aboutsummaryrefslogtreecommitdiff
path: root/openssl/src/ssl
Commit message (Collapse)AuthorAgeFilesLines
...
* Fix detect_invalid_ipv4 test on OSXManuel Schölling2015-04-061-1/+1
| | | | Looks like the invalid IP 254.254.254.254 is fine for OSX
* Fix OSX related compiler error and correct travis OpenSSL setupManuel Schölling2015-04-061-3/+3
|
* Adjust sin_len/sin6_len for non-linux platformsManuel Schölling2015-04-062-2/+3
| | | | | | Fixing errors for platforms you don't own is really annoying ;) Fixing errors
* Fix portability issue and typoManuel Schölling2015-04-063-23/+68
|
* Fix travis test setup for DTLSManuel Schölling2015-04-061-8/+23
|
* Add DTLSv1 and DTLSv1.2 supportManuel Schölling2015-04-063-94/+187
|
* Add connect() support for UDP socketsManuel Schölling2015-04-063-19/+360
|
* Fix errors in tests (SslVerifyPeer -> SSL_VERIFY_PEER)Manuel Schölling2015-04-031-16/+16
|
* Use raw pointers instead of ptr::UniqueManuel Schölling2015-04-031-6/+6
|
* Return Result<(),SslError> instead of Option<SslError>Manuel Schölling2015-04-032-22/+22
|
* Add SslContext::add_extra_chain_cert()Manuel Schölling2015-04-031-0/+9
|
* Add ability to load private keys from files and use raw keys and ↵Manuel Schölling2015-04-032-1/+49
| | | | certificates for SslContext
* Change SslVerifyMode to bitflags and add SSL_VERIFY_FAIL_IF_NO_PEER_CERTManuel Schölling2015-04-032-20/+24
| | | | | SslVerifyMode was changed to bitflags to allow for bitwise operations like (SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT).
* Stabilize openssl!Steven Fackler2015-04-021-37/+42
|
* Remove two featuresSteven Fackler2015-04-021-5/+4
|
* rustup: changes to io::ErrorSean McArthur2015-04-022-3/+3
|
* Remove a bunch of use of core featureSteven Fackler2015-03-301-17/+32
|
* Fix verify data free functionSteven Fackler2015-03-291-16/+22
| | | | | | | | | Turns out this is called with a null pointer if you never set the data which didn't end up doing anything until the recent zeroing drop changes. Also use a map of indexes since statics in generic functions don't monomorphize
* Fix error with current rust nightlyFlorian Hartwig2015-03-291-1/+1
|
* Fix npn featureSteven Fackler2015-03-252-0/+10
|
* Fix deprecation warningsSteven Fackler2015-03-253-9/+7
|
* openssl: Add tests for server-side NPNMarko Lalic2015-03-231-0/+41
|
* openssl: Add tests for client-side NPNMarko Lalic2015-03-231-2/+74
| | | | | An additional `openssl` process is spun up before the tests are ran. This process has NPN enabled with some default protocols.
* openssl: Advertise NPN protocols for server socketsMarko Lalic2015-03-231-0/+33
| | | | | | | | If a server socket is created with a context on which the `set_npn_protocols` method has been called, during TLS connection establishment, the server will advertise the list of protocols given to the method, in case the client indicates that it supports the NPN TLS extension.
* openssl: Add methods to get the protocol selected by NPNMarko Lalic2015-03-231-0/+33
| | | | | | | The method is added to the `Ssl` struct, since this is how the native OpenSSL API works. It is also added to the `SslStream` convenience struct, since the `Ssl` instance that it wraps is not public and clients may want to check which protocol is in use on a particular SSL stream.
* openssl: Implement client-side NPN protocol selectionMarko Lalic2015-03-231-1/+34
| | | | | | | | | | | | | After the `set_npn_protocols` method of the `SslContext` struct is called, any future TLS connections established with this context will perform NPN negotiation. The chosen protocol is the one with the highest priority in the server's protocol list that is also in the client's protocol list. (This is the default behavior provided by OpenSSL's `SSL_select_next_proto` function.) If there is no overlap between the two lists, no error is raised.
* openssl: Add method for setting protocols to be used in NPNMarko Lalic2015-03-231-0/+53
| | | | | | | | | | | | A new method `set_npn_protocols` is added to the `SslContext` struct, when the `npn` feature is enabled. The method takes a list of protocols that are supported by the peer. These protocols will be used during Next Protocol Negotiation. The method saves the given list within the extra data of the OpenSSL Context structure, so that the list can be referred to later on by the callbacks invoked during TLS connection establishment.
* Fix warningsSteven Fackler2015-03-101-1/+1
|
* Merge pull request #172 from reaperhulk/add-ssl-ctx-set-get-optionsSteven Fackler2015-03-072-0/+81
|\ | | | | add support for SSL_CTX_set_options and SSL_CTX_get_options
| * add support for SSL_CTX_clear_options and use bitflagsPaul Kehrer2015-02-232-11/+66
| |
| * add support for SSL_CTX_set_options and SSL_CTX_get_optionsPaul Kehrer2015-02-222-0/+26
| | | | | | | | fixes #168
* | Added try_clone to SslStream for SslStream<TcpStream>.Aaron Weiss2015-03-021-0/+12
| |
* | Convert to new IO.Steven Fackler2015-02-243-89/+63
|/
* Update depreciated codeKevin Butler2015-02-203-13/+13
|
* Unique<T> now derefs to *mut TKevin Butler2015-02-201-26/+27
|
* Rename method for claritySteven Fackler2015-02-161-2/+2
|
* Properly handle errors in writeSteven Fackler2015-02-161-18/+29
|
* Deal with openssl errors in readSteven Fackler2015-02-162-4/+26
| | | | | | | I'm not sure of a great way to generate this case in a test, unfortunately. Closes #157
* rustup to current masterRobin Gloster2015-02-121-24/+24
|
* Move docs to this repo and auto buildSteven Fackler2015-02-073-0/+972