https://codereview.appspot.com/269100043/diff/1/lib/ssl/ssl3ext.c File lib/ssl/ssl3ext.c (right): https://codereview.appspot.com/269100043/diff/1/lib/ssl/ssl3ext.c#newcode424 lib/ssl/ssl3ext.c:424: goto alert_loser; This is going to generate two alerts ...
8 years, 7 months ago
(2015-10-02 21:21:45 UTC)
#1
LGTM https://codereview.appspot.com/269100043/diff/20001/lib/ssl/ssl3ext.c File lib/ssl/ssl3ext.c (right): https://codereview.appspot.com/269100043/diff/20001/lib/ssl/ssl3ext.c#newcode464 lib/ssl/ssl3ext.c:464: } I think that the loop here could ...
8 years, 7 months ago
(2015-10-07 05:25:35 UTC)
#2
On 2016/03/03 19:00:15, ekr-webrtc wrote: > ttaubert: when can we get this landed? Sorry, wasn't ...
8 years, 2 months ago
(2016-03-03 19:55:02 UTC)
#7
On 2016/03/03 19:00:15, ekr-webrtc wrote:
> ttaubert: when can we get this landed?
Sorry, wasn't aware that you wanted to get this landed soon. I prioritized the
SSLv2 and export cipher suite removal, will take a look at this tomorrow and
address your review comments.
On 2016/02/26 14:51:11, ekr-webrtc wrote: > It would be nice if you fixed up the ...
8 years, 2 months ago
(2016-03-03 21:07:47 UTC)
#9
On 2016/02/26 14:51:11, ekr-webrtc wrote:
> It would be nice if you fixed up the memory semantics here so that
sniNameArr[0]
> wasn't pointing to data in the packet
Done.
On 2016/03/03 19:55:02, ttaubert wrote: > On 2016/03/03 19:00:15, ekr-webrtc wrote: > > ttaubert: when ...
8 years, 2 months ago
(2016-03-03 21:11:36 UTC)
#10
On 2016/03/03 19:55:02, ttaubert wrote:
> On 2016/03/03 19:00:15, ekr-webrtc wrote:
> > ttaubert: when can we get this landed?
>
> Sorry, wasn't aware that you wanted to get this landed soon. I prioritized the
> SSLv2 and export cipher suite removal, will take a look at this tomorrow and
> address your review comments.
Actually found some time to update the patch now, let me know what you think.
Thanks!
https://codereview.appspot.com/269100043/diff/140001/lib/ssl/ssl3con.c File lib/ssl/ssl3con.c (right): https://codereview.appspot.com/269100043/diff/140001/lib/ssl/ssl3con.c#newcode8519 lib/ssl/ssl3con.c:8519: * the callers (*HandleClientHelloPart2) and the callers On 2016/04/26 ...
On 2016/04/26 12:46:02, ekr-webrtc wrote:
> I don't understand this code. The array can only have a length of 0 or 1 and
is
> only referenced a few places. Why don't you just have an sniValue instead and
> use extension_negotiated to indicate whether it was supplied or not.
We kept sniNameArr{Size} to not break existing APIs. A server currently cycles
through the given SNI names in the callback passed to |SSL_SNISocketConfigHook|
and returns the index of the entry chosen for the current connection.
Issue 269100043: Bug 998524 - Improve SNI handling for NameType
(Closed)
Created 8 years, 7 months ago by ttaubert
Modified 8 years ago
Reviewers: mt, ekr, ekr-rietveld
Base URL:
Comments: 22