1
0
mirror of https://github.com/esp8266/Arduino.git synced 2025-08-11 09:43:08 +03:00
Commit Graph

169 Commits

Author SHA1 Message Date
cameronrich
01a0531bc3 * Backed out code where close notify from other side closed the socket and ssl session. This needs to be done by the application.
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@261 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:08:15 +09:00
cameronrich
549bcb478e Tightened up closure alerts for v1.2 (7.2.1)
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@260 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:08:11 +09:00
cameronrich
106a59cf23 Removed some printfs in skeleton mode
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@258 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:08:06 +09:00
cameronrich
6d0a2c03c3 Fixed some skeleton mode warnings
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@257 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:08:00 +09:00
cameronrich
a9eab10499 Now include os_port.h in tls1.h, but removed ax_malloc and friends
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@255 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:05:23 +09:00
cameronrich
acc38e3ab3 Can handle SSL chains which are out of order (thanks Paul Johnstone)
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@254 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:01:45 +09:00
cameronrich
0d6e51aae4 Removed RC4 from the list of negotiated ciphers as browsers don't support it anymore
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@252 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:00:39 +09:00
Ivan Grokhotkov
ab516f799d Purge certificates only when expanding plaintext buffer 2016-06-13 00:50:25 +08:00
Ivan Grokhotkov
f41146fb17 Merge pull request #16 from jmue/fix/doubled_code
fix doubled code introduced with r231 - 97f9f969
2016-06-01 18:11:09 +08:00
Ivan Grokhotkov
9a9be633f2 Merge pull request #17 from jmue/fix/memset_usage
fix memset usage
2016-06-01 18:11:02 +08:00
Jens Mueller
07fe883157 fix doubled code introduced with r231 - 97f9f969 2016-05-21 21:26:39 +02:00
Jens Mueller
87163b23e0 fix memset usage 2016-05-21 21:13:48 +02:00
Yasuki Ikeuchi
0c09e2c8a3 add be64toh 2016-05-13 23:45:46 +02:00
Jens Mueller
36e8b497ba Merge branch upstream into axtls-upgrade 2016-05-13 23:40:49 +02:00
Ivan Grokhotkov
139914f312 Add option for blocking reads 2016-05-10 23:17:44 +08:00
Ivan Grokhotkov
cd6c04a809 Add hooks to feed watchdog during lengthy bigint operations 2016-05-10 23:00:33 +08:00
Ivan Grokhotkov
69c757f2a3 Allow plain buffer size increase during handshake 2016-04-19 09:30:50 +03:00
Ivan Grokhotkov
fe4518da8d Make SNI host name an ssl_client_new argument
ssl_set_hostname was mostly useless, because it allowed setting host name of an existing SSL object. However SNI was sent as part of client_hello, which was done in ssl_client_new. So it wasn't possible to actually set host name before connection would start.
2016-04-19 08:23:15 +03:00
Ivan Grokhotkov
5b4be7d273 Reserve 16k fragment buffer only when it is actually required.
This change reduces memory pressure when server response size fits into 6k buffer allocated by default.
2016-03-02 15:34:15 +03:00
Ivan Grokhotkov
b33ef68e6a Fix handshake status not being set if increase_bm_data_size fails
Also set warning level to -Wall
https://github.com/esp8266/Arduino/issues/1708
2016-03-02 15:17:47 +03:00
Ivan Grokhotkov
324c2fdade Terminate connection if increase_bm_data_size fails
As suggested in https://github.com/igrr/axtls-8266/issues/2#issuecomment-188544798
2016-02-26 17:53:19 +03:00
Ivan Grokhotkov
9eaeca3a03 Postpone freeing of X509 context to the first data exchange after handshake
X509 context contains certificate fingerprint and various names which may be used to verify the certificate.
Previously we would free it right after the handshake completion, which prevented the client from actually using any information from X509 context.
Postponing this to the first ssl_read/ssl_write call after the handshake, we give the client a chance to verify the certificate.

