| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
| |
|
| |
|
|
|
|
| |
input and ok tb@
|
|
|
|
| |
ok tb@
|
|
|
|
|
|
| |
With input from inoguchi@
ok beck@ inoguchi@
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
ok and comments from jsing@
|
|
|
|
| |
ok inoguchi@, tb@
|
| |
|
| |
|
|
|
|
| |
ok jmc@
|
|
|
|
|
|
|
| |
- Remove space between '*' and pointer variable.
- Add function prototype.
- Move callback function to bottom.
- Move typedef struct to up.
|
|
|
|
| |
ok tb@
|
| |
|
| |
|
|
|
|
| |
suggestions and ok beck@ jsing@ tb@
|
|
|
|
|
|
|
|
| |
callback, so its mode is not used to update the ssl's mode, it
seems more appropriate to clear the SSL_MODE_AUTO_RETRY flag on
it as well.
ok jsing
|
|
|
|
|
|
|
| |
default. To avoid hanging on a blocking read, we need to clear the
SSL_MODE_AUTO_RETRY flag in the s_client and the s_server.
ok beck inoguchi jsing
|
|
|
|
|
|
|
|
|
| |
It can be triggered by sending a line to stdin while no connection
is open and then connecting a client. The first SSL_write() fails,
sends SSL_ERROR_WANT_* and then causes a segfault deep down in the
tls stack when accessing &(buf[-1]).
ok beck inoguchi
|
|
|
|
|
|
| |
(gurn) copies getsockname() retrieves a truncated result and 14 bytes of
stack garbage get copied onwards.
ok tb
|
|
|
|
| |
ok jsing@ tb@
|
|
|
|
|
|
|
| |
- Add -tls1_3 and -no_tls1_3 to openssl(1) s_server
- Stop using version pinned methods, instead setting the min and max protocol versions
ok jsing@ tb@
|
|
|
|
|
|
| |
While we are in here also make it notice if time values in a certificate
are bogus, and say so in the output.
ok bcook@ jsing@
|
|
|
|
|
|
|
| |
debug is on. otherwise, just retry. Fixes problems this creates in
testing.
ok jsing@ tb@
|
|
|
|
|
|
|
|
| |
Add TLSv1.3 extension type, and sort by the definition order in tls1.h.
This helps that openssl(1) s_server and s_client with -tlsextdebug
displays the TLS extension type instead of "unknown".
ok beck@ jsing@ tb@
|
|
|
|
|
|
|
|
|
|
| |
Set initial value to variable 'p' and 'pending'.
Reported and fix requested from leonklingele by GitHub pull request.
https://github.com/libressl-portable/portable/issues/577
https://github.com/libressl-portable/openbsd/pull/114
ok bcook@ jsing@ tb@
|
|
|
|
|
|
|
|
| |
document it and deprecate "openssl s_server -named_curve".
While here, fix the error in the synopsis for "openssl s_client -groups"
and use unified argument naming and similar wording like
in SSL_CTX_set1_groups_list(3).
OK jsing@
|
|
|
|
|
|
|
|
|
|
| |
This allows supported EC groups to be configured, which will also control
which TLSv1.3 key shares we'll accept. While here, deprecate the rather
useless -named_curve option, which is effectively the same as -groups with
a single group. Also stop setting a single default group of P-256 via
SSL_CTX_set_tmp_ecdh() - use the library defaults instead.
ok beck@ inoguchi@
|
|
|
|
|
|
|
|
|
| |
Allow semantic lookup by manually tagging sections (.Sh) for which no
automatic tagging has been implemented; this thereby also eliminates false
positives such that ":tx509<Enter>" now jumps to the X509 section.
feedback remi inoguchi schwarze
OK tb
|
|
|
|
|
|
|
|
|
| |
Also stop using version pinned methods, instead setting the min and max
protocol versions.
Requested by inoguchi@
ok inoguchi@ tb@
|
|
|
|
| |
similar to what deraadt@ recently did in other manual pages.
|
|
|
|
| |
will attempt again later, now that there is new regress
|
| |
|
|
|
|
| |
ok beck jsing
|
|
|
|
|
|
| |
SSL_pending implementation is correct.
annoying jsing@
|
|
|
|
| |
ok beck@
|
|
|
|
|
|
| |
peeks data before reading, compares to subsequent read.
ok jsing@
|
|
|
|
|
|
|
|
|
|
| |
hash value on the nc(1) server command line, the netcat server must
use the TLS context of the accepted socket for verification. As
the listening socket was used instead, the verification was always
successful.
If the peer provides a certificate, there must be a hash. Make the
hash verification fail safe.
OK tb@
|
|
|
|
|
|
|
| |
the file system as it has to connect to the UNIX domain client
socket. The path of the latter is determined dynamically. Instead
add a restrictive pledge(2) after connect(2).
OK tb@
|
|
|
|
|
|
| |
path name of the socket. This avoids bad errors from getnameinfo(3).
Use the same error check for both calls to getnameinfo(3).
OK millert@ tb@
|
|
|
|
| |
ok jsing@
|
|
|
|
|
| |
md, to hint that it might not always be the case (e.g. if dealing with
files from a different version of the tool). ok tb@
|
|
|
|
|
|
|
|
| |
changed from md5 to sha256. Update manual to reflect that.
From Fabio Scotoni
ok jmc
|
|
|
|
| |
ok and comments jmc@
|
|
|
|
|
|
| |
Checking return value of sk_.*_new_null().
ok beck@ jsing@
|
|
|
|
| |
ok jmc@
|