]>
www.infradead.org Git - users/dwmw2/openconnect.git/log
Björn Ketelaars [Sun, 25 Sep 2016 15:02:59 +0000 (17:02 +0200)]
Small error in openconnect.8
openconnect.8 discusses 'basemtu' as option. Unfortunately this option is not
recognized. A quick glance in the source learned that 'base-mtu' should be
used.
Signed-off-by: Björn Ketelaars <bjorn.ketelaars@hydroxide.nl>
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Sat, 24 Sep 2016 20:59:29 +0000 (21:59 +0100)]
Update translations from GNOME
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Sat, 24 Sep 2016 00:06:52 +0000 (01:06 +0100)]
Update changelog
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Fri, 23 Sep 2016 23:33:06 +0000 (00:33 +0100)]
Increase oNCP configuration buffer size
We've seen 'KMP message 301 from server too large (10596 bytes)'
in the wild. Bump it up for now, but this really wants to be
dynamically handled.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Fri, 23 Sep 2016 23:09:07 +0000 (00:09 +0100)]
Add TUNIDX for Windows vpnc-script
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Fri, 23 Sep 2016 20:35:32 +0000 (21:35 +0100)]
Better attempt at handling TAP-Windows tun setup
Just set the network and mask to all zeros. It means it'll do proxy ARP
for *everything* and we can configure them all as on-link routes.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Fri, 23 Sep 2016 14:35:28 +0000 (15:35 +0100)]
Add GNUTLS_NO_EXTENSIONS to DTLS setup
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Fri, 23 Sep 2016 14:32:44 +0000 (15:32 +0100)]
Remember the X-CSTP-Base-MTU: value that the server sends back
We'll want this, for calculating DTLS MTU with PSK-NEGOTIATE.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Fri, 23 Sep 2016 14:29:25 +0000 (15:29 +0100)]
Limit netmask on Windows TAP setup to 255.255.255.254
This makes a start on the problems with point-to-point configurations,
discussed in https://github.com/openconnect/openconnect-gui/issues/132
Some work is required in vpnc-script-win.js to make the routing do
anything useful, but at least it's not now *impossible* to persuade
it to pass any traffic.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Fri, 23 Sep 2016 13:56:17 +0000 (14:56 +0100)]
Attempt to re-open CONIN$ if stdin has been redirected on Windows
This should hopefully fix the problem with --passwd-on-stdin, described
in https://github.com/openconnect/openconnect-gui/issues/101
It doesn't actually work for me in wine, as I get 'Access Denied' when
trying to use ReadConsoleW() on the resulting handle. But wine is strange,
and this at least shouldn't make things any *worse*.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Fri, 23 Sep 2016 11:33:13 +0000 (12:33 +0100)]
Add session resume check for GnuTLS too
It's actually doing nothing here; no existing version of GnuTLS would
have let the session get established since we do not install any
credentials which would permit any key exchange. But it wasn't
*explicitly* prevented. And now it is.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Fri, 23 Sep 2016 11:24:35 +0000 (12:24 +0100)]
Explicitly disallow non-resumed sessions for legacy DTLS establishment
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Fri, 23 Sep 2016 10:21:25 +0000 (11:21 +0100)]
Update translations from GNOME
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Fri, 23 Sep 2016 10:19:08 +0000 (11:19 +0100)]
Add DTLS files back to translation
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 22 Sep 2016 20:43:49 +0000 (21:43 +0100)]
Fix 'make install' from clean too.
Recursive Make still Considered Harmful.
cf. https://github.com/Homebrew/homebrew-core/pull/5029
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 22 Sep 2016 14:08:19 +0000 (15:08 +0100)]
Update changelog
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
Jon DeVree [Tue, 20 Sep 2016 01:00:18 +0000 (21:00 -0400)]
Add Content-Length header to mimic official pulse client
The official pulse client sends in a fixed "Content-Length: 256" header
with these two HTTP requests. Some versions of the VPN server will
reject requests with an HTTP 400 error if they do not have this header.
Signed-off-by: Jon DeVree <nuxi@vault24.org>
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 22 Sep 2016 13:57:56 +0000 (14:57 +0100)]
Fix IPv6 setup on Solaris
Commit
a5dd38ec8 ("Assign Address-IP6 field to netmask instead of address")
caused us to sometimes neglect to plumb the tun interface for IPv6.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
Nikos Mavrogiannopoulos [Wed, 27 Jul 2016 09:58:11 +0000 (11:58 +0200)]
Enable DTLS protocol negotiation
The new negotiation is as follows: If the client's X-DTLS-CipherSuite
contains the "PSK-NEGOTIATE" keyword, the server will reply with
"X-DTLS-CipherSuite: PSK-NEGOTIATE" and will enable DTLS-PSK negotiation on the
DTLS channel.
