1. 28 9月, 2019 1 次提交
  2. 10 9月, 2019 1 次提交
  3. 06 9月, 2019 1 次提交
  4. 04 9月, 2019 2 次提交
  5. 14 8月, 2019 2 次提交
  6. 06 8月, 2019 1 次提交
    • M
      Fix SSL_MODE_RELEASE_BUFFERS functionality · f2bb79a7
      Matt Caswell 提交于
      At some point in the past do_ssl3_write() used to return the number of
      bytes written, or a value <= 0 on error. It now just returns a success/
      error code and writes the number of bytes written to |tmpwrit|.
      
      The SSL_MODE_RELEASE_BUFFERS code was still looking at the return code
      for the number of bytes written rather than |tmpwrit|. This has the effect
      that the buffers are not released when they are supposed to be.
      
      Fixes #9490
      Reviewed-by: NPaul Dale <paul.dale@oracle.com>
      (Merged from https://github.com/openssl/openssl/pull/9505)
      
      (cherry picked from commit 8bbf63e48f27c5edaa03e6d87d969c9b6a207f3c)
      f2bb79a7
  7. 01 8月, 2019 1 次提交
  8. 26 7月, 2019 1 次提交
  9. 17 7月, 2019 1 次提交
  10. 16 7月, 2019 2 次提交
  11. 27 6月, 2019 2 次提交
  12. 18 6月, 2019 3 次提交
  13. 03 6月, 2019 1 次提交
    • M
      Defer sending a KeyUpdate until after pending writes are complete · 6c2f347c
      Matt Caswell 提交于
      If we receive a KeyUpdate message (update requested) from the peer while
      we are in the middle of a write, we should defer sending the responding
      KeyUpdate message until after the current write is complete. We do this
      by waiting to send the KeyUpdate until the next time we write and there is
      no pending write data.
      
      This does imply a subtle change in behaviour. Firstly the responding
      KeyUpdate message won't be sent straight away as it is now. Secondly if
      the peer sends multiple KeyUpdates without us doing any writing then we
      will only send one response, as opposed to previously where we sent a
      response for each KeyUpdate received.
      
      Fixes #8677
      Reviewed-by: NBen Kaduk <kaduk@mit.edu>
      (Merged from https://github.com/openssl/openssl/pull/8773)
      
      (cherry picked from commit feb9e31c40c49de6384dd0413685e9b5a15adc99)
      6c2f347c
  14. 30 5月, 2019 1 次提交
  15. 28 5月, 2019 1 次提交
  16. 21 5月, 2019 1 次提交
  17. 19 4月, 2019 1 次提交
  18. 10 4月, 2019 1 次提交
  19. 28 3月, 2019 1 次提交
  20. 05 3月, 2019 1 次提交
  21. 26 2月, 2019 1 次提交
  22. 23 2月, 2019 1 次提交
  23. 19 2月, 2019 1 次提交
  24. 15 2月, 2019 1 次提交
    • M
      Don't signal SSL_CB_HANDSHAKE_START for TLSv1.3 post-handshake messages · 37857e9b
      Matt Caswell 提交于
      The original 1.1.1 design was to use SSL_CB_HANDSHAKE_START and
      SSL_CB_HANDSHAKE_DONE to signal start/end of a post-handshake message
      exchange in TLSv1.3. Unfortunately experience has shown that this confuses
      some applications who mistake it for a TLSv1.2 renegotiation. This means
      that KeyUpdate messages are not handled properly.
      
      This commit removes the use of SSL_CB_HANDSHAKE_START and
      SSL_CB_HANDSHAKE_DONE to signal the start/end of a post-handshake
      message exchange. Individual post-handshake messages are still signalled in
      the normal way.
      
      This is a potentially breaking change if there are any applications already
      written that expect to see these TLSv1.3 events. However, without it,
      KeyUpdate is not currently usable for many applications.
      
      Fixes #8069
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/8096)
      
      (cherry picked from commit 4af5836b55442f31795eff6c8c81ea7a1b8cf94b)
      37857e9b
  25. 14 2月, 2019 1 次提交
  26. 05 2月, 2019 1 次提交
  27. 01 2月, 2019 1 次提交
  28. 24 1月, 2019 1 次提交
  29. 15 1月, 2019 2 次提交
  30. 09 1月, 2019 1 次提交
    • M
      Don't artificially limit the size of the ClientHello · bbcfd60e
      Matt Caswell 提交于
      We were setting a limit of SSL3_RT_MAX_PLAIN_LENGTH on the size of the
      ClientHello. AFAIK there is nothing in the standards that requires this
      limit.
      
      The limit goes all the way back to when support for extensions was first
      added for TLSv1.0. It got converted into a WPACKET max size in 1.1.1. Most
      likely it was originally added to avoid the complexity of having to grow
      the init_buf in the middle of adding extensions. With WPACKET this is
      irrelevant since it will grow automatically.
      
      This issue came up when an attempt was made to send a very large
      certificate_authorities extension in the ClientHello.
      
      We should just remove the limit.
      Reviewed-by: NPaul Dale <paul.dale@oracle.com>
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/7424)
      
      (cherry picked from commit 7835e97b6ff5cd94a10c5aeac439f4aa145a77b2)
      bbcfd60e
  31. 08 1月, 2019 1 次提交
    • V
      More configurable crypto and ssl library initialization · 25eb9299
      Viktor Dukhovni 提交于
      1.  In addition to overriding the default application name,
          one can now also override the configuration file name
          and flags passed to CONF_modules_load_file().
      
      2.  By default we still keep going when configuration file
          processing fails.  But, applications that want to be
          strict about initialization errors can now make explicit
          flag choices via non-null OPENSSL_INIT_SETTINGS that omit
          the CONF_MFLAGS_IGNORE_RETURN_CODES flag (which had so far
          been both undocumented and unused).
      
      3.  In OPENSSL_init_ssl() do not request OPENSSL_INIT_LOAD_CONFIG
          if the options already include OPENSSL_INIT_NO_LOAD_CONFIG.
      
      4.  Don't set up atexit() handlers when called with opts equal to
          OPENSSL_INIT_BASE_ONLY (this flag should only be used alone).
      Reviewed-by: NBernd Edlinger <bernd.edlinger@hotmail.de>
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/7969)
      25eb9299
  32. 07 1月, 2019 1 次提交
  33. 06 1月, 2019 1 次提交