1. 15 10月, 2014 5 次提交
  2. 10 10月, 2014 1 次提交
  3. 01 10月, 2014 1 次提交
  4. 25 9月, 2014 1 次提交
  5. 24 9月, 2014 2 次提交
  6. 21 9月, 2014 1 次提交
  7. 10 9月, 2014 1 次提交
  8. 08 9月, 2014 3 次提交
  9. 05 9月, 2014 1 次提交
    • A
      psk_client_callback, 128-byte id bug. · be0d8517
      Adam Langley 提交于
      Fix a bug in handling of 128 byte long PSK identity in
      psk_client_callback.
      
      OpenSSL supports PSK identities of up to (and including) 128 bytes in
      length. PSK identity is obtained via the psk_client_callback,
      implementors of which are expected to provide a NULL-terminated
      identity. However, the callback is invoked with only 128 bytes of
      storage thus making it impossible to return a 128 byte long identity and
      the required additional NULL byte.
      
      This CL fixes the issue by passing in a 129 byte long buffer into the
      psk_client_callback. As a safety precaution, this CL also zeroes out the
      buffer before passing it into the callback, uses strnlen for obtaining
      the length of the identity returned by the callback, and aborts the
      handshake if the identity (without the NULL terminator) is longer than
      128 bytes.
      
      (Original patch amended to achieve strnlen in a different way.)
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      be0d8517
  10. 29 8月, 2014 9 次提交
  11. 28 8月, 2014 1 次提交
  12. 22 8月, 2014 1 次提交
  13. 20 8月, 2014 1 次提交
  14. 19 8月, 2014 1 次提交
  15. 18 8月, 2014 1 次提交
  16. 16 8月, 2014 2 次提交
  17. 15 8月, 2014 3 次提交
  18. 14 8月, 2014 1 次提交
  19. 09 8月, 2014 3 次提交
  20. 07 8月, 2014 1 次提交