1. 23 8月, 2018 1 次提交
  2. 22 8月, 2018 4 次提交
    • M
      Fix BoringSSL external test failures · 2fe3e2b6
      Matt Caswell 提交于
      We recently turned on the TLSv1.3 downgrade sentinels by default.
      Unfortunately we are using a very old version of the BoringSSL test
      runner which uses an old draft implementation of TLSv1.3 that also
      uses the downgrade sentinels by default. The two implementations do
      not play well together and were causing spurious test failures. Until
      such time as we update the BoringSSL test runner we disable the failing
      tests:
      
      SendFallbackSCSV
      
      In this test the client is OpenSSL and the server is the boring test runner.
      The client and server fail to negotiate TLSv1.3 because the test runner is
      using an old draft TLSv1.3 version. The server does however add the
      TLSv1.3->TLSv1.2 downgrade sentinel in the ServerHello random. Since we
      recently turned on checking of the downgrade sentinels on the client side
      this causes the connection to fail.
      
      VersionNegotiationExtension-TLS11
      
      In this test the test runner is the client and OpenSSL is the server. The
      test modifies the supported_versions extension sent by the client to only
      include TLSv1.1 (and some other spurious versions), even though the client
      does actually support TLSv1.2. The server successfully selects TLSv1.1, but
      adds the TLSv1.3->TLSv1.1 downgrade sentinel. This behaviour was recently
      switched on by default. The test runner then checks the downgrade sentinel
      and aborts the connection because it knows that it really supports TLSv1.2.
      
      VersionNegotiationExtension-TLS1
      VersionNegotiationExtension-SSL3
      
      The same as VersionNegotiationExtension-TLS11 but for TLSv1 and SSLv3.
      
      ConflictingVersionNegotiation
      
      In this test the client is the test runner, and OpenSSL is the server. The
      client offers TLSv1.2 in ClientHello.version, but also adds a
      supported_versions extension that only offers TLSv1.1. The
      supported_versions extension takes precedence and the server (correctly)
      selects TLSv1.1. However it also adds the TLSv1.3->TLSv1.1 downgrade
      sentinel. On the client side it knows it actually offered TLSv1.2 and so the
      downgrade sentinel check fails.
      
      [extended tests]
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/7013)
      2fe3e2b6
    • M
    • M
    • P
      Zero memory in CRYPTO_secure_malloc. · 3b8e97ab
      Pauli 提交于
      This commit destroys the free list pointers which would otherwise be
      present in the returned memory blocks.  This in turn helps prevent
      information leakage from the secure memory area.
      
      Note: CRYPTO_secure_malloc is not guaranteed to return zeroed memory:
      before the secure memory system is initialised or if it isn't implemented.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      Reviewed-by: NMatthias St. Pierre <Matthias.St.Pierre@ncp-e.com>
      (Merged from https://github.com/openssl/openssl/pull/7011)
      3b8e97ab
  3. 21 8月, 2018 1 次提交
  4. 20 8月, 2018 3 次提交
  5. 18 8月, 2018 1 次提交
  6. 15 8月, 2018 4 次提交
  7. 09 8月, 2018 1 次提交
  8. 08 8月, 2018 2 次提交
  9. 07 8月, 2018 2 次提交
  10. 31 7月, 2018 2 次提交
  11. 30 7月, 2018 1 次提交
  12. 27 7月, 2018 1 次提交
    • B
      Fix ossl_shim SNI handling · 45a23530
      Benjamin Kaduk 提交于
      To start with, actually set an SNI callback (copied from bssl_shim); we
      weren't actually testing much otherwise (and just happened to have been
      passing due to buggy libssl behavior prior to
      commit 1c4aa31d).
      
      Also use proper C++ code for handling C strings -- when a C API
      (SSL_get_servername()) returns NULL instead of a string, special-case
      that instead of blindly trying to compare NULL against a std::string,
      and perform the comparsion using the std::string operators instead of
      falling back to pointer comparison.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/6792)
      45a23530
  13. 20 7月, 2018 2 次提交
  14. 19 7月, 2018 1 次提交
  15. 18 7月, 2018 1 次提交
  16. 17 7月, 2018 4 次提交
  17. 16 7月, 2018 2 次提交
  18. 14 7月, 2018 1 次提交
  19. 11 7月, 2018 1 次提交
  20. 10 7月, 2018 1 次提交
  21. 06 7月, 2018 2 次提交
  22. 04 7月, 2018 2 次提交