1. 24 Jan, 2019 1 commit
    • Matt Caswell's avatar
      Make sure we trigger retransmits in DTLS testing · f9ad0abb
      Matt Caswell authored
      
      
      During a DTLS handshake we may need to periodically handle timeouts in the
      DTLS timer to ensure retransmits due to lost packets are performed. However,
      one peer will always complete a handshake before the other. The DTLS timer
      stops once the handshake has finished so any handshake messages lost after
      that point will not automatically get retransmitted simply by calling
      DTLSv1_handle_timeout(). However attempting an SSL_read implies a
      DTLSv1_handle_timeout() and additionally will process records received from
      the peer. If those records are themselves retransmits then we know that the
      peer has not completed its handshake yet and a retransmit of our final
      flight automatically occurs.
      
      Reviewed-by: default avatarPaul Dale <paul.dale@oracle.com>
      (Merged from https://github.com/openssl/openssl/pull/8047)
      
      (cherry picked from commit 80c455d5ae405e855391e298a2bf8a24629dd95d)
      f9ad0abb
  2. 22 Jan, 2019 1 commit
  3. 21 Jan, 2019 3 commits
  4. 16 Jan, 2019 4 commits
  5. 15 Jan, 2019 4 commits
  6. 08 Jan, 2019 2 commits
    • Matt Caswell's avatar
      Don't artificially limit the size of the ClientHello · bbcfd60e
      Matt Caswell authored
      
      
      We were setting a limit of SSL3_RT_MAX_PLAIN_LENGTH on the size of the
      ClientHello. AFAIK there is nothing in the standards that requires this
      limit.
      
      The limit goes all the way back to when support for extensions was first
      added for TLSv1.0. It got converted into a WPACKET max size in 1.1.1. Most
      likely it was originally added to avoid the complexity of having to grow
      the init_buf in the middle of adding extensions. With WPACKET this is
      irrelevant since it will grow automatically.
      
      This issue came up when an attempt was made to send a very large
      certificate_authorities extension in the ClientHello.
      
      We should just remove the limit.
      
      Reviewed-by: default avatarPaul Dale <paul.dale@oracle.com>
      Reviewed-by: default avatarViktor Dukhovni <viktor@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/7424)
      
      (cherry picked from commit 7835e97b6ff5cd94a10c5aeac439f4aa145a77b2)
      bbcfd60e
    • FdaSilvaYY's avatar
      Fix CID 1434549: Unchecked return value in test/evp_test.c · 37cad7e6
      FdaSilvaYY authored
      
      
      5. check_return: Calling EVP_EncodeUpdate without checking return value
      (as is done elsewhere 4 out of 5 times).
      
      Fix CID 1371695, 1371698: Resource leak in test/evp_test.c
      
      - leaked_storage: Variable edata going out of scope leaks the storage it
      points to.
      
      - leaked_storage: Variable encode_ctx going out of scope leaks the
      storage it points to
      
      Fix CID 1430437, 1430426, 1430429 : Dereference before null check in test/drbg_cavs_test.c
      
      check_after_deref: Null-checking drbg suggests that it
      may be null, but it has already been dereferenced on all paths leading
      to the check
      
      Fix CID 1440765: Dereference before null check in test/ssltestlib.c
      
      check_after_deref: Null-checking ctx suggests that it may be null, but
      it has already been dereferenced on all paths leading to the check.
      
      Reviewed-by: default avatarMatt Caswell <matt@openssl.org>
      Reviewed-by: default avatarPaul Dale <paul.dale@oracle.com>
      Reviewed-by: default avatarMatthias St. Pierre <Matthias.St.Pierre@ncp-e.com>
      Reviewed-by: default avatarBernd Edlinger <bernd.edlinger@hotmail.de>
      (Merged from https://github.com/openssl/openssl/pull/7993)
      
      (cherry picked from commit 760e2d60e62511a6fb96f547f6730d05eb5f47ec)
      37cad7e6
  7. 07 Jan, 2019 5 commits
  8. 06 Jan, 2019 2 commits
  9. 04 Jan, 2019 7 commits
  10. 03 Jan, 2019 3 commits
  11. 31 Dec, 2018 1 commit
  12. 30 Dec, 2018 1 commit
  13. 29 Dec, 2018 1 commit
  14. 27 Dec, 2018 1 commit
  15. 23 Dec, 2018 1 commit
  16. 22 Dec, 2018 3 commits