summaryrefslogtreecommitdiffstats
path: root/demos
AgeCommit message (Collapse)Author
2015-02-02Dead code cleanup: crypto/*.c, x509v3, demosRich Salz
Some of the #if 0 code in demo's was kept, but given helpful #ifdef names, to show more sample code. Reviewed-by: Andy Polyakov <appro@openssl.org>
2015-01-28Harmonise use of EVP_CTRL_GET_TAG/EVP_CTRL_SET_TAG/EVP_CTRL_SET_IVLENMatt Caswell
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-01-24ifdef cleanup, part 4a: '#ifdef undef'Rich Salz
This removes all code surrounded by '#ifdef undef' One case is left: memmove() replaced by open-coded for loop, in crypto/stack/stack.c That needs further review. Also removed a couple of instances of /* dead code */ if I saw them while doing the main removal. Reviewed-by: Matt Caswell <matt@openssl.org>
2015-01-22More comment realignmentmaster-post-reformatMatt Caswell
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-01-22Run util/openssl-format-source -v -c .Matt Caswell
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-01-22Move more comments that confuse indentMatt Caswell
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-01-22indent has problems with comments that are on the right hand side of a line.Matt Caswell
Sometimes it fails to format them very well, and sometimes it corrupts them! This commit moves some particularly problematic ones. Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-01-22Fix source where indent will not be able to copeMatt Caswell
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-01-22Yet more commentsMatt Caswell
Conflicts: crypto/dsa/dsa_asn1.c crypto/pem/pem_all.c fips/dh/dh_gen.c fips/dh/fips_dh_check.c fips/dh/fips_dh_gen.c ssl/ssl_ciph.c Conflicts: ssl/d1_clnt.c Conflicts: ssl/s2_pkt.c Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-01-22More commentsMatt Caswell
Conflicts: crypto/dsa/dsa_vrf.c crypto/ec/ec2_smpl.c crypto/ec/ecp_smpl.c Conflicts: demos/bio/saccept.c ssl/d1_clnt.c Conflicts: bugs/dggccbug.c demos/tunala/cb.c Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-01-22Further comment changes for reformat (master)Matt Caswell
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-01-12RT3548: Remove unsupported platformsRich Salz
This last one for this ticket. Removes WIN16. So long, MS_CALLBACK and MS_FAR. We won't miss you. Reviewed-by: Richard Levitte <levitte@openssl.org>
2014-12-30mark all block comments that need format preserving so thatTim Hudson
indent will not alter them when reformatting comments Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org>
2014-12-04Remove SSLv2 supportKurt Roeckx
The only support for SSLv2 left is receiving a SSLv2 compatible client hello. Reviewed-by: Richard Levitte <levitte@openssl.org>
2014-11-28Remove all .cvsignore filesRich Salz
Reviewed-by: Tim Hudson <tjh@openssl.org>
2014-09-08RT2600: Change Win line-endings to Unix.Rich Salz
For consistency. Reviewed-by: Bodo Moeller <bodo@openssl.org>
2014-08-21RT3142: Extra initialization in state_machineJeffrey Walton
Remove extra initialization calls in the sample program. Reviewed-by: Emilia Kasper <emilia@openssl.org>
2014-08-19RT2847: Don't "check" uninitialized memoryMartin Olsson
Don't check err variable until after it's been set. Reviewed-by: Emilia Kasper <emilia@openssl.org>
2014-08-17engine_md_copy: check for NULL after allocating to_md->HashBufferJonas Maebe
Signed-off-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
2014-08-09Undo a90081576c94f9f54de1755188a00ccc1760549aRich Salz
Undo unapproved commit that removed DJGPP and WATT32
2014-08-08Remove DJGPP (and therefore WATT32) #ifdef's.Rich Salz
DJGPP is no longer a supported platform. Remove all #ifdef, etc., cases that refer to it. DJGPP also #define'd WATT32, so that is now removed as well.
2014-07-22Remove demos/tunalaGeoff Thorpe
This has been unmaintained for a long time. If it's still of interest to anyone, it can be obtained easily enough by reverting this commit. (It could join other demo code in some other repository, perhaps.) In any case we don't want it taking up space in the baseline source package, so <snip>. Signed-off-by: Geoff Thorpe <geoff@openssl.org>
2014-07-22Remove old unused and unmaintained demonstration code.Tim Hudson
Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
2014-02-02New ctrl to set current certificate.Dr. Stephen Henson
New ctrl sets current certificate based on certain criteria. Currently two options: set the first valid certificate as current and set the next valid certificate as current. Using these an application can iterate over all certificates in an SSL_CTX or SSL structure.
2014-02-02Demo of use of errors in applications.Dr. Stephen Henson
2014-01-28typoDr. Stephen Henson
2014-01-28Fix demo comment: 0.9.9 never released.Dr. Stephen Henson
2013-12-18Update demo.Dr. Stephen Henson
2013-10-21Update demos/bio/READMEDr. Stephen Henson
2013-10-20Fix various typos.Dr. Stephen Henson
2013-10-20Modify sample accept.cnfDr. Stephen Henson
2013-10-20Add demo for SSL server using SSL_CONF.Dr. Stephen Henson
2013-09-05misspellings fixes by https://github.com/vlajos/misspell_fixerVeres Lajos
2013-03-18Typo.Dr. Stephen Henson
(cherry picked from commit 1546fb780bc11556a18d70c5fb29af4a9d5beaff)
2013-03-05typoDr. Stephen Henson
2013-03-05Initial CCM code.Dr. Stephen Henson
Simple example of CCM code use: translated from the FIPS self tests.
2013-02-26Demo code for SSL_CONF APIDr. Stephen Henson
Two example programs one for command line argument processing and one for configuration file processing.
2012-12-14oops, revert, committed in errorDr. Stephen Henson
2012-12-14apps/ocsp.cDr. Stephen Henson
2012-11-18remove redundant code from demoDr. Stephen Henson
2012-10-27typoDr. Stephen Henson
2012-10-16add simple AES GCM code exampleDr. Stephen Henson
2012-09-09update READMEDr. Stephen Henson
2012-09-09Extend certificate creation examples to include CRL generation and sampleDr. Stephen Henson
scripts running the test OCSP responder.
2012-08-31make EC test certificates usable for ECDHDr. Stephen Henson
2012-06-29Add certificate callback. If set this is called whenever a certificateDr. Stephen Henson
is required by client or server. An application can decide which certificate chain to present based on arbitrary criteria: for example supported signature algorithms. Add very simple example to s_server. This fixes many of the problems and restrictions of the existing client certificate callback: for example you can now clear existing certificates and specify the whole chain.
2012-02-09oops, revert unrelated changesDr. Stephen Henson
2012-02-09Modify client hello version when renegotiating to enhance interop withDr. Stephen Henson
some servers.
2012-01-25add example for DH certificate generationDr. Stephen Henson
2011-12-14Add private keys and generation scripts for test certificates in appsDr. Stephen Henson
directory.