summaryrefslogtreecommitdiffstats
path: root/apps
AgeCommit message (Collapse)Author
2015-10-12Rename -set-serial command to reqMatt Caswell
Previous OpenSSL versions used -set_serial, but master was using -set-serial - so rename it back to the old version. RT#4059 Reviewed-by: Richard Levitte <levitte@openssl.org>
2015-10-12Centralise loading default apps config fileMatt Caswell
Loading the config file after processing command line options can cause problems, e.g. where an engine provides new ciphers/digests these are not then recoginised on the command line. Move the default config file loading to before the command line option processing. Whilst we're doing this we might as well centralise this instead of doing it individually for each application. Finally if we do it before the OpenSSL_add_ssl_algorithms() call then ciphersuites provided by an engine (e.g. GOST) can be available to the apps. RT#4085 RT#4086 Reviewed-by: Richard Levitte <levitte@openssl.org>
2015-10-12Fix option name discrepancyMatt Caswell
There used to be options -macopt and -sigopt in <=1.0.2 for the dgst command line app. These were incorrectly spelled as -macop and -sigop in master. RT#4072 Reviewed-by: Andy Polyakov <appro@openssl.org>
2015-10-11Make no-psk compile without warnings.Dr. Stephen Henson
PR#4035 Reviewed-by: Matt Caswell <matt@openssl.org>
2015-10-09DTLS: remove unused cookie fieldEmilia Kasper
Note that this commit constifies a user callback parameter and therefore will break compilation for applications using this callback. But unless they are abusing write access to the buffer, the fix is trivial. Reviewed-by: Andy Polyakov <appro@openssl.org>
2015-10-06Don't try and parse boolean type.Dr. Stephen Henson
Reviewed-by: Rich Salz <rsalz@openssl.org>
2015-10-05Address Windows warnings in apps/.Andy Polyakov
Reviewed-by: Richard Levitte <levitte@openssl.org>
2015-10-05Explicitly cast INVALID_SOCKET to (int) to address warnings on Windows.Andy Polyakov
Even though SOCKET is effectively declared as (void *) on Windows, it's not actually a pointer, but an index within per-process table of kernel objects. The table size is actually limited and its upper limit is far below upper limit for signed 32-bit integer. This is what makes cast in question possible. Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-09-30Display brief help if no options for list.Ben Laurie
Reviewed-by: Andy Polyakov <appro@openssl.org>
2015-09-29Fix -Wshadow warnings in mingw builds.Andy Polyakov
Reviewed-by: Rich Salz <rsalz@openssl.org>
2015-09-28Print debug info for extended master secret extensionAlessandro Ghedini
Signed-off-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-09-28RT4053: Typo in error messageMichal Bozon
Signed-off-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-09-28SRP memory leak fixDr. Stephen Henson
Reviewed-by: Richard Levitte <levitte@openssl.org>
2015-09-28Silence Wconditional-uninitializedEmilia Kasper
Reviewed-by: Matt Caswell <matt@openssl.org>
2015-09-25GH408 follow-on: update buflenAlessandro Ghedini
Some builds break, as documented in: https://github.com/openssl/openssl/pull/408#issuecomment-142971427 This fixes it. Signed-off-by: Rich Salz <rsalz@akamai.com> Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-09-25Add support for -no-CApath and -no-CAfile optionsMatt Caswell
For those command line options that take the verification options -CApath and -CAfile, if those options are absent then the default path or file is used instead. It is not currently possible to specify *no* path or file at all. This change adds the options -no-CApath and -no-CAfile to specify that the default locations should not be used to all relevant applications. Reviewed-by: Andy Polyakov <appro@openssl.org>
2015-09-24fix compilation on SolarisVladimir Kotal
Signed-off-by: Rich Salz <rsalz@akamai.com> Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-09-24Restore the old interactive prompt.Rich Salz
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-09-23Fix s_server DTLSv1_listen issuesMatt Caswell
Use sockaddr_storage not sockaddr for the client IP address to allow for IPv6. Also fixed a section of code which was conditional on OPENSSL_NO_DTLS1 which should not have been. Reviewed-by: Andy Polyakov <appro@openssl.org>
2015-09-23Add support for DTLSv1_listen in s_serverMatt Caswell
DTLSv1_listen is a commonly used function within DTLS solutions for listening for new incoming connections. This commit adds support to s_server for using it. Reviewed-by: Andy Polyakov <appro@openssl.org>
2015-09-22Remove "noise" comments from TS files.Rich Salz
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-09-21Fix -srpvfile option in srp command lineMatt Caswell
The -srpvfile option was broken in the srp command line app. Using it would always result in "-dbfile and -configfile cannot be specified together." The error message is also wrong because the option is "-srpvfile" not "-dbfile", so that has been fixed too. Reviewed-by: Emilia Käsper <emilia@openssl.org>
2015-09-20Make SRP work with -wwwDr. Stephen Henson
PR#3817 Reviewed-by: Rich Salz <rsalz@openssl.org>
2015-09-20make no-dh workDr. Stephen Henson
Reviewed-by: Richard Levitte <levitte@openssl.org>
2015-09-20Finally, remove a possibly disabled featureRichard Levitte
I have no clue why MD_GHOST94 was checked on, there is no OPENSSL_NO_MD_GHOST94 in sight anywhere Reviewed-by: Stephen Henson <steve@openssl.org>
2015-09-20Add more features that may be disabledRichard Levitte