That change utilizes the value provided by sever's X-DTLS-App-ID header
and sets that value to a TLS extension on client hello. The
extension used is defined on (draft-mavrogiannopoulos-app-id).
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Mon, 19 Sep 2016 13:24:08 +0000 (14:24 +0100)]
Enable DSA-SHA1 in ocserv config
Now the DSA test works again for OpenSSL even with TLSv1.2
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Mon, 19 Sep 2016 13:23:44 +0000 (14:23 +0100)]
Update CONFIG_STATUS_DEPENDENCIES
We want to rebuild when config files change
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Mon, 19 Sep 2016 13:01:32 +0000 (14:01 +0100)]
Change DSA test key to 1024 bits
Support for larger keys is undefined in TLS.
Of course, this doesn't actually work *either*, as ocserv still refuses
to accept them, but at least it's not the client's fault now.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Wed, 14 Sep 2016 19:22:52 +0000 (20:22 +0100)]
Update test suite
Disable DSA tests for OpenSSL too. It seems that ocserv stops accepting DSA
certs when you use TLSv1.2.
Stop expecting CentOS7/GnuTLS to fail the auth-pkcs11 test. It doesn't seem
to.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Wed, 14 Sep 2016 16:22:45 +0000 (17:22 +0100)]
DTLS MTU detection fixes
Most importantly, in some circumstances it was setting the "detected"
MTU to the value of the first *failing* packet size, not the last
working one. But also fix up various other issues too, and optimise it
for the common case where the negotiated MTU *is* actually working.
There are still issues with the way we choose the next candidate address,
and it might never reach the actual best MTU. But it's better than it was.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Tue, 13 Sep 2016 21:50:44 +0000 (22:50 +0100)]
Support --key-password for GnuTLS PKCS#11 PIN
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Tue, 13 Sep 2016 21:13:01 +0000 (22:13 +0100)]
Single pipeline for creating openconnect.8.inc
There were race conditiona here with the temporary files, which were fairly
gratuitous — we can just write directly to $@.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Tue, 13 Sep 2016 20:38:22 +0000 (21:38 +0100)]
Update translations from GNOME
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Tue, 13 Sep 2016 20:31:33 +0000 (21:31 +0100)]
Update changelog
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Tue, 13 Sep 2016 20:14:02 +0000 (21:14 +0100)]
Set SSL_OP_TLSEXT_PADDING to work around F5 firewall bugs
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Tue, 13 Sep 2016 19:57:20 +0000 (20:57 +0100)]
Allow OpenSSL to use TLSv1.2
We've been allowing GnuTLS to negotiate higher protocols than TLSv1.0 for
a while; make OpenSSL do the same.
The Cisco ASA is still stuck at TLSv1.0 but ocserv isn't. Not sure about
Juniper, offhand.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Tue, 13 Sep 2016 19:46:48 +0000 (20:46 +0100)]
Report actual DTLS cipher for OpenSSL
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Mon, 12 Sep 2016 20:12:28 +0000 (21:12 +0100)]
Fix serverhash build with local OpenSSL
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Mon, 12 Sep 2016 12:16:03 +0000 (13:16 +0100)]
Fix Windows build of serverhash
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Mon, 12 Sep 2016 11:54:39 +0000 (12:54 +0100)]
Add openconnect_init_ssl() in serverhash.c
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Mon, 12 Sep 2016 11:31:43 +0000 (12:31 +0100)]
Fix build from clean
We now need libopenconnect to be built before we recurse into tests/ even
for building.
Recursive Make Considered Harmful.
If the directory handling in tests/ wasn't already so baroque, I might
take a look at fixing that. But a task for another day, methinks...
