Manuel Pégourié-Gonnard
|
dd0c0f33c0
|
Better usage of dhm_calc_secret in SSL
|
2014-06-25 11:26:14 +02:00 |
|
Manuel Pégourié-Gonnard
|
8df68632e8
|
Fix bug in DHE-PSK PMS computation
|
2014-06-25 11:26:14 +02:00 |
|
Manuel Pégourié-Gonnard
|
03576887c2
|
Remove misplaced debugging message
|
2014-06-25 11:26:13 +02:00 |
|
Manuel Pégourié-Gonnard
|
eaa76f7e20
|
Fix computation of minlen for encrypted packets
|
2014-06-25 11:26:12 +02:00 |
|
Manuel Pégourié-Gonnard
|
e800cd81d7
|
Re-arrange some code in ssl_derive_keys()
|
2014-06-25 11:26:11 +02:00 |
|
Manuel Pégourié-Gonnard
|
0bcc4e1df7
|
Fix length checking for AEAD ciphersuites
|
2014-06-25 11:26:10 +02:00 |
|
Manuel Pégourié-Gonnard
|
4d2a8eb6ff
|
SSL modules now using x509_crt_parse_der()
Avoid uselessly trying to decode PEM.
|
2014-06-23 11:54:57 +02:00 |
|
Paul Bakker
|
66d5d076f7
|
Fix formatting in various code to match spacing from coding style
|
2014-06-17 17:06:47 +02:00 |
|
Paul Bakker
|
d8bb82665e
|
Fix code styling for return statements
|
2014-06-17 14:06:49 +02:00 |
|
Paul Bakker
|
3461772559
|
Introduce polarssl_zeroize() instead of memset() for zeroization
|
2014-06-14 16:46:03 +02:00 |
|
Manuel Pégourié-Gonnard
|
7792198a46
|
Normalize some error messages
|
2014-06-12 21:15:44 +02:00 |
|
Peter Vaskovic
|
c2bbac968b
|
Fix misplaced parenthesis.
|
2014-05-28 11:06:31 +02:00 |
|
Paul Bakker
|
b5212b436f
|
Merge CCM cipher mode and ciphersuites
Conflicts:
library/ssl_tls.c
|
2014-05-22 15:30:31 +02:00 |
|
Manuel Pégourié-Gonnard
|
8ff17c544c
|
Add missing DEBUG_RET on cipher failures
|
2014-05-22 13:52:48 +02:00 |
|
Manuel Pégourié-Gonnard
|
61edffef28
|
Normalize "should never happen" messages/errors
|
2014-05-22 13:52:47 +02:00 |
|
Manuel Pégourié-Gonnard
|
2e5ee32033
|
Implement CCM and CCM_8 ciphersuites
|
2014-05-20 16:29:34 +02:00 |
|
Manuel Pégourié-Gonnard
|
5efd772ef0
|
Small readability improvement
|
2014-05-14 14:10:37 +02:00 |
|
Manuel Pégourié-Gonnard
|
de7bb44004
|
Use cipher_auth_{en,de}crypt() in ssl_tls.c
|
2014-05-14 14:10:36 +02:00 |
|
Manuel Pégourié-Gonnard
|
8764d271fa
|
Use cipher_crypt() in ssl_tls.c
|
2014-05-14 14:10:36 +02:00 |
|
Paul Bakker
|
b9e4e2c97a
|
Fix formatting: fix some 'easy' > 80 length lines
|
2014-05-01 14:18:25 +02:00 |
|
Paul Bakker
|
9af723cee7
|
Fix formatting: remove trailing spaces, #endif with comments (> 10 lines)
|
2014-05-01 13:03:14 +02:00 |
|
Paul Bakker
|
2a024ac86a
|
Merge dependency fixes
|
2014-04-30 16:50:59 +02:00 |
|
Manuel Pégourié-Gonnard
|
cef4ad2509
|
Adapt sources to configurable config.h name
|
2014-04-30 16:40:20 +02:00 |
|
Paul Bakker
|
1a1fbba1ae
|
Sanity length checks in ssl_read_record() and ssl_fetch_input()
Both are already covered in other places, but not in a clear fashion. So
for instance Coverity thinks the value is still tainted.
