#
cfef5027 |
| 02-Mar-2017 |
Matt Caswell |
Add basic TLSv1.3 cookie support We do not allow the generation of TLSv1.3 cookies. But if we receive one in an HRR we will echo it back in the ClientHello. Reviewed-by: Rich Sa
Add basic TLSv1.3 cookie support We do not allow the generation of TLSv1.3 cookies. But if we receive one in an HRR we will echo it back in the ClientHello. Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2839)
show more ...
|
#
5528d68f |
| 03-Mar-2017 |
Dr. Stephen Henson |
Set specific error is we have no valid signature algorithms set Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2840)
|
#
0665b4ed |
| 02-Mar-2017 |
Matt Caswell |
Rename SSL_write_early() to SSL_write_early_data() This is for consistency with the rest of the API where all the functions are called *early_data*. Reviewed-by: Rich Salz <rsal
Rename SSL_write_early() to SSL_write_early_data() This is for consistency with the rest of the API where all the functions are called *early_data*. Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2737)
show more ...
|
#
f533fbd4 |
| 02-Mar-2017 |
Matt Caswell |
Rename SSL_read_early() to SSL_read_early_data() This is for consistency with the rest of the API where all the functions are called *early_data*. Reviewed-by: Rich Salz <rsalz@
Rename SSL_read_early() to SSL_read_early_data() This is for consistency with the rest of the API where all the functions are called *early_data*. Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2737)
show more ...
|
#
70ef40a0 |
| 23-Feb-2017 |
Matt Caswell |
Check max_early_data against the amount of early data we actually receive Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2737)
|
#
1ea4d09a |
| 22-Feb-2017 |
Matt Caswell |
Construct the server side early_data extension Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2737)
|
#
d781d247 |
| 21-Feb-2017 |
Matt Caswell |
Provide an SSL_read_early() function for reading early data Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2737)
|
#
a4f376af |
| 20-Feb-2017 |
Matt Caswell |
Construct the early_data extension Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2737)
|
#
49e7fe12 |
| 21-Feb-2017 |
Matt Caswell |
Provide functions to write early data We provide SSL_write_early() which *must* be called first on a connection (prior to any other IO function including SSL_connect()/SSL_do_handshake()
Provide functions to write early data We provide SSL_write_early() which *must* be called first on a connection (prior to any other IO function including SSL_connect()/SSL_do_handshake()). Also SSL_write_early_finish() which signals the end of early data. Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2737)
show more ...
|
#
5d5b3fba |
| 20-Feb-2017 |
Matt Caswell |
Parse the ticket_early_data_info extension Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2737)
|
#
3fc8d856 |
| 17-Feb-2017 |
Matt Caswell |
Construct the ticket_early_data_info extension Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2737)
|
#
03f44b97 |
| 22-Feb-2017 |
Dr. Stephen Henson |
Initial incomplete TLS 1.3 certificate request support. This adds partial support for TLS 1.3 certificate request message. The request context and extensions are currently ignored o
Initial incomplete TLS 1.3 certificate request support. This adds partial support for TLS 1.3 certificate request message. The request context and extensions are currently ignored on receive and set to zero length on send. Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2728)
show more ...
|
#
e892e325 |
| 24-Feb-2017 |
Dr. Stephen Henson |
Reject compressed point format with TLS 1.3 Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2739)
|
#
4ee7d3f9 |
| 19-Nov-2016 |
Kurt Roeckx |
Implement SSL_read_ex() and SSL_write_ex() as documented. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> GH: #1964
|
#
6b1bb98f |
| 23-Jan-2017 |
Benjamin Kaduk |
Add SSL_CTX early callback Provide a callback interface that gives the application the ability to adjust the nascent SSL object at the earliest stage of ClientHello processing, immed
Add SSL_CTX early callback Provide a callback interface that gives the application the ability to adjust the nascent SSL object at the earliest stage of ClientHello processing, immediately after extensions have been collected but before they have been processed. This is akin to BoringSSL's "select_certificate_cb" (though it is not API compatible), and as the name indicates, one major use is to examine the supplied server name indication and select what certificate to present to the client. However, it can also be used to make more sweeping configuration changes to the SSL object according to the selected server identity and configuration. That may include adjusting the permitted TLS versions, swapping out the SSL_CTX object (as is traditionally done in a tlsext_servername_callback), changing the server's cipher list, and more. We also wish to allow an early callback to indicate that it needs to perform additional work asynchronously and resume processing later. To that effect, refactor the second half of tls_process_client_hello() into a subroutine to be called at the post-processing stage (including the early callback itself), to allow the callback to result in remaining in the same work stage for a later call to succeed. This requires allocating for and storing the CLIENTHELLO_MSG in the SSL object to be preserved across such calls, but the storage is reclaimed after ClientHello processing finishes. Information about the CliehtHello is available to the callback by means of accessor functions that can only be used from the early callback. This allows extensions to make use of the existing internal parsing machinery without exposing structure internals (e.g., of PACKET), so that applications do not have to write fragile parsing code. Applications are encouraged to utilize an early callback and not use a servername_callback, in order to avoid unexpected behavior that occurs due to the relative order of processing between things like session resumption and the historical servername callback. Also tidy up nearby style by removing unnecessary braces around one-line conditional bodies. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2279)
show more ...
