aboutsummaryrefslogtreecommitdiff
path: root/openssl/Cargo.toml
Commit message (Collapse)AuthorAgeFilesLines
...
* Release v0.7.8Steven Fackler2016-03-181-4/+4
|
* Release v0.7.7Steven Fackler2016-03-171-4/+4
|
* Bump bitflags to 0.4Kalita Alexey2016-02-281-1/+1
|
* Release v0.7.6Steven Fackler2016-02-101-4/+4
|
* Exclude test directory from packageSteven Fackler2016-01-221-0/+1
|
* Release v0.7.5Steven Fackler2016-01-221-4/+4
|
* Add stream panic propagation behind a nightly feature gateSteven Fackler2016-01-111-0/+2
|
* Release v0.7.4Steven Fackler2015-12-181-4/+4
|
* Release v0.7.3Steven Fackler2015-12-171-4/+4
|
* Release v0.7.2Steven Fackler2015-12-151-2/+2
|
* Merge pull request #320 from uasi/add-variations-of-pbkdf2Steven Fackler2015-12-151-0/+1
|\ | | | | Add PBKDF2-HMAC-SHA256 and -SHA512 functions
| * Put pbkdf2_hmac_{256,512}() behind feature gateTomoki Aonuma2015-12-101-0/+1
| | | | | | | | PKCS5_PBKDF2_HMAC is not available with openssl-0.9.8 on os x
* | Replace SslStream implementation!Steven Fackler2015-12-091-0/+4
|/
* Release v0.7.1Steven Fackler2015-11-281-4/+4
|
* Release v0.7.0Steven Fackler2015-11-161-4/+4
|
* Split stuff requiring a shim out to a separate crateSteven Fackler2015-11-161-5/+3
|
* Bump ws2_32-sys versionSteven Fackler2015-11-161-1/+1
|
* Switch to libc 0.2Steven Fackler2015-11-161-1/+3
|
* Fix feature gated sslv3Steven Fackler2015-11-161-0/+1
|
* Get nonblocking tests working on OSX/WindowsAlex Crichton2015-10-221-2/+1
|
* Nonblocking streams support.Jamie Turner2015-10-201-0/+1
|
* Release v0.6.7Steven Fackler2015-10-141-3/+3
|
* Release v0.6.6Steven Fackler2015-10-051-3/+3
|
* Add SSL::set_ecdh_auto()Frank Denis2015-09-251-0/+1
| | | | | This sets automatic curve selection and enables ECDH support. Requires LibreSSL or OpenSSL >= 1.0.2, so behind a feature gate.
* Enable testing on Windows via AppVeyorAlex Crichton2015-09-221-3/+1
| | | | | | | This abolishes the test.sh script which spawns a bunch of `openssl` instances to instead run/manage the binary in-process (providing more isolation to boot). The tests have been updated accordingly and the `connected_socket` dependency was also dropped in favor of `net2` as it the former doesn't work on Windows.
