1. 04 Dec, 2017 13 commits
  2. 03 Dec, 2017 1 commit
  3. 30 Nov, 2017 2 commits
    • Viktor Dukhovni's avatar
      Make possible variant SONAMEs and symbol versions · 822b5e26
      Viktor Dukhovni authored
      
      
      This small change in the Unix template and shared library build
      scripts enables building "variant" shared libraries.  A "variant"
      shared library has a non-default SONAME, and non default symbol
      versions.  This makes it possible to build (say) an OpenSSL 1.1.0
      library that can coexist without conflict in the same process address
      space as the system's default OpenSSL library which may be OpenSSL
      1.0.2.
      
      Such "variant" shared libraries make it possible to link applications
      against a custom OpenSSL library installed in /opt/openssl/1.1 or
      similar location, and not risk conflict with an indirectly loaded
      OpenSSL runtime that is required by some other dependency.
      
      Variant shared libraries have been fully tested under Linux, and
      build successfully on MacOS/X producing variant DYLD names.  MacOS/X
      Darwin has no symbol versioning, but has a non-flat library namespace.
      Variant libraries may therefore support multiple OpenSSL libraries
      in the same address space also with MacOS/X, despite lack of symbol
      versions, but this has not been verified.
      
      Variant shared libraries are optional and off by default.
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      822b5e26
    • Rich Salz's avatar
      Add "friendly name" extractor · a4cefc86
      Rich Salz authored
      
      
      From a comment posted by GitHub user "geniuz"
      
      Reviewed-by: default avatarAndy Polyakov <appro@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/4812)
      a4cefc86
  4. 29 Nov, 2017 2 commits
  5. 28 Nov, 2017 7 commits
  6. 27 Nov, 2017 4 commits
  7. 25 Nov, 2017 4 commits
  8. 24 Nov, 2017 2 commits
  9. 23 Nov, 2017 2 commits
  10. 22 Nov, 2017 1 commit
  11. 21 Nov, 2017 2 commits
    • Richard Levitte's avatar
      Avoid unnecessary MSYS2 conversion of some arguments · f106f406
      Richard Levitte authored
      Fixes #4740
      
      The MSYS2 run-time convert arguments that look like paths when
      executing a program unless that application is linked with the MSYS
      run-time.  The exact conversion rules are listed here:
      
          http://www.mingw.org/wiki/Posix_path_conversion
      
      
      
      With the built-in configurations (all having names starting with
      "mingw"), the openssl application is not linked with the MSYS2
      run-time, and therefore, it will receive possibly converted arguments
      from the process that executes it.  This conversion is fine for normal
      path arguments, but it happens that some arguments to the openssl
      application get converted when they shouldn't.  In one case, it's
      arguments like '-passin file:something', and in another, it's a file:
      URI (what typically happens is that URIs without an authority
      component get converted, 'cause the conversion mechanism doesn't
      recognise them as URIs).
      
      To avoid conversion where we don't want it, we simply assign
      MSYS2_ARG_CONV_EXCL a pattern to avoid specific conversions.  As a
      precaution, we only do this where we obviously need it.
      
      Reviewed-by: default avatarAndy Polyakov <appro@openssl.org>
      Reviewed-by: default avatarBen Kaduk <kaduk@mit.edu>
      (Merged from https://github.com/openssl/openssl/pull/4765)
      f106f406
    • Matt Caswell's avatar
      If a server is not acknowledging SNI then don't reject early_data · 281bf233
      Matt Caswell authored
      
      
      SNI needs to be consistent before we accept early_data. However a
      server may choose to not acknowledge SNI. In that case we have to
      expect that a client may send it anyway. We change the consistency
      checks so that not acknowledging is treated more a like a "wild card",
      accepting any SNI as being consistent.
      
      Reviewed-by: default avatarBen Kaduk <kaduk@mit.edu>
      (Merged from https://github.com/openssl/openssl/pull/4738)
      281bf233