ADiea
47efb7adf4
use snprintf in print_blob ( #40 )
2017-03-13 02:39:00 -05:00
ADiea
33833fb3c6
Fix memleak in rsa.c ( #35 )
...
* fix memleak in rsa.c
* don't alloc block from the start;check block;don't use goto
* fix whitespaces
2017-03-13 02:36:51 -05:00
silbe
993a29f2b2
Add support for verifying SHA-256 hash of Subject Public Key Info ( #31 )
...
For HTTP public key pinning (RFC7469), the SHA-256 hash of the Subject
Public Key Info (which usually only changes when the public key
changes) is used rather than the SHA-1 hash of the entire certificate
(which will change on each certificate renewal).
2017-02-19 05:29:31 +03:00
slaff
d768568ae7
Memory optimization for static const data. ( #30 )
2016-12-11 09:48:15 -06:00
slaff
5282123a96
Updated Lwirax to its latest version. ( #29 )
2016-11-22 03:05:03 -06:00
slaff
cf4c0bba34
Added initial support for max fragment size extension. ( #25 )
...
Refactored the code to support more SSL extensions in the future.
2016-11-21 14:03:23 -06:00
slaff
aa87239cbd
Moved the LWIP RAW compat module into a submodule. ( #26 )
2016-11-21 14:02:17 -06:00
anmaped
b20140f867
axTLS fails to aws iot with SSL_ERROR_INVALID_HANDSHAKE. It is a wrong OFFSET. ( #27 )
2016-10-14 20:39:10 -05:00
Ivan Grokhotkov
d94ccb9181
Merge pull request #24 from slaff/master
...
Re-added the SNI extension.
2016-09-16 00:12:26 +08:00
Slavey Karadzhov
fac976c5d5
Re-added the SNI extension.
...
Add code for better handling of SSL extension types in the CLIENT_HELLO message.
2016-09-15 17:59:08 +02:00
Ivan Grokhotkov
144994c4e4
Merge pull request #23 from me-no-dev/add-send-calculator
...
add send packet size calculator
2016-08-29 13:46:09 +08:00
Me No Dev
23d532ae2d
add send packet size calculator
2016-08-27 18:47:02 +03:00
Ivan Grokhotkov
d26f23a1ce
ssl: disable default cert, enable cert chain verification
2016-08-25 12:48:10 +08:00
Ivan Grokhotkov
f3e154b870
ssl: use malloc instead of alloca
2016-08-25 12:46:51 +08:00
Ivan Grokhotkov
a682206523
Merge pull request #19 from ikeyasu/merge-200
...
Merging axtls 2.0.0
2016-08-25 10:50:14 +08:00
Yasuki Ikeuchi
9ca7e76cf3
Fix build error on ESP8266
2016-08-20 12:32:42 +09:00
Yasuki Ikeuchi
ab9f8b53b7
Fix unused variable error
2016-08-20 10:27:09 +09:00
cameronrich
29b478f3cf
* Put back TLS 1.0.
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@268 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 07:42:10 +09:00
cameronrich
f599ff830e
* Tightened up the buffer sizes
...
* Removed support for TLS1.0.
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@267 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 07:41:33 +09:00
cameronrich
871a70e495
TLS 1.2 now passing a bunch of tests.
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@266 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 07:41:01 +09:00
cameronrich
fc6b6b346f
Server side v1.2 is basically working
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@265 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:22:57 +09:00
cameronrich
09619c9340
Client side works with a certificate verify - still lots of work to go.
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@264 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:21:23 +09:00
cameronrich
d476a79411
* Initial crack at TLS 1.2 client side only (server side is seriously broken).
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@263 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:21:01 +09:00
cameronrich
abda243710
Cleaned up alerts as per TLS v1.2 spec (7.2.2)
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@262 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:08:45 +09:00
cameronrich
01a0531bc3
* Backed out code where close notify from other side closed the socket and ssl session. This needs to be done by the application.
