Rohit Aggarwal
9e2755abae
Get curves for OpenSSL tests itself
2018-03-08 17:10:09 +00:00
Rohit Aggarwal
0a38b5a9ef
Try out another curve
2018-03-08 16:56:40 +00:00
Rohit Aggarwal
4b4d312018
Another try at using the correct curve
2018-03-08 16:46:31 +00:00
Mateusz Lenik
dcbb45cc9d
Implement AES-{128,256}-CCM bindings
2018-03-08 17:24:55 +01:00
Rohit Aggarwal
d4de2a408f
Use examples listed in OpenSSL docs for testing
2018-03-08 16:12:35 +00:00
Bastian Köcher
a5ba1a0007
Adds `RsaPssSaltlen` enum to encode the special values
2018-03-08 16:17:32 +01:00
Rohit Aggarwal
55ffc9b2e4
Add support LibreSSL and remove OpenSSL binding which we aren't using
2018-03-08 11:54:19 +00:00
Bastian Köcher
b0ea53184d
Switches to newtype wrapper for Oid
2018-03-08 12:24:37 +01:00
Bastian Köcher
1a0b085377
Extends the test to verify the certificate two times
2018-03-08 12:10:29 +01:00
Bastian Köcher
810ddeb4ca
Moves `cleanup` into its own function
2018-03-08 12:08:39 +01:00
Rohit Aggarwal
2d6cd9eb16
Exposed some of ECDSA functions
2018-03-08 09:44:05 +00:00
Bastian Köcher
724dd6f830
Adds more functions to `Verifier`/`Signer` for RSA keys
2018-03-07 20:43:28 +01:00
Bastian Köcher
84a5ce7607
Adds RSA PKCS1 PSS padding
2018-03-07 20:43:12 +01:00
Bastian Köcher
9a8a1c752b
Adds `PKeyRef::get_id` to get the OID of a key
2018-03-07 18:42:13 +01:00
Bastian Köcher
888f4ccaab
Fixes the implementation of `X509StoreContextRef::verify_cert`
...
The certificate, the store and the certificates chain does not need to be
consumed by `verify_cert` and instead are taken as references. We also call
`X509_STORE_CTX_cleanup`, after the verification succeeded.
2018-03-07 16:07:57 +01:00
Benjamin Fry
53adf0e6a4
delay return until after forgets
2018-03-07 13:54:35 +01:00
Benjamin Fry
6abac82f13
cleanup and add negative test
2018-03-07 13:54:35 +01:00
Benjamin Fry
a1cfde765a
add cleanup ffi to store context
2018-03-07 13:54:15 +01:00
Benjamin Fry
3187366cc5
restructure to self contained function
2018-03-07 13:53:29 +01:00
Steven Fackler
2251a6f2b6
Little tweaks
2018-03-07 13:51:58 +01:00
Benjamin Fry
d8a11973e2
convert to raw pass-through methods
2018-03-07 13:51:58 +01:00
Benjamin Fry
910386027d
add comment about consuming self in verify_cert
2018-03-07 13:50:12 +01:00
Benjamin Fry
35cad33d51
fix error check
2018-03-07 13:50:12 +01:00
Benjamin Fry
847fac25f8
properly version library functions
2018-03-07 13:48:09 +01:00
Benjamin Fry
3595ff9e51
Fix memory mgmt
2018-03-07 13:42:39 +01:00
Benjamin Fry
eb6296e892
add verify_cert and store_context_builder
2018-03-07 13:41:44 +01:00
Steven Fackler
f645165ee2
Remove the x509 module-level example
...
The example generated a bogus certificate that was missing a serial
number, a validity range, etc.
Generating a correct x509 certificate is complex enough that doing it
correctly is too long to be a reasonable doc example. There's already
a more complete example in the examples directory that handles things
more correctly.
Closes #859
2018-03-05 19:25:01 -08:00
Benjamin Saunders
38f4705b1d
FFI for OpenSSL 1.1.1 custom extension support
2018-03-05 17:45:08 -08:00
Steven Fackler
5760ded1ce
Merge pull request #857 from Ralith/middlebox-compat
...
Add SslOptions::ENABLE_MIDDLEBOX_COMPAT
2018-03-03 15:06:47 -08:00
Benjamin Saunders
f92de22b8d
Add SslOptions::ENABLE_MIDDLEBOX_COMPAT
2018-03-03 14:57:38 -08:00
Steven Fackler
b6985c7e8d
Release openssl v0.10.5
2018-02-28 14:33:04 -08:00
Steven Fackler
aa9addf532
Release openssl-sys 0.9.27
2018-02-28 14:31:23 -08:00
Steven Fackler
7fcd1ba96d
Update changelog
2018-02-28 14:23:44 -08:00
Steven Fackler
65e124055c
Merge pull request #854 from sfackler/error-description
...
Always include something in ErrorStack's Display
2018-02-27 17:30:48 -08:00
Steven Fackler
85d8db21d2
Always include something in ErrorStack's Display
...
The error stack can be empty after a some kinds of errors (AEAD
validation failure in Crypter is one example), and we don't want to
display as an empty string in that case.
2018-02-27 15:56:23 -08:00
Steven Fackler
42ec251b55
Merge pull request #853 from sfackler/min-max-version
...
Add min/max protocol version support
2018-02-26 11:39:31 -08:00
Steven Fackler
b7ba577339
Add min/max protocol version support
2018-02-25 23:20:10 -08:00
Steven Fackler
d5dd6575c1
Restore error stack in cookie callback
2018-02-25 22:11:08 -08:00
Steven Fackler
b94b0f67c5
Merge pull request #835 from Ralith/stateless
...
[WIP] Expose bindings needed for TLS1.3 stateless handshakes
2018-02-25 22:10:17 -08:00
Benjamin Saunders
e04dbfa3ee
Expose cookie generate/verify callback setters
2018-02-25 20:05:15 -08:00
Benjamin Saunders
e06a209e72
Expose FFI bindings needed for SSL_stateless
2018-02-25 19:58:49 -08:00
Steven Fackler
cebfbd9a25
Merge pull request #850 from sfackler/put-error
...
Add the ability to push errors back onto the error stack.
2018-02-24 20:58:07 -08:00
Steven Fackler
5fd23d38d5
Add the ability to push errors back onto the error stack.
2018-02-24 20:46:03 -08:00
Steven Fackler
6a5845c875
Merge pull request #849 from sfackler/key-export
...
Add RFC 5705 support
2018-02-24 14:15:11 -08:00
Steven Fackler
f72f35e9bd
Add RFC 5705 support
2018-02-23 22:04:57 -08:00
Steven Fackler
c1a106fc68
Merge pull request #847 from sfackler/version2
...
Actually add version stuff
2018-02-21 23:30:33 -08:00
Steven Fackler
7e0591a377
Actually add version stuff
2018-02-21 23:25:28 -08:00
Steven Fackler
950c39c2e6
Merge pull request #840 from olehermanse/master
...
Add des_ede3_cbc cipher and more tests/examples
2018-02-21 23:03:33 -08:00
Steven Fackler
38470bd351
Merge pull request #846 from sfackler/client-cipher-update
...
Update SslConnector cipher list
2018-02-21 19:56:46 -08:00
Steven Fackler
15048f4c02
Inline connector constants
2018-02-21 19:41:06 -08:00