Changeset 95219 in vbox for trunk/src/libs/openssl-3.0.3/ssl/statem
- Timestamp:
- Jun 8, 2022 7:43:44 AM (3 years ago)
- svn:sync-xref-src-repo-rev:
- 151730
- Location:
- trunk/src/libs/openssl-3.0.3
- Files:
-
- 4 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/libs/openssl-3.0.3
- Property svn:mergeinfo
-
old new 14 14 /vendor/openssl/3.0.1:150323-150324 15 15 /vendor/openssl/3.0.2:150728-150729 16 /vendor/openssl/current:147554-150727 16 /vendor/openssl/3.0.3:151497-151729 17 /vendor/openssl/current:147554-151496
-
- Property svn:mergeinfo
-
trunk/src/libs/openssl-3.0.3/ssl/statem/statem_clnt.c
r94404 r95219 1396 1396 && PACKET_remaining(pkt) >= SSL3_RANDOM_SIZE 1397 1397 && memcmp(hrrrandom, PACKET_data(pkt), SSL3_RANDOM_SIZE) == 0) { 1398 if (s->hello_retry_request != SSL_HRR_NONE) { 1399 SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_UNEXPECTED_MESSAGE); 1400 goto err; 1401 } 1398 1402 s->hello_retry_request = SSL_HRR_PENDING; 1399 1403 hrr = 1; -
trunk/src/libs/openssl-3.0.3/ssl/statem/statem_dtls.c
r94082 r95219 1 1 /* 2 * Copyright 2005-202 1The OpenSSL Project Authors. All Rights Reserved.2 * Copyright 2005-2022 The OpenSSL Project Authors. All Rights Reserved. 3 3 * 4 4 * Licensed under the Apache License 2.0 (the "License"). You may not use … … 219 219 len = s->init_num; 220 220 221 if (len > s ->max_send_fragment)222 len = s ->max_send_fragment;221 if (len > ssl_get_max_send_fragment(s)) 222 len = ssl_get_max_send_fragment(s); 223 223 224 224 /* … … 242 242 ret = dtls1_write_bytes(s, type, &s->init_buf->data[s->init_off], len, 243 243 &written); 244 if (ret < 0) {244 if (ret <= 0) { 245 245 /* 246 246 * might need to update MTU here, but we don't know which -
trunk/src/libs/openssl-3.0.3/ssl/statem/statem_srvr.c
r94404 r95219 3622 3622 unsigned char *tick_nonce) 3623 3623 { 3624 uint32_t timeout = (uint32_t)s->session->timeout; 3625 3624 3626 /* 3625 * Ticket lifetime hint: For TLSv1.2 this is advisory only and we leave this 3626 * unspecified for resumed session (for simplicity). 3627 * Ticket lifetime hint: 3627 3628 * In TLSv1.3 we reset the "time" field above, and always specify the 3628 * timeout. 3629 * timeout, limited to a 1 week period per RFC8446. 3630 * For TLSv1.2 this is advisory only and we leave this unspecified for 3631 * resumed session (for simplicity). 3629 3632 */ 3630 if (!WPACKET_put_bytes_u32(pkt, 3631 (s->hit && !SSL_IS_TLS13(s)) 3632 ? 0 : (uint32_t)s->session->timeout)) { 3633 #define ONE_WEEK_SEC (7 * 24 * 60 * 60) 3634 3635 if (SSL_IS_TLS13(s)) { 3636 if (s->session->timeout > ONE_WEEK_SEC) 3637 timeout = ONE_WEEK_SEC; 3638 } else if (s->hit) 3639 timeout = 0; 3640 3641 if (!WPACKET_put_bytes_u32(pkt, timeout)) { 3633 3642 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); 3634 3643 return 0;
Note:
See TracChangeset
for help on using the changeset viewer.