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@261 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:08:15 +09:00
cameronrich
549bcb478e
Tightened up closure alerts for v1.2 (7.2.1)
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@260 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:08:11 +09:00
cameronrich
106a59cf23
Removed some printfs in skeleton mode
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@258 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:08:06 +09:00
cameronrich
6d0a2c03c3
Fixed some skeleton mode warnings
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@257 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:08:00 +09:00
cameronrich
14d6809c0d
removed endian.h from os_int.h as it is no longer needed and was causing issues with the micropython build
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@256 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:05:45 +09:00
cameronrich
a9eab10499
Now include os_port.h in tls1.h, but removed ax_malloc and friends
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@255 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:05:23 +09:00
cameronrich
acc38e3ab3
Can handle SSL chains which are out of order (thanks Paul Johnstone)
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@254 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:01:45 +09:00
cameronrich
0d6e51aae4
Removed RC4 from the list of negotiated ciphers as browsers don't support it anymore
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@252 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:00:39 +09:00
Ivan Grokhotkov
ab516f799d
Purge certificates only when expanding plaintext buffer
2016-06-13 00:50:25 +08:00
Ivan Grokhotkov
f41146fb17
Merge pull request #16 from jmue/fix/doubled_code
...
fix doubled code introduced with r231 - 97f9f969
2016-06-01 18:11:09 +08:00
Ivan Grokhotkov
9a9be633f2
Merge pull request #17 from jmue/fix/memset_usage
...
fix memset usage
2016-06-01 18:11:02 +08:00
Ivan Grokhotkov
a2311331f9
Update README.md
2016-06-01 17:41:09 +08:00
Ivan Grokhotkov
fe6e51a556
Merge pull request #15 from jmue/axtls-upgrade
...
axtls upgrade to svn r251 (1.5.3+)
2016-06-01 17:35:58 +08:00
Jens Mueller
07fe883157
fix doubled code introduced with r231 - 97f9f969
2016-05-21 21:26:39 +02:00
Jens Mueller
87163b23e0
fix memset usage
2016-05-21 21:13:48 +02:00
Yasuki Ikeuchi
0c09e2c8a3
add be64toh
2016-05-13 23:45:46 +02:00
Jens Mueller
36e8b497ba
Merge branch upstream into axtls-upgrade
2016-05-13 23:40:49 +02:00
Jens Müller
6209eaca16
Merge remote-tracking branch 'origin/master' into axtls-8266
2016-05-13 23:17:03 +02:00
Jens Müller
c5c9c73e47
Merge branch 'master' into tail
...
Conflicts:
ssl/os_port.h
ssl/tls1.c
ssl/tls1.h
2016-05-13 23:12:21 +02:00
Ivan Grokhotkov
139914f312
Add option for blocking reads
2016-05-10 23:17:44 +08:00
Ivan Grokhotkov
cd6c04a809
Add hooks to feed watchdog during lengthy bigint operations
2016-05-10 23:00:33 +08:00
Ivan Grokhotkov
69c757f2a3
Allow plain buffer size increase during handshake
2016-04-19 09:30:50 +03:00
Ivan Grokhotkov
3fdea2885d
Fix Travis build
2016-04-19 08:41:06 +03:00
Ivan Grokhotkov
fe4518da8d
Make SNI host name an ssl_client_new argument
...
ssl_set_hostname was mostly useless, because it allowed setting host name of an existing SSL object. However SNI was sent as part of client_hello, which was done in ssl_client_new. So it wasn't possible to actually set host name before connection would start.
2016-04-19 08:23:15 +03:00
Ivan Grokhotkov
5b4be7d273
Reserve 16k fragment buffer only when it is actually required.
...
This change reduces memory pressure when server response size fits into 6k buffer allocated by default.
2016-03-02 15:34:15 +03:00
Ivan Grokhotkov
b33ef68e6a
Fix handshake status not being set if increase_bm_data_size fails
...
Also set warning level to -Wall
https://github.com/esp8266/Arduino/issues/1708
2016-03-02 15:17:47 +03:00