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Mon, 12 Sep 2016 10:55:26 +0000 (11:55 +0100)]
Kill DTLS_FREE macro
This can move to the library-specific *-dtls.c files too.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Mon, 12 Sep 2016 10:17:08 +0000 (11:17 +0100)]
Add serverhash test tool
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Sat, 10 Sep 2016 20:14:54 +0000 (21:14 +0100)]
Reinstate 'make check' warning for OpenSSL builds
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Sat, 10 Sep 2016 20:12:02 +0000 (21:12 +0100)]
Split crypto library parts out from dtls.c to {gnutls,openssl}-dtls.c
There are still some #ifdefs but it's a lot nicer now.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Sat, 10 Sep 2016 19:55:53 +0000 (20:55 +0100)]
Remove bad-random test stuff
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Sat, 10 Sep 2016 19:54:36 +0000 (20:54 +0100)]
Simplify DTLS conditionals
These can look like ESP now too
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Sat, 10 Sep 2016 18:58:56 +0000 (19:58 +0100)]
Simplify ESP conditionals
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Sat, 10 Sep 2016 17:09:54 +0000 (18:09 +0100)]
Revamp GnuTLS/OpenSSL detection
Clean this up somewhat, and remove the support for building with both at
once. There's no point in that any more — GnuTLS has had DTLS support for
ages, and we've have PKCS#11 support with OpenSSL for ages. So just pick
one and use it; don't mix and match.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
Nikos Mavrogiannopoulos [Thu, 8 Sep 2016 14:46:30 +0000 (16:46 +0200)]
Extended MTU discovery to work even when compiled with openssl
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Fri, 9 Sep 2016 15:02:53 +0000 (16:02 +0100)]
CI cleanups
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 8 Sep 2016 23:29:41 +0000 (00:29 +0100)]
Fix Windows inet_pton() build warning
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 8 Sep 2016 23:14:37 +0000 (00:14 +0100)]
Enable CentOS CI builds
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 8 Sep 2016 23:13:41 +0000 (00:13 +0100)]
Allow explicit disabling of DSA tests
On CentOS7, ocserv doesn't work even when the client does.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 8 Sep 2016 23:13:24 +0000 (00:13 +0100)]
Fix configure reporting of Yubikey support
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 8 Sep 2016 23:12:25 +0000 (00:12 +0100)]
Remove unused variable from bad_dtls_test.c
Not entirely sure why only the MinGW build told me about this.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 8 Sep 2016 20:08:23 +0000 (21:08 +0100)]
Escape 'PKCS#11 support' in configure summary
Otherwise, autoconf 2.63 on CentOS6 complains:
/usr/bin/m4:configure.ac:1088: ERROR: end of file in argument list
autom4te: /usr/bin/m4 failed with exit status: 1
aclocal: autom4te failed with exit status: 1
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 8 Sep 2016 17:27:34 +0000 (18:27 +0100)]
Fix 'Got no issuer from PKCS#11' message
Make it a PRG_TRACE message, and translate it.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 8 Sep 2016 11:53:12 +0000 (12:53 +0100)]
Update translations from GNOME
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Wed, 7 Sep 2016 19:35:15 +0000 (20:35 +0100)]
Call SSL_CTX_check_private_key() to validate cert+key match
OpenSSL does this for you... *only* if the key types match. But load a
cert for an EC key, and a non-matching RSA or DSA key to go with it,
and it won't tell you. It'll just silently fail to do any authentication
on the wire.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Wed, 7 Sep 2016 14:15:34 +0000 (15:15 +0100)]
Kill --no-cert-check
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Wed, 7 Sep 2016 14:10:31 +0000 (15:10 +0100)]
Suggest using --servercert when certificate validation fails
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Tue, 6 Sep 2016 20:59:14 +0000 (21:59 +0100)]
Fix OpenSSL 1.1 build of EC workaround
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Tue, 6 Sep 2016 20:27:20 +0000 (21:27 +0100)]
Work around OpenSSL crash with EC keys lacking public key
https://github.com/openssl/openssl/issues/1532
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Tue, 6 Sep 2016 17:03:19 +0000 (18:03 +0100)]
Fix PKCS#11 error reporting
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Tue, 6 Sep 2016 16:55:45 +0000 (17:55 +0100)]
Check for errors from SSL_CTX_use_PrivateKey()
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Mon, 5 Sep 2016 11:11:51 +0000 (12:11 +0100)]
Add PKCS#11 test with CKA_PRIVATE on certs
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Mon, 5 Sep 2016 11:03:02 +0000 (12:03 +0100)]
Use --no-mark-private for all objects in token=openconnect-test1
The test with the private objects comes next...
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Mon, 5 Sep 2016 09:32:06 +0000 (10:32 +0100)]
Add pubkey-less PKCS#11 tests
Disabled for OpenSSL because it triggers a SEGV in EC_POINT_cmp() when
called from X509_check_private_key():
https://github.com/openssl/openssl/issues/1532
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Sun, 4 Sep 2016 06:14:48 +0000 (07:14 +0100)]
Put test sockdir in build dir
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Sat, 3 Sep 2016 22:57:19 +0000 (23:57 +0100)]
Create ocserv config files from configure script
When creating them from the scripts, they were overwriting each other
in parallel builds. Obviously we could just unique filenames for each
test, but this is nicer.