Have a look at the directories in crypto/, I found reason to add checks on CMAC and HMAC. This might be completely irrelevant, but I prefered covering too much than not enough. Reviewed-by: Stephen Henson <steve@openssl.org>
2015-09-20Add more features that may be disabledRichard Levitte
A grep of OPENSSL_NO_ in the rest of the source tree revealed a few more features to check. NOTE: there are some of those macros that I ignore because a check of them doesn't seem useful to external apps. This might change later on. Reviewed-by: Stephen Henson <steve@openssl.org>
2015-09-20Add more features that may be disabledRichard Levitte
After a grep of OPENSSL_NO_ in apps/*.c, a few more features that may be interesting to check the availability of came up. Reviewed-by: Stephen Henson <steve@openssl.org>
2015-09-20Add more features that may be disabledRichard Levitte
I've tried to make this list as complete as possible, based on information found in apps/progs.pl. Reviewed-by: Stephen Henson <steve@openssl.org>
2015-09-20Sort the disabled features alphabeticallyRichard Levitte
Reviewed-by: Stephen Henson <steve@openssl.org>
2015-09-20Small typoRichard Levitte
OPENSSL_NO_ECA changed to OPENSSL_NO_EC Reviewed-by: Stephen Henson <steve@openssl.org>
2015-09-19Print out a list of disabled features.Dr. Stephen Henson
New option "openssl list -disabled" this lists a set of disabled features in a form which can be conveniently parsed by the test framework so it knows which tests to skip. Reviewed-by: Richard Levitte <levitte@openssl.org>
2015-09-17RT4033: Use OPENSSL_SYS_UNIX not "unix"Rich Salz
Real fix for RT 4033 Reviewed-by: Richard Levitte <levitte@openssl.org>
2015-09-11Use default field separator.Dr. Stephen Henson
If the field separator isn't specified through -nameopt then use XN_FLAG_SEP_CPLUS_SPC instead of printing nothing and returing an error. PR#2397 Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-09-11Enable -Wmissing-variable-declarations andBen Laurie
-Wincompatible-pointer-types-discards-qualifiers (the latter did not require any code changes). Reviewed-by: Rich Salz <rsalz@openssl.org>
2015-09-10Unwriteable directories are errorsRich Salz
Make the script and app match the documentation. Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-09-08Fix rehash/c_rehash doc and behavior.Rich Salz
Both now warn once if directory isn't writeable. Both now warn on file-write errors (multiple times). Update manpage to describe both program and script correctly. Reviewed-by: Richard Levitte <levitte@openssl.org>
2015-09-08Fix uninit warning. Remove unnecessary casts. Nothing to add is an error.Ben Laurie
Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
2015-09-07add support for apple os/xRich Salz
Reviewed-by: Richard Levitte <levitte@openssl.org>
2015-09-07GH391: Apple portRich Salz
Also make internal functions consistently return values, and add a comment documenting them. Reviewed-by: Ben Laurie <ben@openssl.org>
2015-09-06fix build breakage on windowsRich Salz
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-09-06Fix typo, that broke build on non-unixRich Salz
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-09-06Add rehash command to opensslTimo Teras
On Unix/Linux platforms, merge c_rehash script into openssl as a C program. Signed-off-by: Rich Salz <rsalz@akamai.com> Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-09-06Small fix: make istext staticRichard Levitte
This takes away a build failure in some cases. Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-09-06Fix enc so it properly treats BASE64 as textRichard Levitte
To set both the incoming and outgoing data when 'encrypting' or 'decrypting' to FORMAT_BASE64 wasn't quite the right thing to do. Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-09-06Change the treatment of stdin and stdout to allow binary dataRichard Levitte
If the output to stdout or the input from stdin is meant to be binary, it's deeply unsetting to get the occasional LF converted to CRLF or the other way around. If someone happens to forget to redirect stdin or stdout, they will get gibberish anyway, line ending conversion will not change that. Therefore, let's not have dup_bio_* decide unilaterally what mode the BIO derived from stdin and stdout, and rather let the app decide by declaring the intended format. Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-09-06dup_bio_* and bio_open_* are utility functions and belong in apps.cRichard Levitte
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-09-06Have binary mode when the format is binary, not the other way aroundRichard Levitte
Fixing a small mixup. Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-09-06Change the way apps open their input and output filesRichard Levitte
The different apps had the liberty to decide whether they would open their input and output files in binary mode or not, which could be confusing if two different apps were handling the same type of file in different ways. The solution is to centralise the decision of low level file organisation, and that the apps would use a selection of formats to state the intent of the file. Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-09-06Make the handling of output and input formats consistentRichard Levitte
Most of all, we needed to sort out which ones are binary and which ones are text, and make sure they are treated accordingly and consistently so Reviewed-by: Tim Hudson <tjh@openssl.org>