Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Chromium patches 2 fixed up #12

Closed
wants to merge 17 commits into from
Closed

Conversation

tomato42
Copy link
Member

@tomato42 tomato42 commented Jun 7, 2015

Reworked patches from trevp/tlslite pull request 98

@tomato42
Copy link
Member Author

tomato42 commented Jun 7, 2015

patches until 21b6350 are present in pull #11

@landscape-bot
Copy link

Code Health
Repository health increased by 3% when pulling 1b74c85 on chromium-patches-2-fixed-up into 984e4c1 on master.

@tomato42
Copy link
Member Author

tomato42 commented Jun 7, 2015

@davidben: Hi! I reworked your patches a bit to address most of my complaints (mostly just the ones that were breaking tests). I'd be awesome if you could take a look and say what you think. Patches in question are 598283b, 51290a7 and d0de9f8. Feel free to review other patches too.

Things left to fix:

  • mutual authentication test doesn't look at clientCertChain
  • checking signature algorithms for sha1+rsa before sending CertificateVerify

Update: rebased on current cr-cv-cleanup, fixed up the patches while preserving authorship

tomato42 and others added 16 commits June 7, 2015 21:12
provide human-readable names for supported ciphersuites
describe which purpose have the different list of ciphers
fix pylint C0103 (invalid-name)
fixes pylint invalid-name and redefined-builtin
because the deserialise will write nothing if the cipherSuite is
set to None, we need to actually set it to one of the anonymous SRP
ciphersuites first

note that the TLSv1.2 signature handling is still incorrect!
fixes pylint C0303 (trailing-whitespace)
Adapted from a Chromium patch. This matches the other messages; __init__
gets passed parameters necessary to determine the behavior of parse
(version, cipherSuite), while the fields for outgoing messages are set
in create.
From Chromium. If an abrubt close happens while we're in the middle of
writing data, don't invalidate the session.
Client auth now participates in signature algorithms. Test-wise, this
was already covered by test 14, but since both sides implemented it
wrong the test passed. Add a test at TLS 1.1 so coverage of the
hash-less codepath isn't lost.

From Chromium.
Enabling any faults just no-ops the handshake right now, so those tests
so they were meaningless. The tests with the assert() lines were passing
only because a bare expect will catch everything, including
AssertionError.
@tomato42 tomato42 force-pushed the chromium-patches-2-fixed-up branch from 1b74c85 to d0de9f8 Compare June 8, 2015 18:13
Adapted and then rewritten from part of a Chromium patch. Adds a test
which uses a Fault which disables this check on either peer.
@tomato42 tomato42 force-pushed the chromium-patches-2-fixed-up branch from d0de9f8 to 77af4f5 Compare June 8, 2015 18:26
@tomato42 tomato42 added this to the v0.5.0 milestone Jun 10, 2015
@tomato42
Copy link
Member Author

obsoleted by #15

@tomato42 tomato42 closed this Jun 10, 2015
@tomato42 tomato42 deleted the chromium-patches-2-fixed-up branch February 9, 2018 14:39
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants