1. 22 1月, 2019 1 次提交
  2. 21 1月, 2019 3 次提交
  3. 17 1月, 2019 3 次提交
  4. 16 1月, 2019 1 次提交
  5. 15 1月, 2019 4 次提交
  6. 09 1月, 2019 1 次提交
    • M
      Don't artificially limit the size of the ClientHello · bbcfd60e
      Matt Caswell 提交于
      We were setting a limit of SSL3_RT_MAX_PLAIN_LENGTH on the size of the
      ClientHello. AFAIK there is nothing in the standards that requires this
      limit.
      
      The limit goes all the way back to when support for extensions was first
      added for TLSv1.0. It got converted into a WPACKET max size in 1.1.1. Most
      likely it was originally added to avoid the complexity of having to grow
      the init_buf in the middle of adding extensions. With WPACKET this is
      irrelevant since it will grow automatically.
      
      This issue came up when an attempt was made to send a very large
      certificate_authorities extension in the ClientHello.
      
      We should just remove the limit.
      Reviewed-by: NPaul Dale <paul.dale@oracle.com>
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/7424)
      
      (cherry picked from commit 7835e97b6ff5cd94a10c5aeac439f4aa145a77b2)
      bbcfd60e
  7. 08 1月, 2019 3 次提交
  8. 07 1月, 2019 3 次提交
  9. 06 1月, 2019 2 次提交
  10. 05 1月, 2019 7 次提交
  11. 03 1月, 2019 3 次提交
  12. 31 12月, 2018 2 次提交
  13. 29 12月, 2018 1 次提交
  14. 28 12月, 2018 1 次提交
  15. 23 12月, 2018 4 次提交
  16. 20 12月, 2018 1 次提交
    • K
      Admit unknown pkey types at security level 0 · ea7d2c58
      Ken Goldman 提交于
      The check_key_level() function currently fails when the public key
      cannot be extracted from the certificate because its algorithm is not
      supported.  However, the public key is not needed for the last
      certificate in the chain.
      
      This change moves the check for level 0 before the check for a
      non-NULL public key.
      
      For background, this is the TPM 1.2 endorsement key certificate.
      I.e., this is a real application with millions of certificates issued.
      The key is an RSA-2048 key.
      
      The TCG (for a while) specified
      
           Public Key Algorithm: rsaesOaep
      
      rather than the commonly used
      
           Public Key Algorithm: rsaEncryption
      
      because the key is an encryption key rather than a signing key.
      The X509 certificate parser fails to get the public key.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/7906)
      ea7d2c58