1. 05 Jan, 2016 1 commit
  2. 28 Dec, 2015 1 commit
  3. 27 Dec, 2015 3 commits
  4. 22 Dec, 2015 1 commit
  5. 20 Dec, 2015 1 commit
  6. 19 Dec, 2015 6 commits
  7. 18 Dec, 2015 1 commit
  8. 16 Dec, 2015 1 commit
  9. 14 Dec, 2015 2 commits
  10. 10 Dec, 2015 2 commits
  11. 09 Dec, 2015 1 commit
  12. 08 Dec, 2015 5 commits
  13. 07 Dec, 2015 4 commits
  14. 03 Dec, 2015 7 commits
  15. 02 Dec, 2015 2 commits
  16. 30 Nov, 2015 1 commit
    • Matt Caswell's avatar
      Return errors even if the cookie validation has succeeded · 41d049e1
      Matt Caswell authored
      
      
      In the DTLS ClientHello processing the return value is stored in |ret| which
      by default is -1. We wish to return 1 on success or 2 on success *and* we
      have validated the DTLS cookie. Previously on successful validation of the
      cookie we were setting |ret| to 2. Unfortunately if we later encounter an
      error then we can end up returning a successful (positive) return code from
      the function because we already set |ret| to a positive value.
      
      This does not appear to have a security consequence because the handshake
      just fails at a later point.
      
      Reviewed-by: default avatarAndy Polyakov <appro@openssl.org>
      41d049e1
  17. 24 Nov, 2015 1 commit