Skip to content
  1. Jan 29, 2018
  2. Jan 28, 2018
  3. Jan 26, 2018
  4. Jan 25, 2018
  5. Jan 24, 2018
  6. Jan 23, 2018
  7. Jan 22, 2018
  8. Jan 21, 2018
  9. Jan 20, 2018
  10. Jan 19, 2018
  11. Jan 18, 2018
  12. Jan 17, 2018
  13. Jan 16, 2018
    • Matt Caswell's avatar
      Extend timeout for TLSProxy · baa5d0ed
      Matt Caswell authored
      
      
      I received this error from a TLSProxy test:
      
      Failed to start up server (localhost,4443): Transport endpoint is not
      connected
      
      So, extend the timeout before we give up trying to connect to the server.
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/5088)
      
      (cherry picked from commit 82992a41)
      baa5d0ed
    • Matt Caswell's avatar
      Revert BN_copy() flag copy semantics change · d320e803
      Matt Caswell authored
      Commit 9f944291
      
       changed the semantics of BN_copy() to additionally
      copy the BN_FLG_CONSTTIME flag if it is set. This turns out to be
      ill advised as it has unintended consequences. For example calling
      BN_mod_inverse_no_branch() can sometimes return a result with the flag
      set and sometimes not as a result. This can lead to later failures if we
      go down code branches that do not support constant time, but check for
      the presence of the flag.
      
      The original commit was made due to an issue in BN_MOD_CTX_set(). The
      original PR fixed the problem in that function, but it was changed in
      review to fix it in BN_copy() instead. The solution seems to be to revert
      the BN_copy() change and go back to the originally proposed way.
      
      Reviewed-by: default avatarPaul Dale <paul.dale@oracle.com>
      (Merged from https://github.com/openssl/openssl/pull/5080)
      
      (cherry picked from commit 7d461736)
      d320e803
  14. Jan 15, 2018
  15. Jan 14, 2018
  16. Jan 13, 2018
  17. Jan 10, 2018
  18. Jan 09, 2018
    • Matt Caswell's avatar
      Tolerate DTLS alerts with an incorrect version number · 32859f60
      Matt Caswell authored
      
      
      In the case of a protocol version alert being sent by a peer the record
      version number may not be what we are expecting. In DTLS records with an
      unexpected version number are silently discarded. This probably isn't
      appropriate for alerts, so we tolerate a mismatch in the minor version
      number.
      
      This resolves an issue reported on openssl-users where an OpenSSL server
      chose DTLS1.0 but the client was DTLS1.2 only and sent a protocol_version
      alert with a 1.2 record number. This was silently ignored by the server.
      
      Reviewed-by: default avatarViktor Dukhovni <viktor@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/5018)
      
      (cherry picked from commit 08455bc9)
      32859f60