1. 14 11月, 2015 2 次提交
  2. 10 11月, 2015 1 次提交
  3. 06 11月, 2015 1 次提交
    • M
      Don't finish the handshake twice · e6575156
      Matt Caswell 提交于
      We finish the handshake when we move into the TLS_ST_OK state. At various
      points we were also unnecessarily finishing it when we were reading/writing
      the Finished message. It's much simpler just to do it in TLS_ST_OK, so
      remove the other calls.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      e6575156
  4. 30 10月, 2015 17 次提交
  5. 24 10月, 2015 2 次提交
  6. 08 10月, 2015 1 次提交
  7. 28 9月, 2015 2 次提交
  8. 23 9月, 2015 1 次提交
  9. 18 9月, 2015 1 次提交
  10. 07 9月, 2015 2 次提交
  11. 01 9月, 2015 1 次提交
  12. 15 8月, 2015 2 次提交
  13. 14 8月, 2015 1 次提交
  14. 13 8月, 2015 1 次提交
  15. 12 8月, 2015 2 次提交
  16. 03 8月, 2015 1 次提交
    • M
      Move TLS CCS processing into the state machine · 657da85e
      Matt Caswell 提交于
      The handling of incoming CCS records is a little strange. Since CCS is not
      a handshake message it is handled differently to normal handshake messages.
      Unfortunately whilst technically it is not a handhshake message the reality
      is that it must be processed in accordance with the state of the handshake.
      Currently CCS records are processed entirely within the record layer. In
      order to ensure that it is handled in accordance with the handshake state
      a flag is used to indicate that it is an acceptable time to receive a CCS.
      
      Previously this flag did not exist (see CVE-2014-0224), but the flag should
      only really be considered a workaround for the problem that CCS is not
      visible to the state machine.
      
      Outgoing CCS messages are already handled within the state machine.
      
      This patch makes CCS visible to the TLS state machine. A separate commit
      will handle DTLS.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      657da85e
  17. 30 7月, 2015 2 次提交
    • D
      cleanse psk_identity on error · 3df16cc2
      Dr. Stephen Henson 提交于
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      3df16cc2
    • D
      Extended PSK client support. · 7689082b
      Dr. Stephen Henson 提交于
      Add support for RSAPSK, DHEPSK and ECDHEPSK client side.
      
      Update various checks to ensure certificate and server key exchange messages
      are only expected when required.
      
      Update message handling. PSK server key exchange parsing now expects an
      identity hint prefix for all PSK server key exchange messages. PSK
      client key exchange message requests PSK identity and key for all PSK
      key exchange ciphersuites and includes identity in message.
      
      Update flags for RSA, DH and ECDH so they are also used in PSK.
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      7689082b