1. 16 4月, 2016 1 次提交
  2. 05 4月, 2016 2 次提交
  3. 03 4月, 2016 1 次提交
    • V
      Move peer chain security checks into x509_vfy.c · fbb82a60
      Viktor Dukhovni 提交于
      A new X509_VERIFY_PARAM_set_auth_level() function sets the
      authentication security level.  For verification of SSL peers, this
      is automatically set from the SSL security level.  Otherwise, for
      now, the authentication security level remains at (effectively) 0
      by default.
      
      The new "-auth_level" verify(1) option is available in all the
      command-line tools that support the standard verify(1) options.
      
      New verify(1) tests added to check enforcement of chain signature
      and public key security levels.  Also added new tests of enforcement
      of the verify_depth limit.
      
      Updated documentation.
      Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
      fbb82a60
  4. 21 3月, 2016 1 次提交
  5. 10 3月, 2016 2 次提交
  6. 09 3月, 2016 2 次提交
  7. 12 2月, 2016 3 次提交
  8. 07 2月, 2016 1 次提交
  9. 20 1月, 2016 1 次提交
  10. 15 1月, 2016 1 次提交
  11. 06 1月, 2016 1 次提交
  12. 02 1月, 2016 1 次提交
    • V
      Protocol version selection and negotiation rewrite · 4fa52141
      Viktor Dukhovni 提交于
      The protocol selection code is now consolidated in a few consecutive
      short functions in a single file and is table driven.  Protocol-specific
      constraints that influence negotiation are moved into the flags
      field of the method structure.  The same protocol version constraints
      are now applied in all code paths.  It is now much easier to add
      new protocol versions without reworking the protocol selection
      logic.
      
      In the presence of "holes" in the list of enabled client protocols
      we no longer select client protocols below the hole based on a
      subset of the constraints and then fail shortly after when it is
      found that these don't meet the remaining constraints (suiteb, FIPS,
      security level, ...).  Ideally, with the new min/max controls users
      will be less likely to create "holes" in the first place.
      Reviewed-by: NKurt Roeckx <kurt@openssl.org>
      4fa52141
  13. 24 12月, 2015 1 次提交
  14. 17 12月, 2015 1 次提交
    • R
      Rename some BUF_xxx to OPENSSL_xxx · 7644a9ae
      Rich Salz 提交于
      Rename BUF_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
      to OPENSSL_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
      Add #define's for the old names.
      Add CRYPTO_{memdup,strndup}, called by OPENSSL_{memdup,strndup} macros.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      7644a9ae
  15. 06 12月, 2015 1 次提交
  16. 05 12月, 2015 3 次提交
  17. 17 11月, 2015 1 次提交
  18. 10 11月, 2015 1 次提交
  19. 30 10月, 2015 1 次提交
  20. 11 10月, 2015 1 次提交
  21. 03 10月, 2015 1 次提交
  22. 30 9月, 2015 1 次提交
    • D
      Fix no-stdio build · 984d6c60
      David Woodhouse 提交于
      Much related/similar work also done by
      Ivan Nestlerode <ivan.nestlerode@sonos.com>
      
         +Replace FILE BIO's with dummy ops that fail.
         +Include <stdio.h> for sscanf() even with no-stdio (since the declaration
          is there). We rely on sscanf() to parse the OPENSSL_ia32cap environment
          variable, since it can be larger than a 'long'. And we don't rely on the
          availability of strtoull().
         +Remove OPENSSL_stderr(); not used.
         +Make OPENSSL_showfatal() do nothing (currently without stdio there's
          nothing we can do).
         +Remove file-based functionality from ssl/. The function
          prototypes were already gone, but not the functions themselves.
         +Remove unviable conf functionality via SYS_UEFI
         +Add fallback definition of BUFSIZ.
         +Remove functions taking FILE * from header files.
         +Add missing DECLARE_PEM_write_fp_const
         +Disable X509_LOOKUP_hash_dir(). X509_LOOKUP_file() was already compiled out,
          so remove its prototype.
         +Use OPENSSL_showfatal() in CRYPTO_destroy_dynlockid().
         +Eliminate SRP_VBASE_init() and supporting functions. Users will need to
          build the verifier manually instead.
         +Eliminate compiler warning for unused do_pk8pkey_fp().
         +Disable TEST_ENG_OPENSSL_PKEY.
         +Disable GOST engine as is uses [f]printf all over the place.
         +Eliminate compiler warning for unused send_fp_chars().
      Signed-off-by: NRich Salz <rsalz@akamai.com>
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      984d6c60
  23. 17 9月, 2015 1 次提交
  24. 15 9月, 2015 1 次提交
    • D
      Fix PSK identity hint handling. · df6da24b
      Dr. Stephen Henson 提交于
      For server use a PSK identity hint value in the CERT structure which
      is inherited when SSL_new is called and which allows applications to
      set hints on a per-SSL basis. The previous version of
      SSL_use_psk_identity_hint tried (wrongly) to use the SSL_SESSION structure.
      
      PR#4039
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      df6da24b
  25. 06 9月, 2015 1 次提交
  26. 03 9月, 2015 1 次提交
  27. 01 9月, 2015 1 次提交
  28. 22 6月, 2015 4 次提交
  29. 23 5月, 2015 2 次提交