Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Replace everything with README indicating moveHEADmaster | Patrick McDermott | 2020-08-09 | 27 | -3531/+2 |
| | |||||
* | NEWS: Release wolfutil 1.0.0wolfutil/1.0.0 | Patrick McDermott | 2020-08-09 | 1 | -1/+1 |
| | |||||
* | scripts/announce-release.sh: Exit on error | Patrick McDermott | 2020-08-09 | 1 | -0/+2 |
| | |||||
* | configure.ac: Check for ProteanOS root certs dir | Patrick McDermott | 2020-08-09 | 1 | -1/+2 |
| | |||||
* | configure.ac: Update copyright years | Patrick McDermott | 2020-08-09 | 1 | -2/+2 |
| | |||||
* | build, s_client: Support certificates file | Patrick McDermott | 2020-08-08 | 2 | -18/+36 |
| | |||||
* | s_client: Enable wolfSSL debug msgs if not quiet | Patrick McDermott | 2020-08-07 | 1 | -1/+6 |
| | |||||
* | NEWS, configure.ac: Set version to 1.0.0 | Patrick McDermott | 2020-08-05 | 2 | -2/+2 |
| | |||||
* | scripts/announce-release.sh: Update URL in sig | Patrick McDermott | 2020-07-20 | 1 | -1/+1 |
| | |||||
* | tests/badssl.sh: Drop sha1-intermediate | Patrick McDermott | 2020-07-20 | 1 | -2/+1 |
| | | | | | | This subdomain is defunct with an expired certificate: https://github.com/chromium/badssl.com/pull/445 | ||||
* | tests/badssl.sh: badssl.com certs are expiring | Patrick McDermott | 2020-07-20 | 1 | -2/+6 |
| | |||||
* | tests/badssl.sh: Organize output | Patrick McDermott | 2020-07-20 | 1 | -3/+5 |
| | |||||
* | Rename package and executable to wolfutil | Patrick McDermott | 2020-07-20 | 10 | -52/+52 |
| | |||||
* | Makefile.am: Generate ChangeLog | Patrick McDermott | 2019-10-01 | 1 | -0/+10 |
| | |||||
* | Makefile.am: Fix copyright years | Patrick McDermott | 2019-09-30 | 1 | -1/+1 |
| | |||||
* | Update copyright notices | Patrick McDermott | 2019-09-05 | 8 | -7/+8 |
| | | | | | | Copyrights in my contributions to this package were transferred to Libiquity LLC by a contract executed 2019-09-04. And as of this writing, this package has not yet been published. | ||||
* | s_client: Don't save wolfSSL_get_error() value | Patrick McDermott | 2019-08-04 | 1 | -2/+1 |
| | |||||
* | s_client: Merge assignment and conditional | Patrick McDermott | 2019-08-04 | 1 | -2/+1 |
| | | | | No change to binary, just bumming one line of source code. | ||||
* | s_client: Merge more conditionals | Patrick McDermott | 2019-08-04 | 1 | -15/+11 |
| | |||||
* | s_client: Make a NULL condition explicit | Patrick McDermott | 2019-08-04 | 1 | -1/+1 |
| | |||||
* | s_client: Don't manually enable curves | Patrick McDermott | 2019-08-03 | 1 | -96/+0 |
| | | | | They're apparently already enabled. | ||||
* | README: Wrap at 72 columns, not 80 | Patrick McDermott | 2019-08-03 | 1 | -13/+13 |
| | |||||
* | Rename executable to wolfssl | Patrick McDermott | 2019-08-03 | 6 | -14/+14 |
| | |||||
* | README: Stronger by default than openssl s_client | Patrick McDermott | 2019-08-03 | 1 | -0/+13 |
| | |||||
* | s_client: Use wolfSSL DN check code, not extra API | Patrick McDermott | 2019-08-03 | 2 | -19/+4 |
| | | | | | | And drop --enable-opensslextra option recommendation in README. Also, check SNI name, not host name. | ||||
* | README: Recommend a strong wolfSSL configuration | Patrick McDermott | 2019-08-03 | 1 | -0/+20 |
| | |||||
* | build: Add Organization header to announcements | Patrick McDermott | 2019-08-02 | 1 | -0/+1 |
| | |||||
* | build: Set GIT_DIR earlier in announce script | Patrick McDermott | 2019-08-01 | 1 | -2/+2 |
| | |||||
* | MD5SUMS, SHA256SUMS: Exclude from Git | Patrick McDermott | 2019-08-01 | 1 | -0/+2 |
