Skip to content
  1. Jan 24, 2019
    • Matt Caswell's avatar
      Make sure we trigger retransmits in DTLS testing · f9ad0abb
      Matt Caswell authored
      
      
      During a DTLS handshake we may need to periodically handle timeouts in the
      DTLS timer to ensure retransmits due to lost packets are performed. However,
      one peer will always complete a handshake before the other. The DTLS timer
      stops once the handshake has finished so any handshake messages lost after
      that point will not automatically get retransmitted simply by calling
      DTLSv1_handle_timeout(). However attempting an SSL_read implies a
      DTLSv1_handle_timeout() and additionally will process records received from
      the peer. If those records are themselves retransmits then we know that the
      peer has not completed its handshake yet and a retransmit of our final
      flight automatically occurs.
      
      Reviewed-by: default avatarPaul Dale <paul.dale@oracle.com>
      (Merged from https://github.com/openssl/openssl/pull/8047)
      
      (cherry picked from commit 80c455d5ae405e855391e298a2bf8a24629dd95d)
      f9ad0abb
  2. Jan 22, 2019
  3. Jan 21, 2019
  4. Jan 16, 2019
  5. Jan 15, 2019
  6. Jan 08, 2019
    • Matt Caswell's avatar
      Don't artificially limit the size of the ClientHello · bbcfd60e
      Matt Caswell authored
      
      
      We were setting a limit of SSL3_RT_MAX_PLAIN_LENGTH on the size of the
      ClientHello. AFAIK there is nothing in the standards that requires this
      limit.
      
      The limit goes all the way back to when support for extensions was first
      added for TLSv1.0. It got converted into a WPACKET max size in 1.1.1. Most
      likely it was originally added to avoid the complexity of having to grow
      the init_buf in the middle of adding extensions. With WPACKET this is
      irrelevant since it will grow automatically.
      
      This issue came up when an attempt was made to send a very large
      certificate_authorities extension in the ClientHello.
      
      We should just remove the limit.
      
      Reviewed-by: default avatarPaul Dale <paul.dale@oracle.com>
      Reviewed-by: default avatarViktor Dukhovni <viktor@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/7424)
      
      (cherry picked from commit 7835e97b6ff5cd94a10c5aeac439f4aa145a77b2)
      bbcfd60e
    • FdaSilvaYY's avatar
      Fix CID 1434549: Unchecked return value in test/evp_test.c · 37cad7e6
      FdaSilvaYY authored
      
      
      5. check_return: Calling EVP_EncodeUpdate without checking return value
      (as is done elsewhere 4 out of 5 times).
      
      Fix CID 1371695, 1371698: Resource leak in test/evp_test.c
      
      - leaked_storage: Variable edata going out of scope leaks the storage it
      points to.
      
      - leaked_storage: Variable encode_ctx going out of scope leaks the
      storage it points to
      
      Fix CID 1430437, 1430426, 1430429 : Dereference before null check in test/drbg_cavs_test.c
      
      check_after_deref: Null-checking drbg suggests that it
      may be null, but it has already been dereferenced on all paths leading
      to the check
      
      Fix CID 1440765: Dereference before null check in test/ssltestlib.c
      
      check_after_deref: Null-checking ctx suggests that it may be null, but
      it has already been dereferenced on all paths leading to the check.
      
      Reviewed-by: default avatarMatt Caswell <matt@openssl.org>
      Reviewed-by: default avatarPaul Dale <paul.dale@oracle.com>
      Reviewed-by: default avatarMatthias St. Pierre <Matthias.St.Pierre@ncp-e.com>
      Reviewed-by: Bern...
      37cad7e6
  7. Jan 07, 2019
  8. Jan 06, 2019
  9. Jan 04, 2019
  10. Jan 03, 2019
  11. Dec 31, 2018
  12. Dec 30, 2018
  13. Dec 29, 2018
  14. Dec 27, 2018
  15. Dec 23, 2018
  16. Dec 22, 2018