Simon Butcher
85e5bfd00c
Merge remote-tracking branch 'public/pr/1889' into mbedtls-2.1
2018-08-28 12:26:33 +01:00
Simon Butcher
263ca7282e
Merge remote-tracking branch 'public/pr/1957' into mbedtls-2.1
2018-08-28 12:17:38 +01:00
Simon Butcher
d288ac0e83
Merge remote-tracking branch 'public/pr/1959' into mbedtls-2.1
2018-08-28 11:53:47 +01:00
Simon Butcher
1c5e4c2258
Merge remote-tracking branch 'public/pr/1980' into mbedtls-2.1
2018-08-28 10:18:48 +01:00
Hanno Becker
6b1b598c2f
Fix typos in programs/x509/cert_write.c
...
Fixes #1922 .
2018-08-23 15:26:55 +01:00
Jaeden Amero
6b7b35b127
Merge remote-tracking branch 'upstream-public/pr/1952' into mbedtls-2.1
2018-08-17 15:31:51 +01:00
Hanno Becker
42d267bbe4
Compute record expansion in steps to ease readability
2018-08-17 15:29:48 +01:00
Jaeden Amero
b4d3c5ad11
Merge remote-tracking branch 'upstream-public/pr/1945' into mbedtls-2.1
2018-08-17 14:27:02 +01:00
Hanno Becker
d3475498e5
Adapt ChangeLog
2018-08-17 10:11:31 +01:00
Hanno Becker
07eb7ca17c
Fix mbedtls_ssl_get_record_expansion() for CBC modes
...
`mbedtls_ssl_get_record_expansion()` is supposed to return the maximum
difference between the size of a protected record and the size of the
encapsulated plaintext.
Previously, it did not correctly estimate the maximum record expansion
in case of CBC ciphersuites in (D)TLS versions 1.1 and higher, in which
case the ciphertext is prefixed by an explicit IV.
This commit fixes this bug. Fixes #1914 .
2018-08-17 10:11:28 +01:00
Hanno Becker
10652b10d9
Improve ChangeLog wording for the commmit that Fixes #1954 .
2018-08-17 10:03:48 +01:00
Hanno Becker
a24ed19a5d
Add tests for empty CA list in CertificateRequest, TLS 1.0 & 1.1
2018-08-17 10:03:48 +01:00
Hanno Becker
10195ab853
Adapt ChangeLog
2018-08-16 15:53:17 +01:00
Hanno Becker
9e2237ac47
Fix overly strict bounds check in ssl_parse_certificate_request()
2018-08-16 15:53:17 +01:00
Mohammad Azim Khan
4c01904819
Fix Wformat-overflow warning in ssl_mail_client.c
...
sprintf( (char *) buf, "%s\r\n", base );
Above code generates Wformat-overflow warning since both buf and base
are of same size. buf should be sizeof( base ) + characters added in
the format. In this case format 2 bytes for "\r\n".
2018-08-16 14:33:03 +01:00
Hanno Becker
048dba33cf
Adapt ChangeLog
2018-08-14 15:50:07 +01:00
Hanno Becker
3328d8cf88
Reset session_in/out pointers in ssl_session_reset_int()
...
Fixes #1941 .
2018-08-14 15:50:02 +01:00
Jaeden Amero
942cfea65f
Merge remote-tracking branch 'upstream-public/pr/1815' into mbedtls-2.1
2018-08-10 11:00:40 +01:00
Jaeden Amero
e3bcd9a432
Merge remote-tracking branch 'upstream-public/pr/1887' into mbedtls-2.1
2018-08-10 10:50:03 +01:00
Simon Butcher
92b04d9c55
Add ChangeLog entry for bug #1890
2018-07-30 22:15:36 +01:00
Simon Butcher
45ec65a49e
Merge remote-tracking branch 'public/pr/1894' into mbedtls-2.1
2018-07-30 22:13:09 +01:00
Simon Butcher
ada856fab4
Change test dependencies to RC4 from DES
...
Some tests were dependent on DES yet actually used RC4. Likely a copy and paste
error. This change fixes them.
2018-07-27 17:33:54 +01:00
Philippe Antoine
795eea6e1c
Fix undefined shifts
...
- in x509_profile_check_pk_alg
- in x509_profile_check_md_alg
- in x509_profile_check_key
and in ssl_cli.c : unsigned char gets promoted to signed integer
2018-07-26 22:51:18 +01:00
Simon Butcher
2f7f2b1f11
Merge remote-tracking branch 'restricted/pr/502' into mbedtls-2.1-restricted
2018-07-26 14:37:12 +01:00
Angus Gratton
ba25ffef87
Fix memory leak in ecp_mul_comb() if ecp_precompute_comb() fails
...