It does mean that the username/group is hard-coded at configure time,
but I don't think many people will ever notice or care about that.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Sat, 3 Sep 2016 22:44:06 +0000 (23:44 +0100)]
Don't discard output from ocserv in tests
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Sat, 3 Sep 2016 18:21:34 +0000 (19:21 +0100)]
Use shared runners
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Sat, 3 Sep 2016 21:14:59 +0000 (22:14 +0100)]
Fix format warning in openconnect_win32__strerror()
DWORD needs to be printed with %lx not %x.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Sat, 3 Sep 2016 18:09:34 +0000 (19:09 +0100)]
Fix compiler warning in verify_packet_seqno()
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Fri, 2 Sep 2016 10:39:36 +0000 (11:39 +0100)]
Update comment
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Fri, 2 Sep 2016 10:32:41 +0000 (11:32 +0100)]
Reorder ESP sequence checks
Make it slightly cleaner... maybe.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Fri, 2 Sep 2016 07:59:16 +0000 (08:59 +0100)]
Fix ESP replay problem
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 1 Sep 2016 22:44:44 +0000 (23:44 +0100)]
Change tar format to allow softhsm objects to fit
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 1 Sep 2016 22:38:44 +0000 (23:38 +0100)]
Add missing distfiles
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 1 Sep 2016 22:35:50 +0000 (23:35 +0100)]
Update changelog
David Woodhouse [Thu, 1 Sep 2016 22:12:58 +0000 (23:12 +0100)]
Only run test-pkcs11 if we have cwrap
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 1 Sep 2016 21:46:10 +0000 (22:46 +0100)]
Fix uninitialised cert pointer in load_pkcs11_certificate()
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 1 Sep 2016 20:41:59 +0000 (21:41 +0100)]
Disable DSA tests for GnuTLS too
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 1 Sep 2016 20:40:11 +0000 (21:40 +0100)]
Re-import SoftHSM token
Apparently renaming the directory isn't a good idea. It seems to work but
later fails.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 1 Sep 2016 20:08:34 +0000 (21:08 +0100)]
Import keys for SoftHSM with softhsm2-util
It creates public key objects too, and less goes wrong.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 1 Sep 2016 08:29:14 +0000 (09:29 +0100)]
Support pin-value= for PKCS#11 URI with OpenSSL
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 1 Sep 2016 08:19:03 +0000 (09:19 +0100)]
Fix softhsm check
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 1 Sep 2016 08:07:48 +0000 (09:07 +0100)]
FFS, eventually I'll get the condition right
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Thu, 1 Sep 2016 07:55:07 +0000 (08:55 +0100)]
PKCS#11 test shouldn't be unconditional
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Wed, 31 Aug 2016 23:53:41 +0000 (00:53 +0100)]
Enable EC PKCS#11 test
It makes libp11 crash here, but I'll deal with that shortly...
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Wed, 31 Aug 2016 23:46:44 +0000 (00:46 +0100)]
Missing auth-pkcs11
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Wed, 31 Aug 2016 23:44:34 +0000 (00:44 +0100)]
Add softhsm2.conf
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Wed, 31 Aug 2016 23:43:10 +0000 (00:43 +0100)]
Add PKCS#11 tests
Looks like we *only* accept PIN with ;pin-value= for GnuTLS, and we
*only* accept it with --key-password= for OpenSSL. Must fix...
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Wed, 31 Aug 2016 23:40:47 +0000 (00:40 +0100)]
Use --key-password for OpenSSL PKCS#11 PIN
We still don't support ;pin-value= though
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Wed, 31 Aug 2016 22:23:50 +0000 (23:23 +0100)]
Add missing user-cert.prm
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Wed, 31 Aug 2016 21:16:46 +0000 (22:16 +0100)]
More LibreSSL build fixes
Let bad_dtls_test build, although it'll fail. And cope with --with-openssl=
pointing to a LibreSSL build tree, since that's how I'm testing.
People still shouldn't be *using* this though.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
Piotr Kubaj [Wed, 31 Aug 2016 21:01:35 +0000 (22:01 +0100)]
Fix build with LibreSSL.
Signed-off-by: Piotr Kubaj <pkubaj@anongoth.pl>
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Wed, 31 Aug 2016 19:13:17 +0000 (20:13 +0100)]
Fix main.o dependency harder
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Wed, 31 Aug 2016 18:41:06 +0000 (19:41 +0100)]
Fix main.o dependency on version.c
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Wed, 31 Aug 2016 18:24:44 +0000 (19:24 +0100)]
Make MAX definition conditional to make FreeBSD happy
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Wed, 31 Aug 2016 16:46:09 +0000 (17:46 +0100)]
Remove stray key files
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Wed, 31 Aug 2016 16:42:38 +0000 (17:42 +0100)]
Add DSA and EC keys to torture tests
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Wed, 31 Aug 2016 15:26:39 +0000 (16:26 +0100)]
Fix crash in init_esp_ciphers with OpenSSL < 1.1
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Wed, 31 Aug 2016 15:00:07 +0000 (16:00 +0100)]
Add support for EC PKCS#1 certs
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
David Woodhouse [Wed, 31 Aug 2016 13:26:07 +0000 (14:26 +0100)]
We don't need cwrap for bad_dtls_test any more
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>