Manuel Pégourié-Gonnard
|
f07031aa98
|
debug_ecp: don't print Z, always 1
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
f6dc5e1d16
|
Remove temporary debug code
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
c3f6b62ccc
|
Print curve name instead of size in debugging
Also refactor server-side curve selection
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
ab24010b54
|
Enforce our choice of allowed curves.
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
7f38ed0bfa
|
ssl_set_curves is no longer ECDHE only
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
cd49f76898
|
Make ssl_set_curves() work client-side too.
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
ac7194133e
|
Renamings and other fixes
|
2014-02-06 10:28:38 +01:00 |
|
Gergely Budai
|
e40c469ad3
|
The default ECDH curve list will be dynamically built in the ecp module based on ecp_supported_curves[].
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
de05390c85
|
Rename ecdh_curve_list to curve_list
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
5de2580563
|
Make ssl_set_ecdh_curves() a compile-time option
|
2014-02-06 10:28:38 +01:00 |
|
Gergely Budai
|
987bfb510b
|
Added the possibility to define the allowed curves for ECDHE handshake. It also defines the preference of the curves.
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
fbf0915404
|
Fix bug in RSA PKCS#1 v1.5 "reversed" operations
|
2014-02-05 17:01:24 +01:00 |
|
Paul Bakker
|
5fb8efe71e
|
Merged HMAC-DRBG code
|
2014-02-05 15:55:18 +01:00 |
|
Manuel Pégourié-Gonnard
|
6e8e34d61e
|
Fix ecp_gen_keypair()
Too few tries caused failures for some curves (esp. secp224k1)
|
2014-02-05 15:53:45 +01:00 |
|
Manuel Pégourié-Gonnard
|
b05db2a6aa
|
Save memory by not storing the HMAC key
|
2014-02-01 11:38:05 +01:00 |
|
Manuel Pégourié-Gonnard
|
cf38367f45
|
Fix HMAC_DRBG and RIPEMD160 error codes
|
2014-02-01 10:24:53 +01:00 |
|
Manuel Pégourié-Gonnard
|
446ee6618f
|
Add LCOV_EXCLUDE_LINE on some IO errors
|
2014-02-01 10:08:26 +01:00 |
|
Manuel Pégourié-Gonnard
|
b3b205e081
|
Clean up details in ctr_drbg_selftest()
|
2014-01-31 12:04:06 +01:00 |
|
Manuel Pégourié-Gonnard
|
79afaa0551
|
Add hmac_drbg_selftest()
|
2014-01-31 11:52:14 +01:00 |
|
Manuel Pégourié-Gonnard
|
48bc3e81da
|
Add hmac_drbg_{write,update}_seed_file()
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
efc8d8078b
|
Use safer names for macros
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
6e897c2a59
|
Add more checks and references
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
d742a032f4
|
Use md_hmac_reset() when possible
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
658dbed080
|
Add automatic periodic reseeding
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
af786ff6cc
|
Add hmac_drbg_set_prediction_resistance()
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
8fc484d1df
|
Add hmac_drbg_reseed()
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
4e669c614d
|
Add hmac_drbg_set_entropy_len()
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
fe34a5fb83
|
Add entropy callbacks to HMAC_DRBG
|
2014-01-30 15:06:40 +01:00 |
|
Manuel Pégourié-Gonnard
|
8208d167da
|
Add hmac_random_with_add()
|
2014-01-30 12:19:26 +01:00 |
|
Manuel Pégourié-Gonnard
|
7845fc06c9
|
Use new HMAC_DRBG module for deterministic ECDSA
|
2014-01-30 10:58:48 +01:00 |
|
Manuel Pégourié-Gonnard
|
490bdf3928
|
Add minimalistic HMAC_DRBG implementation
(copied from ECDSA)
|
2014-01-30 10:58:48 +01:00 |
|
Paul Bakker
|
2aca241425
|
Ready for release 1.3.4
|
2014-01-27 11:59:30 +01:00 |
|
Paul Bakker
|
42099c3155
|
Revert "Add pk_rsa_set_padding() and rsa_set_padding()"
This reverts commit b4fae579e8 .
Conflicts:
library/pk.c
tests/suites/test_suite_pk.data
tests/suites/test_suite_pk.function
|
2014-01-27 11:59:29 +01:00 |
|
Paul Bakker
|
556efba51c
|
Added AES CFB8 mode
|
2014-01-24 15:38:12 +01:00 |
|
Paul Bakker
|
80025417eb
|
net_is_block() renamed to net_would_block() and corrected behaviour on
non-blocking sockets
net_would_block() now does not return 1 if the socket is blocking.
|
2014-01-23 21:00:57 +01:00 |
|
Paul Bakker
|
c2024f4592
|
Added MPI_CHK around unguarded mpi calls
|
2014-01-23 21:00:57 +01:00 |
|
Manuel Pégourié-Gonnard
|
8e205fc0bc
|
Fix potential buffer overflow in suported_curves_ext
|
2014-01-23 17:27:10 +01:00 |
|
Paul Bakker
|
9f3c7d7278
|
Added missing POLARSSL_ECDSA_DETERMINISTIC around ecdsa_write_signature_det()
|
2014-01-23 16:11:14 +01:00 |
|
Paul Bakker
|
18e9f3282b
|
Added missing static to md_info_by_size() in ecdsa.c
|
2014-01-23 16:08:38 +01:00 |
|
Paul Bakker
|
bf98c3dd11
|
Merged deterministic ECDSA
Conflicts:
library/ecdsa.c
|
2014-01-23 15:48:01 +01:00 |
|
Manuel Pégourié-Gonnard
|
dfab4c1193
|
Add forgotten #ifdef and depends_on
|
2014-01-22 16:01:06 +01:00 |
|
Paul Bakker
|
5862eee4ca
|
Merged RIPEMD-160 support
|
2014-01-22 14:18:34 +01:00 |
|
Paul Bakker
|
61b699ed1b
|
Renamed RMD160 to RIPEMD160
|
2014-01-22 14:17:31 +01:00 |
|
Paul Bakker
|
0ac99ca7bc
|
Merged support for secp224k1, secp192k1 and secp25k1
|
2014-01-22 13:10:48 +01:00 |
|
Manuel Pégourié-Gonnard
|
b4fae579e8
|
Add pk_rsa_set_padding() and rsa_set_padding()
|
2014-01-22 13:03:27 +01:00 |
|
Manuel Pégourié-Gonnard
|
7c59363a85
|
Remove a few dead stores
|
2014-01-22 13:02:39 +01:00 |
|
Manuel Pégourié-Gonnard
|
9e987edf9f
|
Fix potential memory leak in bignum selftest
|
2014-01-22 12:59:04 +01:00 |
|
Manuel Pégourié-Gonnard
|
fd6a191381
|
Fix misplaced initialisation.
If one of the calls to mpi_grow() before setting Apos would fail, then
mpi_free( &Apos ) would be executed without Apos being initialised.
|
2014-01-22 12:57:04 +01:00 |
|
Manuel Pégourié-Gonnard
|
073f0fa2fb
|
Fix missing error checking in gcm
|
2014-01-22 12:56:51 +01:00 |
|
Manuel Pégourié-Gonnard
|
280f95bd00
|
Add #ifs arround ssl_ciphersuite_uses_XXX()
|
2014-01-22 12:56:37 +01:00 |
|