| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
|
|
|
|
|
| |
hash value on the nc(1) server command line, the netcat server must
use the TLS context of the accepted socket for verification. As
the listening socket was used instead, the verification was always
successful.
If the peer provides a certificate, there must be a hash. Make the
hash verification fail safe.
OK tb@
|
|
|
|
|
|
|
| |
the file system as it has to connect to the UNIX domain client
socket. The path of the latter is determined dynamically. Instead
add a restrictive pledge(2) after connect(2).
OK tb@
|
|
|
|
|
|
| |
path name of the socket. This avoids bad errors from getnameinfo(3).
Use the same error check for both calls to getnameinfo(3).
OK millert@ tb@
|
|
|
|
| |
ok jsing@
|
|
|
|
|
| |
md, to hint that it might not always be the case (e.g. if dealing with
files from a different version of the tool). ok tb@
|
|
|
|
|
|
|
|
| |
changed from md5 to sha256. Update manual to reflect that.
From Fabio Scotoni
ok jmc
|
|
|
|
| |
ok and comments jmc@
|
|
|
|
|
|
| |
Checking return value of sk_.*_new_null().
ok beck@ jsing@
|
|
|
|
| |
ok jmc@
|
|
|
|
|
|
|
|
| |
- Remove typedef and use 'struct cms_key_param' instead
- Check return value of sk_X509_push and sk_OPENSSL_STRING_push
- Add a blank line to separate variable declarations from code
comments from jsing@
|
|
|
|
|
|
|
| |
This provides rsa_padding_mode:oaep for cms -encrypt,
and rsa_padding_mode:pss for cms -sign.
ok jsing@
|
|
|
|
| |
noticed by jsing and beck, ok tedu
|
|
|
|
|
|
|
| |
to handle tls_shutdown correctly if using TLS, doing tls_shutdown
correctly if we are using the -N flag
ok sthen@
|
|
|
|
|
|
|
| |
- Check NCONF_new() return value
- Remove unnecessary 'i'
comments from jsing@
|
|
|
|
|
|
| |
First step of adding -addext option to openssl(1) req from OpenSSL 1.1.1d.
ok jsing@
|
|
|
|
| |
From Lucas AT sexy DOT is. OK job@ kn@
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
This was cleaned up after cms went to the attic.
|
| |
|
|
|
|
|
|
|
|
|
| |
Just like pfctl(8)'s -N, this flag only avoid DNS;
"nc -vz ::1 socks" still works.
Fix documentation by copying pfctl's wording.
OK deraadt
|
|
|
|
| |
OK kn@
|
|
|
|
|
|
|
| |
for tls, since the socket is shut down without calling tls_close().
Since nc appears to have a problem with this in other shutdown() cases
I am simply going to bake a new diff for this.
noticed by bluhm@.
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
goes away. This allows for using nc in cases where the network server
will no longer expect anything after eof, instead of hanging waiting
for more input from our end.
Additionaly, shut down if tls is in use if either side of the socket
goes away, since we higher level TLS operations (tls_read and write)
will require the socket to be both readable and writable as we can
get TLS_WANT_POLLIN or TLS_WANT_POLLOUT on either operation.
deraadt@ buying it. found by sthen@
|
|
|
|
|
|
|
|
| |
openssl s_server has an arbitrary read vulnerability on Windows when run with
the -WWW or -HTTP options, due to an incomplete path check logic. Thanks to
Jobert Abma for reporting.
ok tb@
|
|
|
|
|
|
|
| |
on html or groff. the solution, to replace the non-standard .nr macros
with a hang list, was provided by ingo - thanks!
ok schwarze
|
| |
|
| |
|
|
|
|
| |
suggested from jsing@
|
|
|
|
|
|
|
|
| |
Adapt openssl(1) dgst command to new option handling.
Added dgst_options struct and option handlers, and replaced for-if-strcmp
handling with options_parse().
ok bcook@ jsing@
|
|
|
|
|
|
| |
to misread.
as per suggestion by and OK deraadt@
|
|
|
|
| |
ok schwarze@
|
|
|
|
|
| |
Diff from Alexander Koeppe format_c -AT- online -DOT- de, thanks.
ok deraadt@
|
|
|
|
|
|
|
|
| |
First step to adapt openssl(1) dgst command to new option handling.
There is no functional changes by this diff, and just moving variables
into dgst_config struct.
ok bcook@
|
|
|
|
|
|
| |
- Add a space before 'export_end:'
- Remove space after '*'
- Wrap lines by 80 columns
|
|
|
|
| |
ok bcook@ tb@
|
| |
|
|
|
|
| |
from Steven Roberts
|
| |
|
|
|
|
|
|
|
|
| |
Adapt openssl(1) pkcs12 command to new option handling.
Added pkcs12_options struct, and replaced for-if-strcmp handling with
options_parse().
ok and comments jsing@
|
|
|
|
|
|
|
|
|
| |
First step to adapt openssl(1) pkcs12 command to new option handling.
There is no functional changes by this diff, and just moving variables into
pkcs12_config struct.
I still keep long lines more than 80 for this review to minimize diffs.
ok jsing@ tb@
|
| |
|
|
|
|
|
| |
As we did in other openssl sub command, move up option handlers above option
definition struct. No functional changes and just move up and remove prototype.
|
|
|
|
|
|
| |
- s/outputed/outputted/
- s/trused/trusted/
- add der as argument and describe pem is the default
|
|
|
|
|
|
| |
This moves them from .data to .data.rel.ro
ok deraadt@ inoguchi@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Add undocumented options below.
-alpn, -cert2, -certform, -dcertform, -dkeyform, -dpass, -dtls1, -key2,
-keyform, -keymatexport, -keymatexportlen, -mtu, -named_curve, -no_cache,
-no_ecdhe, -no_ticket, -pass, -port, -servername, -servername_fatal,
-status, -status_timeout, -status_url, -status_verbose, -timeout,
-tlsextdebug, -use_srtp, -verify_return_error
- Remove -hack, -psk and -psk_hint since not exist in source code.
I didn't add these 5 options since these were no-op.
-chain, -legacy_renegotiation, -nextprotoneg, -no_comp, -no_ssl2
This option was removed from manual in the past.
-no_ssl3
ok and suggestions from jmc@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Add undocumented options below.
-alpn, -certform, -dtls1, -host, -keyform, -keymatexport, -keymatexportlen,
-legacy_server_connect, -mtu, -no_ign_eof, -no_legacy_server_connect, -pass
-port, -serverpref, -sess_in, -sess_out, -status, -timeout, -use_srtp,
-verify_return_error
- Remove -psk and -psk_identity since not exist in source code.
I didn't add these 4 options since these were no-op.
-nextprotoneg, -legacy_renegotiation, -no_comp, -no_ssl2
This option was removed from manual in the past.
-no_ssl3
ok jmc@
|