1. 21 6月, 2017 2 次提交
  2. 03 6月, 2017 1 次提交
  3. 19 5月, 2017 1 次提交
    • M
      Try to be more consistent about the alerts we send · fb34a0f4
      Matt Caswell 提交于
      We are quite inconsistent about which alerts get sent. Specifically, these
      alerts should be used (normally) in the following circumstances:
      
      SSL_AD_DECODE_ERROR = The peer sent a syntactically incorrect message
      SSL_AD_ILLEGAL_PARAMETER = The peer sent a message which was syntactically
      correct, but a parameter given is invalid for the context
      SSL_AD_HANDSHAKE_FAILURE = The peer's messages were syntactically and
      semantically correct, but the parameters provided were unacceptable to us
      (e.g. because we do not support the requested parameters)
      SSL_AD_INTERNAL_ERROR = We messed up (e.g. malloc failure)
      
      The standards themselves aren't always consistent but I think the above
      represents the best interpretation.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/3480)
      fb34a0f4
  4. 26 4月, 2017 1 次提交
  5. 07 4月, 2017 1 次提交
  6. 08 3月, 2017 1 次提交
  7. 03 3月, 2017 2 次提交
  8. 28 2月, 2017 1 次提交
  9. 30 1月, 2017 9 次提交
  10. 24 1月, 2017 1 次提交
  11. 10 1月, 2017 2 次提交
  12. 18 11月, 2016 1 次提交
  13. 16 11月, 2016 1 次提交
    • M
      Add a TLS version consistency check during session resumption · c87386a2
      Matt Caswell 提交于
      This is a temporary fix for while we are still using the old session
      resumption logic in the TLSv1.3 code. Due to differences in EXTMS support
      we can't resume a <=TLSv1.2 session in a TLSv1.3 connection (the EXTMS
      consistency check causes the connection to abort). This causes test
      failures.
      
      Ultimately we will rewrite the session resumption logic for TLSv1.3 so this
      problem will go away. But until then we need a quick fix to keep the tests
      happy.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      c87386a2
  14. 10 11月, 2016 1 次提交
  15. 09 11月, 2016 2 次提交
  16. 04 11月, 2016 1 次提交
  17. 02 11月, 2016 1 次提交
  18. 18 8月, 2016 1 次提交
  19. 17 8月, 2016 2 次提交
  20. 13 8月, 2016 1 次提交
  21. 20 7月, 2016 1 次提交
  22. 19 7月, 2016 1 次提交
  23. 15 6月, 2016 1 次提交
    • K
      Initialize the session_id · 947f3156
      Kurt Roeckx 提交于
      ssl_session_hash() always looks at the first 4 bytes, regardless of the length.
      A client can send a session id that's shorter, and the callback could also
      generate one that's shorter.  So we make sure that the rest of the buffer is
      initliazed to 0 so that we always calculate the same hash.
      
      Found by tis-interpreter, also previously reported as RT #2871
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      
      MR: #2911
      947f3156
  24. 14 6月, 2016 1 次提交
    • M
      Ensure SSL_set_session clears the old session from cache if it is bad · e70656cf
      Matt Caswell 提交于
      SSL_clear() and SSL_free() will remove a session from the cache if it is
      considered "bad". However SSL_set_session() does not do this for the session
      it is replacing.
      
      SSL_clear() clears an SSL object ready for reuse. It does not clear the
      session though. This means that:
      
        SSL_clear(s)
        SSL_set_session(s, sess);
      
      and
        SSL_set_session(s, sess);
        SSL_clear(s);
      
      do not do the same thing, although logically you would expect that they
      would.
      
      The failure of SSL_set_session() to remove bad sessions from the cache
      should be considered a bug, so this commit fixes it.
      
      RT#597
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      e70656cf
  25. 08 6月, 2016 1 次提交
  26. 01 6月, 2016 2 次提交