aboutsummaryrefslogtreecommitdiff
path: root/openssl/src
Commit message (Collapse)AuthorAgeFilesLines
* Release v0.7.6Steven Fackler2016-02-101-1/+1
|
* More deprecated function cleanupSteven Fackler2016-02-081-1/+1
|
* Stop using deprecated methodSteven Fackler2016-02-081-1/+2
|
* Rename Nid uid/UID to prevent breakageJoe Wilm2016-02-022-3/+5
|
* Fix Nid::UID valueJoe Wilm2016-02-022-1/+19
| | | | | Nid::UID (userId) previously held the value of Nid::uid (uniqueIdentifier).
* Revert "Revert "impl Clone for PKey and X509 by using their 'references' ↵Steven Fackler2016-01-313-0/+36
| | | | member""
* Fix PKey RSA constructorsSteven Fackler2016-01-302-31/+62
| | | | | | | | `set1` functions bump the object's refcount so we were previously leaking the RSA object. Split the decode from PEM part out to a method on RSA and use that in the PKey constructors. Also make RSA a pointer and actually free it.
* Revert "impl Clone for PKey and X509 by using their 'references' member"Steven Fackler2016-01-283-36/+0
|
* Preserve X.509 extension insertion order.Jimmy Cuadra2016-01-282-6/+101
| | | | | | | Ensures that extensions that are order-dependent are inserted in the same order when calling out to OpenSSL during certificate signing. Fixes #327.
* Remove unwraps from rsa accessorsSteven Fackler2016-01-221-10/+11
|
* Merge pull request #330 from esclear/masterSteven Fackler2016-01-224-2/+61
|\ | | | | Add a interface to RSA structs
| * Fix up RSA integrationDaniel Albert2016-01-202-2/+2
| |
| * Merge branch 'master' of https://github.com/sfackler/rust-opensslDaniel Albert2016-01-207-15/+341
| |\
| * | Fix incorrect unsafe declarationDaniel Albert2016-01-121-10/+21
| | |
| * | Adhere to rust conventionsDaniel Albert2016-01-121-10/+6
| | |
| * | Make the BigNum generation from a native pointer unsafeDaniel Albert2016-01-091-8/+6
| | |
| * | Add public interface to access BigNums from RSA keysDaniel Albert2016-01-011-0/+39
| | |
| * | Implement the possibility to create BigNums from their ffi counterpartDaniel Albert2016-01-011-0/+14
| | |
| * | Add RSA structsDaniel Albert2016-01-012-2/+3
| | |
* | | Release v0.7.5Steven Fackler2016-01-221-1/+1
| | |
* | | Fix connect and accept error reportingSteven Fackler2016-01-221-20/+16
| |/ |/| | | | | | | We were previously trying to create an error twice so the second wouldn't be correct.
* | Merge pull request #334 from jmesmon/ssl-contextSteven Fackler2016-01-192-3/+41
|\ \ | | | | | | ssl: fix refcounting of SslContext when set_ssl_context is used
| * | openssl/ssl/context: test that we are refcounting correctlyCody P Schafer2016-01-181-0/+13
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Not a perfect test, on failure it _might_ exit with this output: Process didn't exit successfully: `/home/cody/g/rust-openssl/openssl/target/debug/openssl-8e712036e3aac4fe` (signal: 11) But unclear if we can do any better.
| * | ssl: fix refcounting of SslContext when set_ssl_context is usedCody P Schafer2016-01-181-3/+28
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Additionally impl Clone for SslContext to both allow us to use it & allow external users to take advantage of SslContext's internal refcount. Maintain the existing signature for set_ssl_context(), but add inline comments recommending changing it. Fixes #333
* | | x509: impl Clone using references & CRYPTO_add()Cody P Schafer2016-01-192-0/+18
| | |
* | | crypto/pkey: impl Clone for PKey using openssl's ref countingCody P Schafer2016-01-192-0/+18
|/ /
* | Fix should_panic checkSteven Fackler2016-01-111-3/+3
| |
* | Add stream panic propagation behind a nightly feature gateSteven Fackler2016-01-114-12/+193
| |
* | Merge pull request #328 from Cyberunner23/PemRSASteven Fackler2016-01-091-0/+68
|\ \ | | | | | | Add support for RSA PEM files.
| * | Added tests for private_rsa_key_from_pem() and public_rsa_key_from_pem()Cyberunner232016-01-091-0/+20
| | |
| * | Added private_rsa_key_from_pem and public_rsa_key_from_pem.Cyberunner232016-01-051-0/+48
| |/
* / Mark PKey as `Send` and `Sync`Will Tange2016-01-071-0/+3
|/ | | | | Provided that the locking function is set, the underlying `ffi::EVP_KEY` type should be safe to use across threads.
* Release v0.7.4Steven Fackler2015-12-181-1/+1
|
* RustfmtSteven Fackler2015-12-182-2/+2
|
* Fix deprecation locationSteven Fackler2015-12-181-4/+4
|
* Work around the worst of clone bogusnessSteven Fackler2015-12-183-43/+37
| | | | | | | | | | SslStream::{clone,try_clone} are inherently broken since the Ssl object shared by both streams is only going to be talking to one stream. Stuff like hyper depends on try_clone, so we'll leave it here for now but minimize the brokenness to "no worse than what it used to be like". They'll be removed in 0.8. cc #325
* Release v0.7.3Steven Fackler2015-12-171-1/+1
|
* Disable cross compilation for nowSteven Fackler2015-12-171-1/+2
|
* Fix nonblocking behaviorSteven Fackler2015-12-172-22/+17
| | | | | | | | A new nonblocking socket may not have finished connecting yet, so reads and writes can return ENOTCONNECTED which we should reinterpret into a WantRead or WantWrite Closes #323
* Fix regression of c_char type mismatches on ARMOndrej Perutka2015-12-161-1/+1
|
* RustfmtSteven Fackler2015-12-1519-1135/+1260
|
* Fix bounds on ssl_read and ssl_writeSteven Fackler2015-12-151-28/+28
|
* Release v0.7.2Steven Fackler2015-12-151-1/+1
|
* Cleanup SNI stuffSteven Fackler2015-12-152-13/+10
|
* CleanupSteven Fackler2015-12-151-4/+6
|
* Merge pull request #320 from uasi/add-variations-of-pbkdf2Steven Fackler2015-12-151-0/+139
|\ | | | | Add PBKDF2-HMAC-SHA256 and -SHA512 functions
| * Put pbkdf2_hmac_{256,512}() behind feature gateTomoki Aonuma2015-12-101-0/+5
| | | | | | | | PKCS5_PBKDF2_HMAC is not available with openssl-0.9.8 on os x
| * Add PBKDF2-HMAC-SHA256 and -SHA512 functionsTomoki Aonuma2015-12-101-0/+134
| |
* | Merge pull request #309 from Geal/masterSteven Fackler2015-12-151-0/+112
|\ \ | | | | | | Add support for Server Name indication (SNI) on the server's side
| * | Increment SSL_CTX's reference count in Ssl::get_ssl_context()Geoffroy Couprie2015-12-031-0/+1
| | | | | | | | | | | | | | | | | | Without this, whenever the returned SslContext is released, the refcount of the underlying SSL_CTX will decrease and it will be freed too soon