1. 03 Dec, 2015 9 commits
  2. 02 Dec, 2015 2 commits
  3. 01 Dec, 2015 1 commit
    • Matt Caswell's avatar
      Remove cookie validation return value trick · 94f98a90
      Matt Caswell authored
      
      
      In the DTLS ClientHello processing the return value is stored in |ret| which
      by default is -1. |ret| is only updated to a positive value once we are past
      all points where we could hit an error. We wish to return 1 on success or 2
      on success *and* we have validated the DTLS cookie. Previously on successful
      validation of the cookie we were setting |ret| to -2, and then once we were
      past all error points we set |ret = -ret|. This is non-obvious behaviour and
      could be error prone. This commit tries to make this a bit more intuitive.
      
      Reviewed-by: default avatarAndy Polyakov <appro@openssl.org>
      94f98a90
  4. 30 Nov, 2015 1 commit
  5. 24 Nov, 2015 6 commits
  6. 23 Nov, 2015 1 commit
  7. 22 Nov, 2015 1 commit
  8. 21 Nov, 2015 2 commits
  9. 20 Nov, 2015 1 commit
  10. 19 Nov, 2015 1 commit
  11. 18 Nov, 2015 2 commits
  12. 16 Nov, 2015 3 commits
  13. 13 Nov, 2015 1 commit
  14. 11 Nov, 2015 1 commit
  15. 10 Nov, 2015 2 commits
    • Matt Caswell's avatar
      Stop DTLS servers asking for unsafe legacy renegotiation · d40ec4ab
      Matt Caswell authored
      
      
      If a DTLS client that does not support secure renegotiation connects to an
      OpenSSL DTLS server then, by default, renegotiation is disabled. If a
      server application attempts to initiate a renegotiation then OpenSSL is
      supposed to prevent this. However due to a discrepancy between the TLS and
      DTLS code, the server sends a HelloRequest anyway in DTLS.
      
      This is not a security concern because the handshake will still fail later
      in the process when the client responds with a ClientHello.
      
      Reviewed-by: default avatarTim Hudson <tjh@openssl.org>
      d40ec4ab
    • Matt Caswell's avatar
      Only call ssl3_init_finished_mac once for DTLS · 15a7164e
      Matt Caswell authored
      
      
      In DTLS if an IO retry occurs during writing of a fragmented ClientHello
      then we can end up reseting the finish mac variables on the retry, which
      causes a handshake failure. We should only reset on the first attempt not
      on retries.
      
      Thanks to BoringSSL for reporting this issue.
      
      RT#4119
      
      Reviewed-by: default avatarTim Hudson <tjh@openssl.org>
      15a7164e
  16. 09 Nov, 2015 3 commits
  17. 08 Nov, 2015 1 commit
  18. 04 Nov, 2015 2 commits