summaryrefslogtreecommitdiffstats
path: root/demos/certs (follow)
Commit message (Collapse)AuthorAgeFilesLines
* demos: fix cert scriptsJames Muir2023-12-295-55/+84
| | | | | | | | | | | | | | set LD_LIBRARY_PATH so the correct libs can be found. Testing: cd demos/certs && sh mkcerts.sh cd demos/certs/apps && sh -x mkacerts.sh Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Paul Yang <kaishen.yy@antfin.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23142)
* Add config_diagnostics to our configuration files.Pauli2021-08-042-0/+7
| | | | | | | | | | | | | | | | The change to a more configuration based approach to enable FIPS mode operation highlights a shortcoming in the default should do something approach we've taken for bad configuration files. Currently, a bad configuration file will be automatically loaded and once the badness is detected, it will silently stop processing the configuration and continue normal operations. This is good for remote servers, allowing changes to be made without bricking things. It's bad when a user thinks they've configured what they want but got something wrong and it still appears to work. Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/16171)
* Rename NOTES*, README*, VERSION, HACKING, LICENSE to .md or .txtDr. David von Oheimb2020-07-051-3/+0
| | | | | Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/12109)
* Cleanup cert config files for testsRich Salz2020-06-032-12/+0
| | | | | | | | | | Merge test/P[12]ss.cnf into one config file Merge CAss.cnf and Uss.cnf into ca-and-certs.cnf Remove Netscape cert extensions, add keyUsage comment from some cnf files Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11347)
* Remove RANDFILE settings from configuration filesDr. Matthias St. Pierre2019-11-242-2/+0
| | | | | | | | | | | | | | OpenSSL 1.1.1 introduced a new CSPRNG with an improved seeding mechanism, which makes it dispensable to define a RANDFILE for saving and restoring randomness. This commit removes the RANDFILE declarations from our own configuration files and adds documentation that this option is not needed anymore and retained mainly for compatibility reasons. Fixes #10433 Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/10436)
* Remove unnecessary trailing whitespaceSam Roberts2019-02-053-3/+3
| | | | | | | | | | | | Trim trailing whitespace. It doesn't match OpenSSL coding standards, AFAICT, and it can cause problems with git tooling. Trailing whitespace remains in test data and external source. Reviewed-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/8092)
* misspellings fixes by https://github.com/vlajos/misspell_fixerVeres Lajos2013-09-052-2/+2
|
* oops, revert, committed in errorDr. Stephen Henson2012-12-152-4/+1
|
* apps/ocsp.cDr. Stephen Henson2012-12-152-1/+4
|
* typoDr. Stephen Henson2012-10-271-1/+1
|
* update READMEDr. Stephen Henson2012-09-091-4/+16
|
* Extend certificate creation examples to include CRL generation and sampleDr. Stephen Henson2012-09-094-7/+99
| | | | scripts running the test OCSP responder.
* make EC test certificates usable for ECDHDr. Stephen Henson2012-08-312-2/+13
|
* Add certificate callback. If set this is called whenever a certificateDr. Stephen Henson2012-06-291-0/+29
| | | | | | | | | is required by client or server. An application can decide which certificate chain to present based on arbitrary criteria: for example supported signature algorithms. Add very simple example to s_server. This fixes many of the problems and restrictions of the existing client certificate callback: for example you can now clear existing certificates and specify the whole chain.
* oops, revert unrelated changesDr. Stephen Henson2012-02-091-4/+1
|
* Modify client hello version when renegotiating to enhance interop withDr. Stephen Henson2012-02-091-1/+4
| | | | some servers.
* add example for DH certificate generationDr. Stephen Henson2012-01-252-1/+44
|
* Add private keys and generation scripts for test certificates in appsDr. Stephen Henson2011-12-147-0/+238
| | | | directory.
* Simple automated certificate creation demo.Dr. Stephen Henson2011-06-013-0/+91