1. 04 10月, 2017 1 次提交
    • T
      Session resume broken switching contexts · a84e5c9a
      Todd Short 提交于
      When an SSL's context is swtiched from a ticket-enabled context to
      a ticket-disabled context in the servername callback, no session-id
      is generated, so the session can't be resumed.
      
      If a servername callback changes the SSL_OP_NO_TICKET option, check
      to see if it's changed to disable, and whether a session ticket is
      expected (i.e. the client indicated ticket support and the SSL had
      tickets enabled at the time), and whether we already have a previous
      session (i.e. s->hit is set).
      
      In this case, clear the ticket-expected flag, remove any ticket data
      and generate a session-id in the session.
      
      If the SSL hit (resumed) and switched to a ticket-disabled context,
      assume that the resumption was via session-id, and don't bother to
      update the session.
      
      Before this fix, the updated unit-tests in 06-sni-ticket.conf would
      fail test #4 (server1 = SNI, server2 = no SNI).
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      Reviewed-by: NPaul Dale <paul.dale@oracle.com>
      (Merged from https://github.com/openssl/openssl/pull/1529)
      a84e5c9a
  2. 29 9月, 2017 1 次提交
  3. 31 8月, 2017 2 次提交
  4. 30 8月, 2017 2 次提交
  5. 25 8月, 2017 1 次提交
  6. 09 8月, 2017 1 次提交
  7. 03 8月, 2017 3 次提交
  8. 07 7月, 2017 2 次提交
  9. 29 6月, 2017 1 次提交
  10. 21 6月, 2017 3 次提交
  11. 03 6月, 2017 1 次提交
  12. 19 5月, 2017 1 次提交
    • M
      Try to be more consistent about the alerts we send · fb34a0f4
      Matt Caswell 提交于
      We are quite inconsistent about which alerts get sent. Specifically, these
      alerts should be used (normally) in the following circumstances:
      
      SSL_AD_DECODE_ERROR = The peer sent a syntactically incorrect message
      SSL_AD_ILLEGAL_PARAMETER = The peer sent a message which was syntactically
      correct, but a parameter given is invalid for the context
      SSL_AD_HANDSHAKE_FAILURE = The peer's messages were syntactically and
      semantically correct, but the parameters provided were unacceptable to us
      (e.g. because we do not support the requested parameters)
      SSL_AD_INTERNAL_ERROR = We messed up (e.g. malloc failure)
      
      The standards themselves aren't always consistent but I think the above
      represents the best interpretation.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/3480)
      fb34a0f4
  13. 26 4月, 2017 1 次提交
  14. 07 4月, 2017 1 次提交
  15. 08 3月, 2017 1 次提交
  16. 03 3月, 2017 2 次提交
  17. 28 2月, 2017 1 次提交
  18. 30 1月, 2017 9 次提交
  19. 24 1月, 2017 1 次提交
  20. 10 1月, 2017 2 次提交
  21. 18 11月, 2016 1 次提交
  22. 16 11月, 2016 1 次提交
    • M
      Add a TLS version consistency check during session resumption · c87386a2
      Matt Caswell 提交于
      This is a temporary fix for while we are still using the old session
      resumption logic in the TLSv1.3 code. Due to differences in EXTMS support
      we can't resume a <=TLSv1.2 session in a TLSv1.3 connection (the EXTMS
      consistency check causes the connection to abort). This causes test
      failures.
      
      Ultimately we will rewrite the session resumption logic for TLSv1.3 so this
      problem will go away. But until then we need a quick fix to keep the tests
      happy.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      c87386a2
  23. 10 11月, 2016 1 次提交