* Merge pull request #259 from jedisct1/dhSteven Fackler2015-09-011-0/+1
|\ | | | | Add support for DHE for forward secrecy
| * Add support for set_tmp_dh() and RFC5114 DH parameters for forward secrecy.Frank Denis2015-08-311-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | rust-openssl didn't support forward secrecy at all. This adds support for DHE, by exposing set_tmp_dh() as well as the RFC5114 parameters, which are conveniently exposed since OpenSSL 1.0.2. With OpenSSL >= 1.0.2, and the rfc5114 feature gate, enabling DHE is as simple as (here for 2048-bit MODP group with 256-bit prime order subgroup): use openssl::dh::DH; let dh = DH::get_2048_256().unwrap(); ctx.set_tmp_dh(dh).unwrap(); With OpenSSL < 1.0.2, DH::from_params() can be used to manually specify the DH parameters (here for 2048-bit MODP group with 256-bit prime order subgroup): use openssl::bn::BigNum; use openssl::dh::DH; let p = BigNum::from_hex_str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unwrap(); let g = BigNum::from_hex_str("3FB32C9B73134D0B2E77506660EDBD484CA7B18F21EF205407F4793A1A0BA12510DBC15077BE463FFF4FED4AAC0BB555BE3A6C1B0C6B47B1BC3773BF7E8C6F62901228F8C28CBB18A55AE31341000A650196F931C77A57F2DDF463E5E9EC144B777DE62AAAB8A8628AC376D282D6ED3864E67982428EBC831D14348F6F2F9193B5045AF2767164E1DFC967C1FB3F2E55A4BD1BFFE83B9C80D052B985D182EA0ADB2A3B7313D3FE14C8484B1E052588B9B7D2BBD2DF016199ECD06E1557CD0915B3353BBB64E0EC377FD028370DF92B52C7891428CDC67EB6184B523D1DB246C32F63078490F00EF8D647D148D47954515E2327CFEF98C582664B4C0F6CC41659").unwrap(); let q = BigNum::from_hex_str("8CF83642A709A097B447997640129DA299B1A47D1EB3750BA308B0FE64F5FBD3").unwrap(); let dh = DH::from_params(p, g, q).unwrap(); ctx.set_tmp_dh(dh).unwrap();
* | Release v0.6.5Steven Fackler2015-08-311-2/+2
|/
* Added AES CTR-mode under feature flag.Allen Welkie2015-07-151-0/+1
|
* Release v0.6.4Steven Fackler2015-07-061-3/+3
|
* Unpin the bitflags version.Ms2ger2015-07-061-1/+1
| | | | | This dependency causes Servo to depend on multiple versions of the bitflags crate.
* ssl: support ALPNCody P Schafer2015-06-291-0/+1
| | | | | | | | | | Heavily based on the existing NPN wrapping code. Naming of public functions is identical to the NPN ones with `s/npn/alpn/` applied to prevent devs from needing to remember 2 names (and to let my copy the npn tests and perform the subistution to generate the apln tests). It might make sense to (at some point) use macros or a trait to cut down the duplication.
* Release v0.6.3Steven Fackler2015-06-251-3/+3
|
* Bump bitflags versionManish Goregaokar2015-06-021-1/+1
|
* Release v0.6.2v0.6.2Steven Fackler2015-05-011-2/+2
|
* Release v0.6.1v0.6.1Steven Fackler2015-04-221-2/+2
|
* Make connected_socket a dev-dependencyManuel Schölling2015-04-061-4/+3
|
* Fix rebase errorsManuel Schölling2015-04-061-4/+1
|
* Move connected_socket to its own crate and fix SSL_CTX_set_read_ahead()Manuel Schölling2015-04-061-2/+9
|
* Add DTLSv1 and DTLSv1.2 supportManuel Schölling2015-04-061-0/+1
|
* Add connect() support for UDP socketsManuel Schölling2015-04-061-1/+2
|
* Release v0.6.0v0.6.0Steven Fackler2015-04-051-2/+2
|
* Release v0.5.5v0.5.5Steven Fackler2015-04-031-2/+2
|
* Release v0.5.4v0.5.4Steven Fackler2015-04-021-2/+2
|
* Release v0.5.3v0.5.3Steven Fackler2015-03-291-2/+2
|
* Fix verify data free functionSteven Fackler2015-03-291-3/+2
| | | | | | | | | Turns out this is called with a null pointer if you never set the data which didn't end up doing anything until the recent zeroing drop changes. Also use a map of indexes since statics in generic functions don't monomorphize
* Release v0.5.2v0.5.2Steven Fackler2015-03-251-2/+2
|
* openssl: Add NPN crate featureMarko Lalic2015-03-231-0/+1
|
* Fix warnings and build issuesSteven Fackler2015-03-201-1/+1
|
* Merge pull request #172 from reaperhulk/add-ssl-ctx-set-get-optionsSteven Fackler2015-03-071-0/+3
|\ | | | | add support for SSL_CTX_set_options and SSL_CTX_get_options