1. 01 7月, 2019 1 次提交
  2. 27 6月, 2019 2 次提交
  3. 25 6月, 2019 1 次提交
  4. 27 6月, 2019 3 次提交
    • B
      Move 'shared_sigalgs' from cert_st to ssl_st · 915430a0
      Benjamin Kaduk 提交于
      It was only ever in cert_st because ssl_st was a public structure
      and could not be modified without breaking the API.  However, both
      structures are now opaque, and thus we can freely change their layout
      without breaking applications.  In this case, keeping the shared
      sigalgs in the SSL object prevents complications wherein they would
      inadvertently get cleared during SSL_set_SSL_CTX() (e.g., as run
      during a cert_cb).
      
      Fixes #9099
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/9157)
      
      (cherry picked from commit 29948ac80c1388cfeb0bd64539ac1fa6e0bb8990)
      915430a0
    • B
      Revert "Delay setting the sig algs until after the cert_cb has been called" · 572492aa
      Benjamin Kaduk 提交于
      This reverts commit 524006dd1b80c1a86a20119ad988666a80d8d8f5.
      
      While this change did prevent the sigalgs from getting inadvertently
      clobbered by SSL_set_SSL_CTX(), it also caused the sigalgs to not be
      set when the cert_cb runs.  This, in turn, caused significant breakage,
      such as SSL_check_chain() failing to find any valid chain.  An alternate
      approach to fixing the issue from #7244 will follow.
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/9157)
      
      (cherry picked from commit 6f34d7bc7d0c7fcd86c6f2772f26e42c925d8505)
      572492aa
    • B
      Add regression test for #9099 · 9863b419
      Benjamin Kaduk 提交于
      Augment the cert_cb sslapitest to include a run that uses
      SSL_check_chain() to inspect the certificate prior to installing
      it on the SSL object.  If the check shows the certificate as not
      valid in that context, we do not install a certificate at all, so
      the handshake will fail later on in processing (tls_choose_sigalg()),
      exposing the indicated regression.
      
      Currently it fails, since we have not yet set the shared sigalgs
      by the time the cert_cb runs.
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/9157)
      
      (cherry picked from commit 7cb8fb07e8b71dc1fdcb0de10af7fed4347f6ea4)
      9863b419
  5. 24 6月, 2019 2 次提交
  6. 21 6月, 2019 1 次提交
  7. 19 6月, 2019 4 次提交
  8. 18 6月, 2019 5 次提交
  9. 15 6月, 2019 1 次提交
  10. 13 6月, 2019 1 次提交
  11. 12 6月, 2019 2 次提交
  12. 11 6月, 2019 4 次提交
  13. 10 6月, 2019 1 次提交
  14. 09 6月, 2019 2 次提交
  15. 07 6月, 2019 2 次提交
  16. 06 6月, 2019 1 次提交
  17. 04 6月, 2019 3 次提交
  18. 03 6月, 2019 3 次提交
    • M
      Write a test for receiving a KeyUpdate (update requested) while writing · c8feb103
      Matt Caswell 提交于
      Reviewed-by: NBen Kaduk <kaduk@mit.edu>
      (Merged from https://github.com/openssl/openssl/pull/8773)
      
      (cherry picked from commit a77b4dba237d001073d2d1c5d55c674a196c949f)
      c8feb103
    • M
      Defer sending a KeyUpdate until after pending writes are complete · 6c2f347c
      Matt Caswell 提交于
      If we receive a KeyUpdate message (update requested) from the peer while
      we are in the middle of a write, we should defer sending the responding
      KeyUpdate message until after the current write is complete. We do this
      by waiting to send the KeyUpdate until the next time we write and there is
      no pending write data.
      
      This does imply a subtle change in behaviour. Firstly the responding
      KeyUpdate message won't be sent straight away as it is now. Secondly if
      the peer sends multiple KeyUpdates without us doing any writing then we
      will only send one response, as opposed to previously where we sent a
      response for each KeyUpdate received.
      
      Fixes #8677
      Reviewed-by: NBen Kaduk <kaduk@mit.edu>
      (Merged from https://github.com/openssl/openssl/pull/8773)
      
      (cherry picked from commit feb9e31c40c49de6384dd0413685e9b5a15adc99)
      6c2f347c
    • S
      Add the content type attribute to additional CMS signerinfo. · d63d841f
      Shane Lontis 提交于
      Fixes #8923
      
      Found using the openssl cms -resign option.
      This uses an alternate path to do the signing which was not adding the required signed attribute
      content type. The content type attribute should always exist since it is required is there are
      any signed attributes.
      As the signing time attribute is always added in code, the content type attribute is also required.
      The CMS_si_check_attributes() method adds validity checks for signed and unsigned attributes
      e.g. The message digest attribute is a signed attribute that must exist if any signed attributes
      exist, it cannot be an unsigned attribute and there must only be one instance containing a single
      value.
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/8944)
      
      (cherry picked from commit 19e512a8244a6f527d0194339a8f9fc45468537a)
      d63d841f
  19. 01 6月, 2019 1 次提交