLS extension callbacks to track which custom TLS extensions were received by the client, where no-ops for 'generate' callbacks are appropriate.
-
- 27 1月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 14 11月, 2013 1 次提交
-
-
由 Piotr Sikora 提交于
PR#3106
-
- 21 10月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Extend SSL_CONF to return command value types. Add certificate and key options. Update documentation.
-
- 07 10月, 2013 1 次提交
-
-
由 Ben Laurie 提交于
-
- 25 9月, 2013 2 次提交
-
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
Conflicts: apps/s_server.c
-
- 13 9月, 2013 1 次提交
-
-
由 Mat 提交于
-
- 12 9月, 2013 1 次提交
-
-
由 Scott Deboy 提交于
-
- 08 9月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Experimental support for encrypt then mac from draft-gutmann-tls-encrypt-then-mac-02.txt To enable it set the appropriate extension number (0x10 for the test server) using e.g. -DTLSEXT_TYPE_encrypt_then_mac=0x10 For non-compliant peers (i.e. just about everything) this should have no effect.
-
- 06 9月, 2013 10 次提交
-
-
由 Ben Laurie 提交于
-
由 Scott Deboy 提交于
Free generated supp data after handshake completion, add comment regarding use of num_renegotiations in TLS and supp data generation callbacks
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-
由 Scott Deboy 提交于
Add callbacks supporting generation and retrieval of supplemental data entries, facilitating RFC 5878 (TLS auth extensions) Removed prior audit proof logic - audit proof support was implemented using the generic TLS extension API Tests exercising the new supplemental data registration and callback api can be found in ssltest.c. Implemented changes to s_server and s_client to exercise supplemental data callbacks via the -auth argument, as well as additional flags to exercise supplemental data being sent only during renegotiation.
-
-
由 Ben Laurie 提交于
-
* Many XMPP servers are configured with multiple domains (virtual hosts) * In order to establish successfully the TLS connection you have to specify which virtual host you are trying to connect. * Test this, for example with :: * Fail: openssl s_client -connect talk.google.com:5222 -starttls xmpp * Works: openssl s_client -connect talk.google.com:5222 -starttls xmpp -xmpphost gmail.com
-
* When the host used in "-connect" is not what the remote XMPP server expects the server will return an error like this: <stream:error> <host-unknown xmlns='urn:ietf:params:xml:ns:xmpp-streams'/> </stream:error> * But the actual code will stay on the loop forever because the stop condition "/stream:features>" will never happen, * Make this more robust: The stop condition should be that BIO_read failed * Test if for example with :: openssl s_client -connect random.jabb3r.net:5222 -starttls xmpp
-
* Some XMPP Servers (OpenFire) use double quotes. * This makes s_client starttls work with this servers. * Tested with OpenFire servers from http://xmpp.net/ :: openssl s_client -connect coderollers.com:5222 -starttls xmpp
-
- 19 8月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
(cherry picked from commit 90e7f983b573c3f3c722a02db4491a1b1cd87e8c)
-
- 18 8月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 22 7月, 2013 2 次提交
-
-
由 Adam Langley 提交于
Conflicts: ssl/ssltest.c
-
由 Adam Langley 提交于
This change adds support for ALPN[1] in OpenSSL. ALPN is the IETF blessed version of NPN and we'll be supporting both ALPN and NPN for some time yet. [1] https://tools.ietf.org/html/draft-ietf-tls-applayerprotoneg-00 Conflicts: ssl/ssl3.h ssl/t1_lib.c
-
- 18 7月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 22 6月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Add support for custom public key parameters in the cms utility using the -keyopt switch. Works for -sign and also -encrypt if -recip is used.
-
- 13 6月, 2013 1 次提交
-
-
由 Trevor 提交于
Contributed by Trevor Perrin.
-
- 09 4月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Add new methods DTLS_*_method() which support both DTLS 1.0 and DTLS 1.2 and pick the highest version the peer supports during negotiation. As with SSL/TLS options can change this behaviour specifically SSL_OP_NO_DTLSv1 and SSL_OP_NO_DTLSv1_2.
-
- 28 3月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
(cherry picked from commit 944bc29f9004cf8851427ebfa83ee70b8399da57)
-
- 26 3月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Add correct flags for DTLS 1.2, update s_server and s_client to handle DTLS 1.2 methods. Currently no support for version negotiation: i.e. if client/server selects DTLS 1.2 it is that or nothing.
-
- 20 1月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
Submitted by: Pierre Delaage
-
- 18 1月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-