|
#
90134d98 |
| 31-Jan-2017 |
Benjamin Kaduk |
Refactor SSL_bytes_to_cipher_list() Split off the portions that mutate the SSL object into a separate function that the state machine calls, so that the public API can be a pure func
Refactor SSL_bytes_to_cipher_list() Split off the portions that mutate the SSL object into a separate function that the state machine calls, so that the public API can be a pure function. (It still needs the SSL parameter in order to determine what SSL_METHOD's get_cipher_by_char() routine to use, though.) Instead of returning the stack of ciphers (functionality that was not used internally), require using the output parameter, and add a separate output parameter for the SCSVs contained in the supplied octets, if desired. This lets us move to the standard return value convention. Also make both output stacks optional parameters. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2279)
show more ...
|
#
ccb8e6e0 |
| 30-Jan-2017 |
Benjamin Kaduk |
Export SSL_bytes_to_cipher_list() Move ssl_bytes_to_cipher_list() to ssl_lib.c and create a public wrapper around it. This lets application early callbacks easily get SSL_CIPHER obj
Export SSL_bytes_to_cipher_list() Move ssl_bytes_to_cipher_list() to ssl_lib.c and create a public wrapper around it. This lets application early callbacks easily get SSL_CIPHER objects from the raw ciphers bytes without having to reimplement the parsing code. In particular, they do not need to know the details of the sslv2 format ClientHello's ciphersuite specifications. Document the new public function, including the arguably buggy behavior of modifying the supplied SSL object. On the face of it, such a function should be able to be pure, just a direct translation of wire octets to internal data structures. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2279)
show more ...
|
#
82f992cb |
| 13-Feb-2017 |
Matt Caswell |
Limit the number of KeyUpdate messages we can process Too many KeyUpdate message could be inicative of a problem (e.g. an infinite KeyUpdate loop if the peer always responds to a KeyUpda
Limit the number of KeyUpdate messages we can process Too many KeyUpdate message could be inicative of a problem (e.g. an infinite KeyUpdate loop if the peer always responds to a KeyUpdate message with an "update_requested" KeyUpdate response), or (conceivably) an attack. Either way we limit the number of KeyUpdate messages we are prepared to handle. Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2609)
show more ...
|
#
57389a32 |
| 10-Feb-2017 |
Matt Caswell |
Actually update the keys when a KeyUpdate message is sent or received Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2609)
|
#
e1c3de44 |
| 09-Feb-2017 |
Matt Caswell |
Add the ability for a client to receive a KeyUpdate message This just receives the message. It doesn't actually update any keys yet. Reviewed-by: Rich Salz <rsalz@openssl.org> (
Add the ability for a client to receive a KeyUpdate message This just receives the message. It doesn't actually update any keys yet. Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2609)
show more ...
|
#
44c04a2e |
| 08-Feb-2017 |
Matt Caswell |
Provide a function to send a KeyUpdate message This implements the server side KeyUpdate sending capability as well. Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from http
Provide a function to send a KeyUpdate message This implements the server side KeyUpdate sending capability as well. Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2609)
show more ...
|
#
4a419f60 |
| 13-Feb-2017 |
Dr. Stephen Henson |
Change tls_choose_sigalg so it can set errors and alerts. Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2623)
|
#
3847d426 |
| 01-Feb-2017 |
Matt Caswell |
Add client side support for parsing Hello Retry Request Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2341)
|
#
7d061fce |
| 30-Jan-2017 |
Matt Caswell |
Add server side support for creating the Hello Retry Request message Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2341)
|
#
e10dbdbf |
| 31-Jan-2017 |
Dr. Stephen Henson |
make errors Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2339)
|