aboutsummaryrefslogtreecommitdiff
path: root/openssl/src
Commit message (Collapse)AuthorAgeFilesLines
* Write through to underlying stream for every write callSteven Fackler2015-04-303-11/+35
| | | | cc #208
* Add X509::public_key()Manuel Schölling2015-04-153-2/+22
|
* Fix nightly build issuesSteven Fackler2015-04-152-8/+1
|
* Fix non-dtls testsSteven Fackler2015-04-081-4/+3
|
* Fix dtls testsSteven Fackler2015-04-081-8/+8
| | | | There's a reason static mut is unsafe...
* Make connected_socket a dev-dependencyManuel Schölling2015-04-061-0/+1
|
* Adapt code for rust-1.0.0-betaManuel Schölling2015-04-061-9/+6
|
* Fix rebase errorsManuel Schölling2015-04-063-11/+2
|
* Add ability to load private keys from files and use raw keys and ↵Manuel Schölling2015-04-061-1/+1
| | | | | | | | certificates for SslContext Conflicts: openssl/src/crypto/pkey.rs openssl/src/ssl/tests.rs
* Add ability to load private keys from files and use raw keys and ↵Manuel Schölling2015-04-061-2/+5
| | | | | | | certificates for SslContext Conflicts: openssl/src/ssl/tests.rs
* Change SslContext::set_read_ahead(c_long) to SslContext::set_read_ahead(u32)Manuel Schölling2015-04-061-2/+2
|
* Debug halteproblem with testsManuel Schölling2015-04-061-2/+2
|
* Move connected_socket to its own crate and fix SSL_CTX_set_read_ahead()Manuel Schölling2015-04-064-355/+12
|
* Use latest OpenSSL version in travis tests and more verbose error message in ↵Manuel Schölling2015-04-061-2/+5
| | | | ConnectedSocket
* Fix detect_invalid_ipv4 test on OSXManuel Schölling2015-04-061-1/+1
| | | | Looks like the invalid IP 254.254.254.254 is fine for OSX
* Fix OSX related compiler error and correct travis OpenSSL setupManuel Schölling2015-04-061-3/+3
|
* Adjust sin_len/sin6_len for non-linux platformsManuel Schölling2015-04-062-2/+3
| | | | | | Fixing errors for platforms you don't own is really annoying ;) Fixing errors
* Fix portability issue and typoManuel Schölling2015-04-063-23/+68
|
* Fix travis test setup for DTLSManuel Schölling2015-04-061-8/+23
|
* Add DTLSv1 and DTLSv1.2 supportManuel Schölling2015-04-064-94/+189
|
* Add connect() support for UDP socketsManuel Schölling2015-04-063-19/+360
|
* Fix errors in tests (SslVerifyPeer -> SSL_VERIFY_PEER)Manuel Schölling2015-04-031-16/+16
|
* Use raw pointers instead of ptr::UniqueManuel Schölling2015-04-031-6/+6
|
* Return Result<(),SslError> instead of Option<SslError>Manuel Schölling2015-04-032-22/+22
|
* Add SslContext::add_extra_chain_cert()Manuel Schölling2015-04-032-1/+9
|
* Add ability to load private keys from files and use raw keys and ↵Manuel Schölling2015-04-034-1/+83
| | | | certificates for SslContext
* Change SslVerifyMode to bitflags and add SSL_VERIFY_FAIL_IF_NO_PEER_CERTManuel Schölling2015-04-032-20/+24
| | | | | SslVerifyMode was changed to bitflags to allow for bitwise operations like (SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT).
* Stabilize openssl!Steven Fackler2015-04-022-38/+42
|
* Fixup for betaAlex Crichton2015-04-026-13/+13
| | | | Add derive(Clone) and don't negate unsigned numbers
* Remove two featuresSteven Fackler2015-04-022-6/+5
|
* Fix doctest errorsSteven Fackler2015-04-021-2/+2
|
* rustup: changes to io::ErrorSean McArthur2015-04-024-8/+6
|
* Remove a bunch of use of core featureSteven Fackler2015-03-303-24/+37
|
* Remove unsafe_destructorSteven Fackler2015-03-302-2/+1
|
* Fix verify data free functionSteven Fackler2015-03-292-20/+27
| | | | | | | | | Turns out this is called with a null pointer if you never set the data which didn't end up doing anything until the recent zeroing drop changes. Also use a map of indexes since statics in generic functions don't monomorphize
* Fix error with current rust nightlyFlorian Hartwig2015-03-291-1/+1
|
* Fix npn featureSteven Fackler2015-03-252-0/+10
|
* Fix deprecation warningsSteven Fackler2015-03-258-42/+37
|
* Update to rust masterAlex Crichton2015-03-251-2/+2
|
* openssl: Add tests for server-side NPNMarko Lalic2015-03-231-0/+41
|
* openssl: Add tests for client-side NPNMarko Lalic2015-03-231-2/+74
| | | | | An additional `openssl` process is spun up before the tests are ran. This process has NPN enabled with some default protocols.
* openssl: Advertise NPN protocols for server socketsMarko Lalic2015-03-231-0/+33
| | | | | | | | If a server socket is created with a context on which the `set_npn_protocols` method has been called, during TLS connection establishment, the server will advertise the list of protocols given to the method, in case the client indicates that it supports the NPN TLS extension.
* openssl: Add methods to get the protocol selected by NPNMarko Lalic2015-03-231-0/+33
| | | | | | | The method is added to the `Ssl` struct, since this is how the native OpenSSL API works. It is also added to the `SslStream` convenience struct, since the `Ssl` instance that it wraps is not public and clients may want to check which protocol is in use on a particular SSL stream.
* openssl: Implement client-side NPN protocol selectionMarko Lalic2015-03-231-1/+34
| | | | | | | | | | | | | After the `set_npn_protocols` method of the `SslContext` struct is called, any future TLS connections established with this context will perform NPN negotiation. The chosen protocol is the one with the highest priority in the server's protocol list that is also in the client's protocol list. (This is the default behavior provided by OpenSSL's `SSL_select_next_proto` function.) If there is no overlap between the two lists, no error is raised.
* openssl: Add method for setting protocols to be used in NPNMarko Lalic2015-03-231-0/+53
| | | | | | | | | | | | A new method `set_npn_protocols` is added to the `SslContext` struct, when the `npn` feature is enabled. The method takes a list of protocols that are supported by the peer. These protocols will be used during Next Protocol Negotiation. The method saves the given list within the extra data of the OpenSSL Context structure, so that the list can be referred to later on by the callbacks invoked during TLS connection establishment.
* Merge pull request #187 from manuels/x509_signSteven Fackler2015-03-211-1/+10
|\ | | | | Add X509Generator::sign()
| * Add X509Generator::sign()Manuel Schölling2015-03-211-1/+10
| |
* | Fix doc testSteven Fackler2015-03-211-1/+1
|/
* Fix warnings and build issuesSteven Fackler2015-03-202-3/+2
|
* Fix warningsSteven Fackler2015-03-103-4/+4
|