1. 31 7月, 2017 1 次提交
  2. 12 6月, 2017 1 次提交
  3. 10 6月, 2017 1 次提交
  4. 07 6月, 2017 1 次提交
  5. 26 5月, 2017 1 次提交
  6. 22 5月, 2017 3 次提交
  7. 20 5月, 2017 1 次提交
    • M
      Fix return code in tls1_mac · aabe3a35
      Matt Caswell 提交于
      The return code from tls1_mac is supposed to be a boolean 0 for fail, 1 for
      success. In one place we returned -1 on error. This would cause code calling
      the mac function to erroneously see this as a success (because a non-zero
      value is being treated as success in all call sites).
      
      Fortunately, AFAICT, the place that returns -1 can only happen on an
      internal error so is not under attacker control. Additionally this code only
      appears in master. In 1.1.0 the return codes are treated differently.
      Therefore there are no security implications.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/3495)
      aabe3a35
  8. 19 5月, 2017 1 次提交
    • M
      Try to be more consistent about the alerts we send · fb34a0f4
      Matt Caswell 提交于
      We are quite inconsistent about which alerts get sent. Specifically, these
      alerts should be used (normally) in the following circumstances:
      
      SSL_AD_DECODE_ERROR = The peer sent a syntactically incorrect message
      SSL_AD_ILLEGAL_PARAMETER = The peer sent a message which was syntactically
      correct, but a parameter given is invalid for the context
      SSL_AD_HANDSHAKE_FAILURE = The peer's messages were syntactically and
      semantically correct, but the parameters provided were unacceptable to us
      (e.g. because we do not support the requested parameters)
      SSL_AD_INTERNAL_ERROR = We messed up (e.g. malloc failure)
      
      The standards themselves aren't always consistent but I think the above
      represents the best interpretation.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/3480)
      fb34a0f4
  9. 17 5月, 2017 1 次提交
    • M
      Don't allow fragmented alerts · bd990e25
      Matt Caswell 提交于
      An alert message is 2 bytes long. In theory it is permissible in SSLv3 -
      TLSv1.2 to fragment such alerts across multiple records (some of which
      could be empty). In practice it make no sense to send an empty alert
      record, or to fragment one. TLSv1.3 prohibts this altogether and other
      libraries (BoringSSL, NSS) do not support this at all. Supporting it adds
      significant complexity to the record layer, and its removal is unlikely
      to cause inter-operability issues.
      
      The DTLS code for this never worked anyway and it is not supported at a
      protocol level for DTLS. Similarly fragmented DTLS handshake records only
      work at a protocol level where at least the handshake message header
      exists within the record. DTLS code existed for trying to handle fragmented
      handshake records smaller than this size. This code didn't work either so
      has also been removed.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/3476)
      bd990e25
  10. 11 5月, 2017 5 次提交
  11. 08 5月, 2017 1 次提交
  12. 04 5月, 2017 1 次提交
  13. 02 5月, 2017 1 次提交
  14. 25 4月, 2017 2 次提交
  15. 20 4月, 2017 1 次提交
  16. 11 4月, 2017 1 次提交
  17. 04 4月, 2017 1 次提交
  18. 30 3月, 2017 1 次提交
  19. 29 3月, 2017 1 次提交
  20. 16 3月, 2017 1 次提交
  21. 15 3月, 2017 1 次提交
  22. 08 3月, 2017 2 次提交
  23. 07 3月, 2017 1 次提交
  24. 03 3月, 2017 8 次提交
  25. 02 3月, 2017 1 次提交