1. 28 9月, 2019 1 次提交
  2. 26 2月, 2019 1 次提交
  3. 15 2月, 2019 1 次提交
    • M
      Don't signal SSL_CB_HANDSHAKE_START for TLSv1.3 post-handshake messages · 37857e9b
      Matt Caswell 提交于
      The original 1.1.1 design was to use SSL_CB_HANDSHAKE_START and
      SSL_CB_HANDSHAKE_DONE to signal start/end of a post-handshake message
      exchange in TLSv1.3. Unfortunately experience has shown that this confuses
      some applications who mistake it for a TLSv1.2 renegotiation. This means
      that KeyUpdate messages are not handled properly.
      
      This commit removes the use of SSL_CB_HANDSHAKE_START and
      SSL_CB_HANDSHAKE_DONE to signal the start/end of a post-handshake
      message exchange. Individual post-handshake messages are still signalled in
      the normal way.
      
      This is a potentially breaking change if there are any applications already
      written that expect to see these TLSv1.3 events. However, without it,
      KeyUpdate is not currently usable for many applications.
      
      Fixes #8069
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/8096)
      
      (cherry picked from commit 4af5836b55442f31795eff6c8c81ea7a1b8cf94b)
      37857e9b
  4. 12 9月, 2018 1 次提交
  5. 08 8月, 2018 1 次提交
  6. 20 7月, 2018 1 次提交
  7. 19 7月, 2018 1 次提交
  8. 08 5月, 2018 1 次提交
  9. 19 3月, 2018 1 次提交
  10. 26 2月, 2018 1 次提交
  11. 13 2月, 2018 1 次提交
  12. 03 2月, 2018 1 次提交
  13. 25 1月, 2018 1 次提交
  14. 06 12月, 2017 1 次提交
    • M
      Fix the check_fatal macro · e1dd8fa0
      Matt Caswell 提交于
      The check_fatal macro is supposed to only be called if we are already
      expecting to be in the fatal state. The macro asserts that we are and
      puts us into the fatal state if not.
      
      This issue combined with the problem fixed in the previous commit meant
      that the fuzzer detected a crash at a point in the processing when we
      should have already been in the fatal state.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/4847)
      e1dd8fa0
  15. 04 12月, 2017 6 次提交
  16. 30 8月, 2017 3 次提交
  17. 03 8月, 2017 1 次提交
    • R
      Switch from ossl_rand to DRBG rand · 75e2c877
      Rich Salz 提交于
      If RAND_add wraps around, XOR with existing. Add test to drbgtest that
      does the wrap-around.
      
      Re-order seeding and stop after first success.
      
      Add RAND_poll_ex()
      
      Use the DF and therefore lower RANDOMNESS_NEEDED.  Also, for child DRBG's,
      mix in the address as the personalization bits.
      
      Centralize the entropy callbacks, from drbg_lib to rand_lib.
      (Conceptually, entropy is part of the enclosing application.)
      Thanks to Dr. Matthias St Pierre for the suggestion.
      
      Various code cleanups:
          -Make state an enum; inline RANDerr calls.
          -Add RAND_POLL_RETRIES (thanks Pauli for the idea)
          -Remove most RAND_seed calls from rest of library
          -Rename DRBG_CTX to RAND_DRBG, etc.
          -Move some code from drbg_lib to drbg_rand; drbg_lib is now only the
           implementation of NIST DRBG.
          -Remove blocklength
      Reviewed-by: NPaul Dale <paul.dale@oracle.com>
      (Merged from https://github.com/openssl/openssl/pull/4019)
      75e2c877
  18. 18 7月, 2017 1 次提交
  19. 21 6月, 2017 1 次提交
  20. 25 4月, 2017 1 次提交
  21. 20 4月, 2017 1 次提交
  22. 16 3月, 2017 1 次提交
  23. 03 3月, 2017 9 次提交
  24. 24 2月, 2017 1 次提交
  25. 30 1月, 2017 1 次提交