1. 19 3月, 2018 1 次提交
  2. 13 3月, 2018 1 次提交
  3. 12 3月, 2018 1 次提交
  4. 08 12月, 2017 1 次提交
  5. 04 12月, 2017 1 次提交
  6. 30 10月, 2017 1 次提交
  7. 18 10月, 2017 1 次提交
  8. 09 10月, 2017 1 次提交
  9. 04 10月, 2017 1 次提交
    • T
      Session resume broken switching contexts · a84e5c9a
      Todd Short 提交于
      When an SSL's context is swtiched from a ticket-enabled context to
      a ticket-disabled context in the servername callback, no session-id
      is generated, so the session can't be resumed.
      
      If a servername callback changes the SSL_OP_NO_TICKET option, check
      to see if it's changed to disable, and whether a session ticket is
      expected (i.e. the client indicated ticket support and the SSL had
      tickets enabled at the time), and whether we already have a previous
      session (i.e. s->hit is set).
      
      In this case, clear the ticket-expected flag, remove any ticket data
      and generate a session-id in the session.
      
      If the SSL hit (resumed) and switched to a ticket-disabled context,
      assume that the resumption was via session-id, and don't bother to
      update the session.
      
      Before this fix, the updated unit-tests in 06-sni-ticket.conf would
      fail test #4 (server1 = SNI, server2 = no SNI).
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      Reviewed-by: NPaul Dale <paul.dale@oracle.com>
      (Merged from https://github.com/openssl/openssl/pull/1529)
      a84e5c9a
  10. 29 9月, 2017 1 次提交
  11. 31 8月, 2017 2 次提交
  12. 30 8月, 2017 2 次提交
  13. 25 8月, 2017 1 次提交
  14. 09 8月, 2017 1 次提交
  15. 03 8月, 2017 3 次提交
  16. 07 7月, 2017 2 次提交
  17. 29 6月, 2017 1 次提交
  18. 21 6月, 2017 3 次提交
  19. 03 6月, 2017 1 次提交
  20. 19 5月, 2017 1 次提交
    • M
      Try to be more consistent about the alerts we send · fb34a0f4
      Matt Caswell 提交于
      We are quite inconsistent about which alerts get sent. Specifically, these
      alerts should be used (normally) in the following circumstances:
      
      SSL_AD_DECODE_ERROR = The peer sent a syntactically incorrect message
      SSL_AD_ILLEGAL_PARAMETER = The peer sent a message which was syntactically
      correct, but a parameter given is invalid for the context
      SSL_AD_HANDSHAKE_FAILURE = The peer's messages were syntactically and
      semantically correct, but the parameters provided were unacceptable to us
      (e.g. because we do not support the requested parameters)
      SSL_AD_INTERNAL_ERROR = We messed up (e.g. malloc failure)
      
      The standards themselves aren't always consistent but I think the above
      represents the best interpretation.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/3480)
      fb34a0f4
  21. 26 4月, 2017 1 次提交
  22. 07 4月, 2017 1 次提交
  23. 08 3月, 2017 1 次提交
  24. 03 3月, 2017 2 次提交
  25. 28 2月, 2017 1 次提交
  26. 30 1月, 2017 7 次提交