| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
input from bcook@, ok and comments from tb@
|
|
|
|
| |
ok and input from tb@
|
|
|
|
| |
ok jsing@ tb@
|
| |
|
|
|
|
|
|
| |
diff from robert scheck
discussed with and tweaked by sthen
|
|
|
|
| |
Reminded by inoguchi jsing
|
|
|
|
|
|
|
|
|
|
| |
Currently, SSL_is_dtls exists in both libssl and apps.c,
and one in libssl is guarded by LIBRESSL_INTERNAL and not exposed yet.
This causes portable build broke with openssl(1) and optionstest.
To solve this temporarily, rename SSL_is_dtls by apps.h.
This temporary renaming will be removed when the SSL_is_dtls() is exposed.
ok jsing@
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Apply new option handling to openssl(1) x509.
To handle incremental order value, using newly added OPTION_ORDER.
I left the descriptions for -CAform, -inform, and -outform as it was,
for now. These description would be fixed.
And digest option handler could be consolidated to one between
some subcommands in the future.
ok and comments from tb@,
and "I'd move forward with your current plan." from jsing@
|
|
|
|
|
|
|
|
|
|
| |
To handle incremental order value, added new option type OPTION_ORDER.
openssl(1) x509 requires this option handling, since,
- -CA and -signkey require to set both filename and incremental 'num'.
- -dates requires to set two variables in a row, startdate and enddate.
and this couldn't be solved by OPTION_FLAG_ORD.
ok tb@ and "I'd move forward with your current plan." from jsing@
|
|
|
|
| |
ok inoguchi@ tb@
|
| |
|
|
|
|
| |
ok inoguchi@ tb@
|
|
|
|
|
|
| |
Noted by Steffen Ullrich.
ok tb@
|
|
|
|
| |
ok inoguchi jmc kn
|
| |
|
| |
|
|
|
|
| |
lines
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
returns 1. verify.c's cb() ignores a bunch of things to display as
much info as possible. Thus, check the error code on the store ctx
as well, similar to OpenSSL commit d9e309a6 (old licence).
This makes openssl verify error on expired certs, at least with the
legacy verify code.
While here, fix a number of style issues, simplify and plug a leak.
ok inoguchi
|
|
|
|
| |
(audio.4 tweaked from that submitted)
|
|
|
|
|
|
| |
and testing purposes.
ok beck inoguchi jsing
|
| |
|
|
|
|
|
|
|
| |
Otherwise each run of the s_client leaks 16k of memory. This hurts
in interactive mode.
ok inoguchi jsing
|
|
|
|
|
|
|
|
|
|
|
| |
While OCSP uses HTTP/1.0 where a host header is optional, some widely
used OCSP responders will return 400 bad request if it is missing. Add
such a header unless it's already provided in the user's custom headers.
OpenSSL did something similar in ff4a9394a23 and 76e0cd12f68
(both commits are under the old license)
ok inoguchi
|
|
|
|
| |
ok inoguchi@ tb@ deraadt@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
On OpenBSD it's necessary to use the eopenssl11 s_server with either -4
or -6 to choose an address family. I often want to try something with an
OpenSSL server and then test the same thing with LibreSSL or vice versa.
Adding and removing -4s on top of editing the command is annoying and
distracting.
This commits teaches our s_server to ignore -4 and -6 and thus makes
commands that work with eopenssl11 more likely to work with openssl(1).
These options are deliberately undocumented and don't show up in help
listings.
ok bcook inoguchi jsing
|
| |
|
| |
|
| |
|
|
|
|
| |
input and ok tb@
|
|
|
|
| |
ok tb@
|
|
|
|
|
|
| |
With input from inoguchi@
ok beck@ inoguchi@
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
ok and comments from jsing@
|
|
|
|
| |
ok inoguchi@, tb@
|
| |
|
| |
|
|
|
|
| |
ok jmc@
|
|
|
|
|
|
|
| |
- Remove space between '*' and pointer variable.
- Add function prototype.
- Move callback function to bottom.
- Move typedef struct to up.
|
|
|
|
| |
ok tb@
|
| |
|
| |
|
|
|
|
| |
suggestions and ok beck@ jsing@ tb@
|
|
|
|
|
|
|
|
| |
callback, so its mode is not used to update the ssl's mode, it
seems more appropriate to clear the SSL_MODE_AUTO_RETRY flag on
it as well.
ok jsing
|
|
|
|
|
|
|
| |
default. To avoid hanging on a blocking read, we need to clear the
SSL_MODE_AUTO_RETRY flag in the s_client and the s_server.
ok beck inoguchi jsing
|
|
|
|
|
|
|
|
|
| |
It can be triggered by sending a line to stdin while no connection
is open and then connecting a client. The first SSL_write() fails,
sends SSL_ERROR_WANT_* and then causes a segfault deep down in the
tls stack when accessing &(buf[-1]).
ok beck inoguchi
|