| | |||||
* | build: Support announcing first version | Patrick McDermott | 2019-08-01 | 1 | -4/+6 |
| | |||||
* | build: Add release target | Patrick McDermott | 2019-08-01 | 2 | -1/+180 |
| | |||||
* | build: Save user CFLAGS | Patrick McDermott | 2019-08-01 | 1 | -1/+2 |
| | |||||
* | tests/aux/json.sh: Fix continue not in a loop | Patrick McDermott | 2019-08-01 | 1 | -1/+1 |
| | | | | | | | | | | | | Fixes the following error with Bash: [...]/tests/aux/json.sh: line 144: continue: only meaningful in a `for', `while', or `until' loop json.sh: syntax: /given_cipher_suites/1 json.sh: syntax: / json.sh: syntax: / Oddly, Dash treats continue outside a loop as return, which is undefined behavior. | ||||
* | tests/howsmyssl.sh: New test script | Patrick McDermott | 2019-08-01 | 2 | -1/+69 |
| | |||||
* | tests/aux/json.sh: New file | Patrick McDermott | 2019-08-01 | 2 | -1/+404 |
| | |||||
* | build: Include debugging symbols in Git builds | Patrick McDermott | 2019-07-31 | 1 | -2/+5 |
| | |||||
* | build: Fix stray printf format specifier | Patrick McDermott | 2019-07-31 | 1 | -1/+1 |
| | |||||
* | Revert "build: Disable address sanitization by default" | Patrick McDermott | 2019-07-31 | 2 | -1/+43 |
| | | | | This reverts commit 0c9789c85ca4542697fbfae82f1ed412ab2b2dbe. | ||||
* | build: Search several possible CA certificate paths | Patrick McDermott | 2019-07-31 | 1 | -12/+26 |
| | |||||
* | build: Make CA root certificates path configurable | Patrick McDermott | 2019-07-31 | 2 | -2/+41 |
| | | | | | Use of installed CA root certificates can also be disabled entirely, but that just breaks everything. | ||||
* | build: Drop GCC version check for warnings | Patrick McDermott | 2019-07-30 | 1 | -2/+1 |
| | | | | I think this was a copy/paste accident. | ||||
* | build: Disable address sanitization by default | Patrick McDermott | 2019-07-30 | 2 | -43/+1 |
| | |||||
* | README: Use name "wolfssl-util" in first sentence | Patrick McDermott | 2019-07-30 | 1 | -4/+4 |
| | |||||
* | README: SSL is disabled by default by wolfSSL | Patrick McDermott | 2019-07-30 | 1 | -3/+3 |
| | | | | And not enabled at all by wolfssl-util. | ||||
* | NEWS: I forgot article | Patrick McDermott | 2019-07-30 | 1 | -2/+2 |
| | |||||
* | build: Drop vestige of Gettext | Patrick McDermott | 2019-07-30 | 1 | -1/+1 |
| | |||||
* | Revert "s_client: Enable secure renegotiation" | Patrick McDermott | 2019-07-30 | 1 | -7/+1 |
| | | | | | | | This reverts commit 6cd7b5568ce306de755bc8fff3488feedf161901. It seems a call to either wolfSSL_Rehandshake() or wolfSSL_SecureResume() is necessary, as in wolfSSL's example client. | ||||
* | s_client: Enable secure renegotiation | Patrick McDermott | 2019-07-30 | 1 | -1/+7 |
| | | | | | | | | Although this causes a SIGSEGV in wolfSSL_X509_check_host(): #0 0x00007ffff7babca2 in wolfSSL_X509_check_host () from /usr/local/lib/libwolfssl.so.19 #1 0x0000555555555d3f in s_client (argc=0, argv=0x7fffffffe3b8) at src/s_client.c:382 #2 0x000055555555545a in main (argc=6, argv=0x7fffffffe388) at src/main.c:42 | ||||
* | s_client: Enable OCSP stapling | Patrick McDermott | 2019-07-30 | 1 | -0/+11 |
| | |||||
* | Revert "tests/ocsp-stapling.sh: New test script" | Patrick McDermott | 2019-07-30 | 2 | -39/+1 |
| | | | | | | | | This reverts commit 990942046a013e4eab23499cd32218bf046791aa. Apparently, even with OCSP stapling, wolfSSL still performs CRL and OCSP lookups. Is there a way to disable CRL and OCSP when a stapled OCSP response is found in the handshake? |