Also added logging to ssl_match_fingerprint function in case fingerprint doesn't match expected value.
2016-02-26 16:21:09 +03:00
Ivan Grokhotkov
28869ea94b Use free followed by malloc instead of realloc when increasing raw buffer
At this point we don't need to preserve the data inside the buffer.
Using free followed by malloc reduces fragmentation for some heap implementations.
2016-02-26 16:09:47 +03:00
Slavey Karadzhov
1154d0a985 Changed the code to reserve bytes for hostname only if needed. 2016-02-22 10:16:01 +01:00
Slavey Karadzhov
63da8991c2 Added SNI ( https://en.wikipedia.org/wiki/Server_Name_Indication ) support. 2016-02-19 16:48:58 +01:00
Ivan Grokhotkov
514b6685c5 Disable RC4 2015-12-09 23:39:26 +03:00
Ivan Grokhotkov
f98cae7b2f Don't try to load certificate and private key if it is null 2015-12-04 18:44:40 +03:00
Ivan Grokhotkov
1551076816 Remove default private key and certificate (#3) 2015-12-04 17:08:04 +03:00
Ivan Grokhotkov
6830d98c7f Pre-allocate encrypt/decrypt ctx to reduce memory fragmentation 2015-11-17 02:35:09 +03:00
Ivan Grokhotkov
10b41c811a Increase plaintext buffer size after handshake is complete 2015-11-17 01:50:35 +03:00
Ivan Grokhotkov
6f48f0d114 Store fingerprint as raw byte array 2015-09-18 12:38:27 +03:00
Ivan Grokhotkov
a069bc0eb6 Add function to match certificate fingerprint 2015-09-14 10:24:51 +03:00
Ivan Grokhotkov
ad9780684a Calculate SHA-1 fingerprint when loading the certificate 2015-09-14 08:51:13 +03:00
Ivan Grokhotkov
6095fde37e Allocation debugging, reduce SSL structure size. 2015-09-01 16:39:29 +03:00
Ivan Grokhotkov
6030371051 Initial compilation fixes 2015-08-31 09:05:04 +03:00
Ivan Grokhotkov
3661c54000 Add makefile 2015-08-30 13:46:41 +03:00
Ivan Grokhotkov
4e0ccaf9b2 Import axTLS 1.4.9 2015-08-30 13:34:00 +03:00
cameronrich
a5f7ede493 * Fixed client certificate issue where there is no client certificate and a certificate verify msg was still being sent.
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@250 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2015-07-28 02:44:52 +00:00
cameronrich
acf35f0ea7 * Added named unions in SHA256 code for compilers that don't support it.
* Some other porting suggestions from Chris Ghormley.

git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@248 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2015-04-30 06:06:09 +00:00
cameronrich
b0bd12beda * Added SHA384 and SHA512 digests.
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@245 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2015-03-10 03:08:16 +00:00
cameronrich
0d334d81c2 * PT_APP_PROTOCOL_DATA has a test for hs_status=SSL_OK to prevent possible exchanges before the handshake is complete.
* Changed license on sha256.c to full BSD.

git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@244 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2015-03-09 01:42:59 +00:00
cameronrich
67111693e6 * fixed issue where SSL mutex was not being picked up.
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@243 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2014-11-26 19:50:20 +00:00
cameronrich
b3fc32689d * Added diagnostic in case digest could not be identified.
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@240 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2014-11-19 10:28:29 +00:00
cameronrich
58790919c1 * Added check to get_asn1_length() to limit the number of octets and to not allow overflow.
* Changed a few copyright dates to add a bit of new polish :-)

git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@239 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2014-11-19 10:13:31 +00:00
cameronrich
82a7638efa * Added SHA256
* Return code checked for get_random()
* MD2 code removed.

git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@238 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2014-11-19 03:51:22 +00:00
cameronrich
9ef84f9234 * RSA_decrypt now checks the integrity of the first 11 bytes.
* The size of the output buffer in RSA_decrypt is now checked and cleared.
* get_random now returns an error code
* Various system calls now check the return code to remove gcc warnings.

git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@237 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2014-11-07 00:38:49 +00:00
cameronrich
08b27ee1cb Modified the test script
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@235 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2014-10-31 11:01:56 +00:00
olereinhardt
29e7d3554d Fixed array access out of bounds bug in add_cert()
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@234 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2014-09-24 10:21:23 +00:00
olereinhardt
ce488f9180 Fix handling of return values of SOCKET_READ in process_sslv23_client_hello()
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@233 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2014-09-24 10:19:21 +00:00
cameronrich
e6f9ae68c1 added generalized time for certificates
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@232 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2013-11-14 18:34:36 +00:00