In ecp_mul_comb(), if (!p_eq_g && grp->T == NULL) and then ecp_precompute_comb() fails (which can
happen due to OOM), then the new array of points T will be leaked (as it's newly allocated, but
hasn't been asigned to grp->T yet).
Symptom was a memory leak in ECDHE key exchange under low memory conditions.
2018-07-26 11:09:37 +03:00
Simon Butcher
d908494fe5
Clarify Changelog entries
...
Corrected some style issues, and moved some entries from bugfixes to changes.
2018-07-25 17:33:29 +01:00
Jaeden Amero
dcec5bb527
Update version to 2.1.14
2018-07-25 15:42:55 +01:00
Simon Butcher
3339fe9a02
Merge remote-tracking branch 'restricted/pr/495' into mbedtls-2.1
2018-07-24 23:42:13 +01:00
Andres AG
63cc716575
Fix all.sh check_tools function to handle paths
2018-07-24 13:40:25 +01:00
Simon Butcher
48776350b2
Merge remote-tracking branch 'public/pr/1799' into mbedtls-2.1
2018-07-24 13:31:12 +01:00
Simon Butcher
3661642a49
Merge remote-tracking branch 'public/pr/1804' into mbedtls-2.1
2018-07-24 13:17:26 +01:00
Simon Butcher
be9c2dce5b
Revise ChangeLog entry for empty data records fixes
2018-07-24 13:01:59 +01:00
Simon Butcher
642ddb555e
Merge remote-tracking branch 'public/pr/1864' into mbedtls-2.1
2018-07-24 13:01:02 +01:00
Simon Butcher
62041cc50b
Merge remote-tracking branch 'public/pr/1873' into mbedtls-2.1
2018-07-24 12:14:03 +01:00
Simon Butcher
f10188d37d
Merge remote-tracking branch 'public/pr/1876' into mbedtls-2.1
2018-07-24 08:26:34 +01:00
Simon Butcher
e9a437fe59
Correct logic to exclude i386 inline assenbly when -O0
...
The i386 MPI inline assembly code was being incorrectly included when
all compiler optimisation was disabled.
2018-07-23 13:42:05 +01:00
Simon Butcher
698cb3469d
Add additional i386 tests to all.sh
...
Added an additional i386 test to all.sh, to allow one test with -O0 which
compiles out inline assembly, and one to test with -01 which includes the inline
assembly.
2018-07-23 13:41:56 +01:00
Jaeden Amero
7ef1f5b0c6
all.sh: Return error on keep-going failure
...
When calling all.sh from a script and using "--keep-going", errors were
sometimes missed due to all.sh always returning 0 "success" return code.
Return 1 if there is any failure encountered during a "keep-going" run.
2018-07-23 10:24:53 +01:00
Simon Butcher
f218c0c5cf
Expand i386 all.sh tests to full config ASan builds
...
The i386 test builds were only building the default configuration and had
no address sanitisation. This commit expands the test configuration to the full
configuration in all.sh and builds with ASan for when the test suites are
executed.
2018-07-20 21:40:52 +01:00
Simon Butcher
c098ec3af6
Merge remote-tracking branch 'public/pr/1779' into mbedtls-2.1
2018-07-20 14:47:37 +01:00
Simon Butcher
3a97bc2ced
Merge remote-tracking branch 'public/pr/1837' into mbedtls-2.1
2018-07-19 20:01:44 +01:00
Simon Butcher
ff5bd6220b
Fix ChangeLog entry for issue #1663
...
The ChangeLog entry was under the wrong version, and under Changes, not
Bug Fixes.
2018-07-19 19:59:02 +01:00
Simon Butcher
eebee76f93
Merge remote-tracking branch 'public/pr/1846' into mbedtls-2.1
2018-07-19 19:48:40 +01:00
Simon Butcher
f11daf6ff6
Merge remote-tracking branch 'public/pr/1850' into mbedtls-2.1
2018-07-19 16:14:44 +01:00
Ron Eldor
41273200a2
Update ChangeLog
...
Remove extra entries added by a bad cherry-pick.
2018-07-17 14:16:12 +03:00
Ron Eldor
99b9f12a91
Repharse comments
...
Rephrase comments to clarify them.
2018-07-17 13:31:57 +03:00
Andres Amaya Garcia
dc8b6df7a7
Add test for empty app data records to ssl-opt.sh
2018-07-16 20:22:30 +01:00
Andres Amaya Garcia
01daf2a5ef
Add ChangeLog entry for empty app data fix
2018-07-16 20:22:28 +01:00
Andres Amaya Garcia
6aa5169c7a
Fix ssl_client2 to send 0-length app data
2018-07-16 20:22:20 +01:00
Angus Gratton
fd1c5e8453
Check for invalid short Alert messages
...
(Short Change Cipher Spec & Handshake messages are already checked for.)
2018-07-16 20:20:51 +01:00