1. 01 6月, 2016 2 次提交
  2. 31 5月, 2016 1 次提交
  3. 28 5月, 2016 1 次提交
  4. 27 5月, 2016 1 次提交
  5. 26 5月, 2016 1 次提交
  6. 24 5月, 2016 2 次提交
  7. 23 5月, 2016 1 次提交
  8. 20 5月, 2016 4 次提交
    • R
      Rename lh_xxx,sk_xxx tp OPENSSL_{LH,SK}_xxx · 739a1eb1
      Rich Salz 提交于
      Rename sk_xxx to OPENSSL_sk_xxx and _STACK to OPENSSL_STACK
      Rename lh_xxx API to OPENSSL_LH_xxx and LHASH_NODE to OPENSSL_LH_NODE
      Make lhash stuff opaque.
      Use typedefs for function pointers; makes the code simpler.
      Remove CHECKED_xxx macros.
      Add documentation; remove old X509-oriented doc.
      Add API-compat names for entire old API
      Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
      739a1eb1
    • M
      Ensure async IO works with new state machine · 1689e7e6
      Matt Caswell 提交于
      In the new state machine if using nbio and we get the header of a
      handshake message is one record with the body in the next, with an nbio
      event in the middle, then the connection was failing. This is because
      s->init_num was getting reset. We should only reset it after we have
      read the whole message.
      
      RT#4394
      Reviewed-by: NAndy Polyakov <appro@openssl.org>
      1689e7e6
    • D
      Tighten up logic around ChangeCipherSpec. · 1257adec
      David Benjamin 提交于
      ChangeCipherSpec messages have a defined value. They also may not occur
      in the middle of a handshake message. The current logic will accept a
      ChangeCipherSpec with value 2. It also would accept up to three bytes of
      handshake data before the ChangeCipherSpec which it would discard
      (because s->init_num gets reset).
      
      Instead, require that s->init_num is 0 when a ChangeCipherSpec comes in.
      
      RT#4391
      Reviewed-by: NAndy Polyakov <appro@openssl.org>
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      1257adec
    • M
      Simplify SSL BIO buffering logic · 46417569
      Matt Caswell 提交于
      The write BIO for handshake messages is bufferred so that we only write
      out to the network when we have a complete flight. There was some
      complexity in the buffering logic so that we switched buffering on and
      off at various points through out the handshake. The only real reason to
      do this was historically it complicated the state machine when you wanted
      to flush because you had to traverse through the "flush" state (in order
      to cope with NBIO). Where we knew up front that there was only going to
      be one message in the flight we switched off buffering to avoid that.
      
      In the new state machine there is no longer a need for a flush state so
      it is simpler just to have buffering on for the whole handshake. This
      also gives us the added benefit that we can simply call flush after every
      flight even if it only has one message in it. This means that BIO authors
      can implement their own buffering strategies and not have to be aware of
      the state of the SSL object (previously they would have to switch off
      their own buffering during the handshake because they could not rely on
      a flush being received when they really needed to write data out). This
      last point addresses GitHub Issue #322.
      Reviewed-by: NAndy Polyakov <appro@openssl.org>
      46417569
  9. 19 5月, 2016 2 次提交
    • V
      When strict SCT fails record verification failure · f75b34c8
      Viktor Dukhovni 提交于
      Since with SSL_VERIFY_NONE, the connection may continue and the
      session may even be cached, we should save some evidence that the
      chain was not sufficiently verified and would have been rejected
      with SSL_VERIFY_PEER.  To that end when a CT callback returs failure
      we set the verify result to X509_V_ERR_NO_VALID_SCTS.
      
      Note: We only run the CT callback in the first place if the verify
      result is still X509_V_OK prior to start of the callback.
      
      RT #4502
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      f75b34c8
    • V
      Ensure verify error is set when X509_verify_cert() fails · f3e235ed
      Viktor Dukhovni 提交于
      Set ctx->error = X509_V_ERR_OUT_OF_MEM when verificaiton cannot
      continue due to malloc failure.  Also, when X509_verify_cert()
      returns <= 0 make sure that the verification status does not remain
      X509_V_OK, as a last resort set it it to X509_V_ERR_UNSPECIFIED,
      just in case some code path returns an error without setting an
      appropriate value of ctx->error.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      f3e235ed
  10. 18 5月, 2016 1 次提交
  11. 17 5月, 2016 8 次提交
  12. 16 5月, 2016 4 次提交
  13. 14 5月, 2016 1 次提交
  14. 13 5月, 2016 1 次提交
  15. 12 5月, 2016 2 次提交
  16. 11 5月, 2016 2 次提交
  17. 10 5月, 2016 2 次提交
  18. 09 5月, 2016 2 次提交
  19. 06 5月, 2016 2 次提交