95d3182576
See also upstream's 27c76b9b8010b536687318739c6f631ce4194688, CVE-2015-1791. Rather than write a dup function, serializing and deserializing the object is simpler. It also fixes a bug in the original fix where it never calls new_session_cb to store the new session (for clients which use that callback; how clients should handle the session cache is much less clear). The old session isn't pruned as we haven't processed the Finished message yet. RFC 5077 says: The server MUST NOT assume that the client actually received the updated ticket until it successfully verifies the client's Finished message. Moreover, because network messages are asynchronous, a new SSL connection may have began just before the client received the new ticket, so any such servers are broken regardless. Change-Id: I13b3dc986dc58ea2ce66659dbb29e14cd02a641b Reviewed-on: https://boringssl-review.googlesource.com/5122 Reviewed-by: Adam Langley <agl@google.com> |
||
---|---|---|
.. | ||
pqueue | ||
test | ||
CMakeLists.txt | ||
d1_both.c | ||
d1_clnt.c | ||
d1_lib.c | ||
d1_meth.c | ||
d1_pkt.c | ||
d1_srtp.c | ||
d1_srvr.c | ||
internal.h | ||
s3_both.c | ||
s3_clnt.c | ||
s3_enc.c | ||
s3_lib.c | ||
s3_meth.c | ||
s3_pkt.c | ||
s3_srvr.c | ||
ssl_aead_ctx.c | ||
ssl_algs.c | ||
ssl_asn1.c | ||
ssl_cert.c | ||
ssl_cipher.c | ||
ssl_lib.c | ||
ssl_rsa.c | ||
ssl_sess.c | ||
ssl_stat.c | ||
ssl_test.cc | ||
ssl_txt.c | ||
t1_enc.c | ||
t1_lib.c | ||
t1_reneg.c |