diff options
author | Kenneth Lakin <[email protected]> | 2016-04-30 20:17:03 -0700 |
---|---|---|
committer | Ingela Anderton Andin <[email protected]> | 2016-06-09 18:12:48 +0200 |
commit | 7001063d331e5702ba21bfec3b3d84c06a31fefb (patch) | |
tree | dd71b0cf069365497b241d73d7222c01c13b2773 /AUTHORS | |
parent | 1ab69efa960703b86a13ea6ba96f4fd56f1565f9 (diff) | |
download | otp-7001063d331e5702ba21bfec3b3d84c06a31fefb.tar.gz otp-7001063d331e5702ba21bfec3b3d84c06a31fefb.tar.bz2 otp-7001063d331e5702ba21bfec3b3d84c06a31fefb.zip |
ssl: Use cipher suite's PRF in prf/5
Use the negotiated cipher suite's PRF algorithm in calls to
ssl:prf/5, rather than a hard-coded one.
For TLS 1.0 the PRF algorithm was hard-coded to MD5/SHA1. This
was correct 100% of the time.
For TLS 1.1 and 1.2 the PRF algorithm was hard-coded to SHA256.
This was correct only some of the time for TLS 1.2 and none of the
time for TLS 1.1. Because the TLS handshake code calls tls_v1:prf/5
through another path, the handshaking process used the negotiated
PRF and did not encounter this bug.
A new test (prf) has been added to ssl_basic_SUITE to guard against future
breakage.
Diffstat (limited to 'AUTHORS')
0 files changed, 0 insertions, 0 deletions