openssl/ssl
Matt Caswell eee2a6a718 Fix a race condition in ciphers handling
Similarly to the previous commit we were storing the peer offered list
of ciphers in the session. In practice there is no need for this
information to be avilable from one resumption to the next since this
list is specific to a particular handshake. Since the session object is
supposed to be immutable we should not be updating it once we have decided
to resume. The solution is to remove the session list out of the session
object.

Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/9162)
2019-06-18 13:36:25 +01:00
..
record Defer sending a KeyUpdate until after pending writes are complete 2019-06-03 11:51:14 +01:00
statem Fix a race condition in ciphers handling 2019-06-18 13:36:25 +01:00
bio_ssl.c
build.info
d1_lib.c
d1_msg.c issue-8998: Ensure that the alert is generated and reaches the remote 2019-05-30 11:30:54 +01:00
d1_srtp.c
methods.c
packet_locl.h
packet.c
pqueue.c
s3_cbc.c
s3_enc.c Make EVP_MD_CTX_ctrl() work for legacy use cases (ssl3). 2019-06-11 20:25:33 +10:00
s3_lib.c Fix a race condition in supported groups handling 2019-06-18 13:36:25 +01:00
s3_msg.c
ssl_asn1.c
ssl_cert_table.h
ssl_cert.c
ssl_ciph.c Change cipher default strings to a function 2019-06-11 09:44:26 +01:00
ssl_conf.c
ssl_err.c
ssl_init.c
ssl_lib.c Fix a race condition in ciphers handling 2019-06-18 13:36:25 +01:00
ssl_locl.h Fix a race condition in ciphers handling 2019-06-18 13:36:25 +01:00
ssl_mcnf.c
ssl_rsa.c
ssl_sess.c Fix a race condition in ciphers handling 2019-06-18 13:36:25 +01:00
ssl_stat.c
ssl_txt.c
ssl_utst.c
t1_enc.c Changed ssl layer to use EVP_KDF API for TLS1_PRF and HKDF. 2019-05-27 20:28:18 +10:00
t1_lib.c Fix no-ec with no-dh 2019-06-17 10:57:19 +01:00
t1_trce.c
tls13_enc.c Coverity fixes 2019-06-06 09:34:17 +10:00
tls_srp.c