|
2014-04-30 14:48:51 +02:00 |
|
Manuel Pégourié-Gonnard
|
3a306b9067
|
Fix misplaced #endif in ssl_tls.c
|
2014-04-29 15:11:17 +02:00 |
|
Paul Bakker
|
61885c7f7f
|
Fix false reject in padding check in ssl_decrypt_buf() for CBC ciphersuites
In case full SSL frames arrived, they were rejected because an overly
strict padding check.
|
2014-04-25 12:59:51 +02:00 |
|
Paul Bakker
|
93389cc620
|
Remove const indicator
|
2014-04-17 14:44:38 +02:00 |
|
Manuel Pégourié-Gonnard
|
0408fd1fbb
|
Add extendedKeyUsage checking in SSL modules
|
2014-04-11 11:09:09 +02:00 |
|
Paul Bakker
|
d6ad8e949b
|
Make ssl_check_cert_usage() dependent on POLARSSL_X509_CRT_PARSE_C
|
2014-04-09 17:24:14 +02:00 |
|
Paul Bakker
|
a77de8c841
|
Prevent warnings in ssl_check_cert_usage() if keyUsage checks are off
|
2014-04-09 16:39:35 +02:00 |
|
Manuel Pégourié-Gonnard
|
a9db85df73
|
Add tests for keyUsage with client auth
|
2014-04-09 15:50:58 +02:00 |
|
Manuel Pégourié-Gonnard
|
7f2a07d7b2
|
Check keyUsage in SSL client and server
|
2014-04-09 15:50:57 +02:00 |
|
Paul Bakker
|
0763a401a7
|
Merged support for the ALPN extension
|
2014-04-08 14:37:12 +02:00 |
|
Paul Bakker
|
4224bc0a4f
|
Prevent potential NULL pointer dereference in ssl_read_record()
|
2014-04-08 14:36:50 +02:00 |
|
Manuel Pégourié-Gonnard
|
0b874dc580
|
Implement ALPN client-side
|
2014-04-07 10:57:45 +02:00 |
|
Manuel Pégourié-Gonnard
|
7e250d4812
|
Add ALPN interface
|
2014-04-04 17:10:40 +02:00 |
|
Paul Bakker
|
77f4f39ea6
|
Make sure no random pointer occur during failed malloc()'s
|
2014-03-26 15:30:20 +01:00 |
|
Paul Bakker
|
91c61bc4fd
|
Further tightened the padlen check to prevent underflow / overflow
|
2014-03-26 15:14:20 +01:00 |
|
Manuel Pégourié-Gonnard
|
b2bf5a1bbb
|
Fix possible buffer overflow with PSK
|
2014-03-26 12:58:50 +01:00 |
|
Paul Bakker
|
3d6504a935
|
ssl_init() left a dirty in_ctr pointer on failed allocation of out_ctr
|
2014-03-17 13:41:51 +01:00 |
|
Manuel Pégourié-Gonnard
|
83cdffc437
|
Forbid sequence number wrapping
|
2014-03-13 19:25:06 +01:00 |
|
Manuel Pégourié-Gonnard
|
796c6f3aff
|
Countermeasure against "triple handshake" attack
|
2014-03-13 19:25:06 +01:00 |
|
Paul Bakker
|
7dc4c44267
|
Library files moved to use platform layer
|
2014-02-06 13:20:16 +01:00 |
|
Manuel Pégourié-Gonnard
|
ab24010b54
|
Enforce our choice of allowed curves.
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
7f38ed0bfa
|
ssl_set_curves is no longer ECDHE only
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
ac7194133e
|
Renamings and other fixes
|
2014-02-06 10:28:38 +01:00 |
|
Gergely Budai
|
e40c469ad3
|
The default ECDH curve list will be dynamically built in the ecp module based on ecp_supported_curves[].
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
de05390c85
|
Rename ecdh_curve_list to curve_list
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
5de2580563
|
Make ssl_set_ecdh_curves() a compile-time option
|
2014-02-06 10:28:38 +01:00 |
|
Gergely Budai
|
987bfb510b
|
Added the possibility to define the allowed curves for ECDHE handshake. It also defines the preference of the curves.
|
2014-02-06 10:28:38 +01:00 |
|