aboutsummaryrefslogtreecommitdiff
path: root/openssl/src/ssl
Commit message (Collapse)AuthorAgeFilesLines
* Revert "Move proto version accessors to SslContextRef"Steven Fackler2018-05-201-52/+44
|
* Move proto version accessors to SslContextRefSteven Fackler2018-05-201-44/+52
| | | | Add a Derf impl for SslContextBuilder so existing use still works.
* Improve error Display implsSteven Fackler2018-05-201-8/+9
|
* Support ALPN on libresslSteven Fackler2018-05-203-17/+21
| | | | Closes #690
* Overhaul openssl cfgsSteven Fackler2018-05-205-459/+438
| | | | Also expose hostname verification on libressl
* Support min/max version in LibreSSLSteven Fackler2018-05-192-16/+18
| | | | | Their implementations of the accessors don't behave expected with no bounds, so we ignore those bits of the tests.
* Merge Ssl impl blocksSteven Fackler2018-05-121-57/+55
|
* Clean up SSL callbacksSteven Fackler2018-05-122-68/+76
| | | | | Also add an Arc to avoid a weird use after free edge case if a callback changes a callback.
* Disable tests that talk to Google on LibreSSL 2.5.0Steven Fackler2018-05-122-1/+5
| | | | | They're flickering, and I'm assuming it's just because that version is so old.
* Change SslContext callback handlingSteven Fackler2018-05-122-240/+151
| | | | Use the existing infrastructure!
* Fix base version for min/max proto accessorsSteven Fackler2018-05-092-32/+49
| | | | Closes #911
* Expose SslSession <-> DER conversionBenjamin Saunders2018-04-291-0/+23
|
* Some misc cleanupSteven Fackler2018-04-271-60/+81
|
* Merge pull request #858 from Ralith/stateless-apiSteven Fackler2018-03-313-41/+331
|\ | | | | Introduce SslStreamBuilder
| * Add test for stateless connectionBenjamin Saunders2018-03-281-2/+119
| |
| * Introduce SslStreamBuilderBenjamin Saunders2018-03-281-34/+114
| |
| * Update to OpenSSL 1.1.1-pre3Benjamin Saunders2018-03-282-5/+98
| |
* | Clean up a couple of holdovers from old featuresSteven Fackler2018-03-292-14/+10
|/
* Remove version-specific featuresSteven Fackler2018-03-194-143/+125
| | | | Closes #852
* Expose additional cipher and digest accessorsBenjamin Saunders2018-03-161-0/+26
|
* Add a Sync + Send bound to the custom ext typeSteven Fackler2018-03-112-38/+76
| | | | | It's stored inside of the Ssl, so this is probably tecnically necessarly?
* Merge branch 'master' into custom-extensionsSteven Fackler2018-03-111-0/+3
|\
| * Add one more set of implsSteven Fackler2018-03-101-0/+3
| |
* | Generic custom extension add fn return typeBenjamin Saunders2018-03-103-30/+30
| |
* | High-level API for OpenSSL 1.1.1 custom extension supportBenjamin Saunders2018-03-093-0/+207
|/
* Add SslOptions::ENABLE_MIDDLEBOX_COMPATBenjamin Saunders2018-03-031-0/+7
|
* Add min/max protocol version supportSteven Fackler2018-02-252-4/+133
|
* Restore error stack in cookie callbackSteven Fackler2018-02-251-7/+12
|
* Expose cookie generate/verify callback settersBenjamin Saunders2018-02-252-0/+95
|
* Merge pull request #850 from sfackler/put-errorSteven Fackler2018-02-241-12/+12
|\ | | | | Add the ability to push errors back onto the error stack.
| * Add the ability to push errors back onto the error stack.Steven Fackler2018-02-241-12/+12
| |
* | Add RFC 5705 supportSteven Fackler2018-02-232-2/+72
|/
* Actually add version stuffSteven Fackler2018-02-211-2/+16
|
* Inline connector constantsSteven Fackler2018-02-211-17/+15
|
* Don't special case 1.0.1Steven Fackler2018-02-211-7/+0
| | | | It appears that 1.0.1's defaults are actually okay.
* Update SslConnector cipher listSteven Fackler2018-02-201-6/+11
| | | | | | | | Based off of python/cpython#3532, we use OpenSSL's default cipher list and turn of things we don't like. This can't be used with 1.0.1, however, which had a poor default set. There, we use the old defaults, with the bits that aren't implemented in 1.0.1 removed (namely TLSv1.3 suites and ChaCha).
* Add some debugging-related bindingsSteven Fackler2018-02-172-23/+88
|
* Add SSL_version bindingSteven Fackler2018-02-171-2/+40
|
* Fix session cloningSteven Fackler2018-02-171-1/+1
|
* Bind remove and get session callbacksSteven Fackler2018-02-162-1/+101
|
* SSL session callbacks have always been aroundSteven Fackler2018-02-163-12/+2
|
* Doc tweakSteven Fackler2018-02-151-1/+1
|
* Add more session cache supportSteven Fackler2018-02-153-3/+148
|
* Tweak featuresSteven Fackler2018-02-143-29/+56
| | | | We should keep the version features totally separate for now.
* Fix tests for TLS 1.3Steven Fackler2018-02-141-2/+5
| | | | | Google yells at you when using TLS 1.3 without SNI by sending a bogus self-signed cert!
* OpenSSL 1.1.1 supportSteven Fackler2018-02-133-31/+57
|
* tests: if server failed to start, print exit code instead of timing outStepan Koltsov2018-01-241-1/+4
| | | | | | | | | | | | | | | | | | | | | | | ``` % cargo +stable test --lib ssl::test::test_connect_with_alpn_successful_single_match --features=v102 Finished dev [unoptimized + debuginfo] target(s) in 0.0 secs Running /Users/nga/devel/left/rust-openssl/target/debug/deps/openssl-a38e12a3527f6932 running 1 test test ssl::test::test_connect_with_alpn_successful_single_match ... FAILED failures: ---- ssl::test::test_connect_with_alpn_successful_single_match stdout ---- thread 'ssl::test::test_connect_with_alpn_successful_single_match' panicked at 'server exited: exit code: 1', src/ssl/test.rs:91:24 note: Run with `RUST_BACKTRACE=1` for a backtrace. failures: ssl::test::test_connect_with_alpn_successful_single_match test result: FAILED. 0 passed; 1 failed; 0 ignored; 0 measured; 159 filtered out ```
* Add setters to ConnectConfigurationSteven Fackler2018-01-111-3/+13
|
* Add from conversionSteven Fackler2018-01-101-0/+9
| | | | This is needed for tokio-openssl
* Adjust the SNI callbackSteven Fackler2018-01-062-19/+30
| | | | Brings it more in line with how the raw callback is structured.