aboutsummaryrefslogtreecommitdiff
path: root/openssl/src/ssl/tests
Commit message (Collapse)AuthorAgeFilesLines
* Rename ec_key to ecSteven Fackler2016-11-141-2/+2
|
* Be a bit more emphatic about the dangerSteven Fackler2016-11-121-3/+3
|
* Add a connect method that does not perform hostname verificationSteven Fackler2016-11-121-4/+32
| | | | The method name is intentionally painful to type to discourage its use
* Simplify test logic a bitSteven Fackler2016-11-121-10/+2
|
* Pick different cipher lists on 1.0.1 and 1.0.2Steven Fackler2016-11-121-2/+10
|
* Adjust cipher lists to work on older versionsSteven Fackler2016-11-121-4/+4
|
* Add SslRef::set_tmp_{ec,}dh_calbackSteven Fackler2016-11-121-0/+63
|
* Add SslContextBuilder::set_tmp_{ec,}dh_callbackSteven Fackler2016-11-121-0/+65
|
* Add basic X509_STORE accessSteven Fackler2016-11-121-0/+14
| | | | | | | There's more to do here, but this enabled addition of trusted CAs from X509 objects. Closes #394
* Drop rustc-serialize dependencySteven Fackler2016-11-091-5/+4
|
* Support client CA advertisementSteven Fackler2016-11-061-1/+10
|
* Rename accessorsSteven Fackler2016-11-051-2/+2
|
* Get rid of RefSteven Fackler2016-11-041-1/+1
| | | | | There's unfortunately a rustdoc bug that causes all methods implemented for any Ref<T> to be inlined in the deref methods section :(
* Remove an enumSteven Fackler2016-11-031-15/+13
|
* Update x509Steven Fackler2016-10-311-20/+3
|
* Expose SSL_MODEsSteven Fackler2016-10-301-8/+6
|
* Rename set_CA_fileSteven Fackler2016-10-301-16/+16
|
* Rename connectorsSteven Fackler2016-10-301-10/+10
|
* RustfmtSteven Fackler2016-10-301-36/+41
|
* Add a mozilla modern profileSteven Fackler2016-10-301-1/+33
|
* Rename nwe to mozilla_intermediateSteven Fackler2016-10-301-1/+2
|
* Pass SslMethod into constructorsSteven Fackler2016-10-301-4/+6
|
* Pull Curl's CA list for Windows testsSteven Fackler2016-10-291-5/+0
|
* Implement client and server connectorsSteven Fackler2016-10-291-8/+62
|
* Don't allow mutation of SslContextsSteven Fackler2016-10-251-96/+96
| | | | | | SslContext is reference counted and the various setter methods don't take out locks where necessary. Fix this by adding a builder for the context.
* Add a shutdown methodSteven Fackler2016-10-251-1/+33
|
* Fix Send + Sync-ness of SslStreamSteven Fackler2016-10-231-0/+8
|
* Flatten crypto moduleSteven Fackler2016-10-221-4/+4
|
* Fix X509StoreContextSteven Fackler2016-10-211-3/+3
|
* Convert X509VerifyParamRefSteven Fackler2016-10-211-4/+4
|
* Convert SslRefSteven Fackler2016-10-211-1/+1
|
* Redo SslStream constructionSteven Fackler2016-10-201-73/+53
| | | | | | SslStream is now constructed via methods on Ssl. You realistically want to create an Ssl for SNI and hostname verification so making it harder to construct a stream directly from an SslContext is a good thing.
* Don't ignore errors in NPN/ALPN logicSteven Fackler2016-10-181-14/+14
| | | | Closes #479
* Implement new feature setupSteven Fackler2016-10-171-12/+12
| | | | | | | | The basic idea here is that there is a feature for each supported OpenSSL version. Enabling multiple features represents support for multiple OpenSSL versions, but it's then up to you to check which version you link against (probably by depending on openssl-sys and making a build script similar to what openssl does).
* ssl error handling cleanupSteven Fackler2016-10-161-1/+1
|
* De-enumify SslMethodSteven Fackler2016-10-151-44/+39
|
* De-enumify message digestsSteven Fackler2016-10-151-6/+6
|
* Fix test_alpn_server_select_noneSteven Fackler2016-10-141-12/+34
| | | | | | | | | | | | In OpenSSL 1.1, a failure to negotiate a protocol is a fatal error, so fork that test. This also popped up an issue where we assumed all errors had library, function, and reason strings which is not necessarily the case. While we're in here, adjust the Display impl to match what OpenSSL prints out. Closes #465
* Enable hostname verification on 1.0.2Steven Fackler2016-10-141-4/+4
|
* Support hostname verificationSteven Fackler2016-10-141-0/+44
| | | | Closes #206
* Ignore DTLS tests on Windows/ARM for nowAlex Crichton2016-10-141-1/+4
| | | | cc #467
* Use stdlib logic for udpSteven Fackler2016-10-131-38/+2
|
* Fix windows for realSteven Fackler2016-10-131-1/+2
|
* Disable npn tests on < 1.0.2Steven Fackler2016-10-131-0/+2
| | | | s_client doesn't seem to support the required flag before then.
* Fix tests on windowsSteven Fackler2016-10-131-5/+6
|
* Reenable dtls testsSteven Fackler2016-10-131-26/+6
|
* Clean up featuresSteven Fackler2016-10-131-10/+5
|
* Ignore a test on OpenSSL 1.1.0Alex Crichton2016-10-121-0/+3
|
* Add support for OpenSSL 1.1.0Alex Crichton2016-10-121-60/+64
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit is relatively major refactoring of the `openssl-sys` crate as well as the `openssl` crate itself. The end goal here was to support OpenSSL 1.1.0, and lots of other various tweaks happened along the way. The major new features are: * OpenSSL 1.1.0 is supported * OpenSSL 0.9.8 is no longer supported (aka all OSX users by default) * All FFI bindings are verified with the `ctest` crate (same way as the `libc` crate) * CI matrixes are vastly expanded to include 32/64 of all platforms, more OpenSSL version coverage, as well as ARM coverage on Linux * The `c_helpers` module is completely removed along with the `gcc` dependency. * The `openssl-sys` build script was completely rewritten * Now uses `OPENSSL_DIR` to find the installation, not include/lib env vars. * Better error messages for mismatched versions. * Better error messages for failing to find OpenSSL on a platform (more can be done here) * Probing of OpenSSL build-time configuration to inform the API of the `*-sys` crate. * Many Cargo features have been removed as they're now enabled by default. As this is a breaking change to both the `openssl` and `openssl-sys` crates this will necessitate a major version bump of both. There's still a few more API questions remaining but let's hash that out on a PR! Closes #452
* Fix SslContext::add_extra_chain_certSteven Fackler2016-08-171-0/+8
| | | | | | | | | SSL_CTX_add_extra_chain_cert assumes ownership of the certificate, so the method really needs to take an X509 by value. Work around this by manually cloning the cert. This method has been around for over a year but I'm guessing nobody actually used it since it produces a nice double free into segfault!