Ivan Grokhotkov
f41146fb17
Merge pull request #16 from jmue/fix/doubled_code
...
fix doubled code introduced with r231 - 97f9f969
2016-06-01 18:11:09 +08:00
Ivan Grokhotkov
9a9be633f2
Merge pull request #17 from jmue/fix/memset_usage
...
fix memset usage
2016-06-01 18:11:02 +08:00
Ivan Grokhotkov
a2311331f9
Update README.md
2016-06-01 17:41:09 +08:00
Ivan Grokhotkov
fe6e51a556
Merge pull request #15 from jmue/axtls-upgrade
...
axtls upgrade to svn r251 (1.5.3+)
2016-06-01 17:35:58 +08:00
Jens Mueller
07fe883157
fix doubled code introduced with r231 - 97f9f969
2016-05-21 21:26:39 +02:00
Jens Mueller
87163b23e0
fix memset usage
2016-05-21 21:13:48 +02:00
Yasuki Ikeuchi
0c09e2c8a3
add be64toh
2016-05-13 23:45:46 +02:00
Jens Mueller
36e8b497ba
Merge branch upstream into axtls-upgrade
2016-05-13 23:40:49 +02:00
Jens Müller
6209eaca16
Merge remote-tracking branch 'origin/master' into axtls-8266
2016-05-13 23:17:03 +02:00
Jens Müller
c5c9c73e47
Merge branch 'master' into tail
...
Conflicts:
ssl/os_port.h
ssl/tls1.c
ssl/tls1.h
2016-05-13 23:12:21 +02:00
Ivan Grokhotkov
139914f312
Add option for blocking reads
2016-05-10 23:17:44 +08:00
Ivan Grokhotkov
cd6c04a809
Add hooks to feed watchdog during lengthy bigint operations
2016-05-10 23:00:33 +08:00
Ivan Grokhotkov
69c757f2a3
Allow plain buffer size increase during handshake
2016-04-19 09:30:50 +03:00
Ivan Grokhotkov
3fdea2885d
Fix Travis build
2016-04-19 08:41:06 +03:00
Ivan Grokhotkov
fe4518da8d
Make SNI host name an ssl_client_new argument
...
ssl_set_hostname was mostly useless, because it allowed setting host name of an existing SSL object. However SNI was sent as part of client_hello, which was done in ssl_client_new. So it wasn't possible to actually set host name before connection would start.
2016-04-19 08:23:15 +03:00
Ivan Grokhotkov
5b4be7d273
Reserve 16k fragment buffer only when it is actually required.
...
This change reduces memory pressure when server response size fits into 6k buffer allocated by default.
2016-03-02 15:34:15 +03:00
Ivan Grokhotkov
b33ef68e6a
Fix handshake status not being set if increase_bm_data_size fails
...
Also set warning level to -Wall
https://github.com/esp8266/Arduino/issues/1708
2016-03-02 15:17:47 +03:00
Ivan Grokhotkov
324c2fdade
Terminate connection if increase_bm_data_size fails
...
As suggested in https://github.com/igrr/axtls-8266/issues/2#issuecomment-188544798
2016-02-26 17:53:19 +03:00
Ivan Grokhotkov
96fbb39f21
Update README.md
2016-02-26 17:10:31 +03:00
Ivan Grokhotkov
c18bb56e61
Add travis CI
2016-02-26 16:59:10 +03:00
Ivan Grokhotkov
9eaeca3a03
Postpone freeing of X509 context to the first data exchange after handshake
...
X509 context contains certificate fingerprint and various names which may be used to verify the certificate.
Previously we would free it right after the handshake completion, which prevented the client from actually using any information from X509 context.
Postponing this to the first ssl_read/ssl_write call after the handshake, we give the client a chance to verify the certificate.
Also added logging to ssl_match_fingerprint function in case fingerprint doesn't match expected value.
2016-02-26 16:21:09 +03:00
Ivan Grokhotkov
28869ea94b
Use free followed by malloc instead of realloc when increasing raw buffer
...
At this point we don't need to preserve the data inside the buffer.
Using free followed by malloc reduces fragmentation for some heap implementations.
2016-02-26 16:09:47 +03:00
Ivan Grokhotkov
43a90bcf35
Merge pull request #8 from slaff/feature/lwipr-compat
...
Restructured the lwip raw compatability code.
2016-02-22 13:13:57 +03:00
Ivan Grokhotkov
66e1a5f423
Merge pull request #7 from slaff/feature/sni
...
Added SNI ( https://en.wikipedia.org/wiki/Server_Name_Indication ) su…
2016-02-22 12:24:41 +03:00
Slavey Karadzhov
1154d0a985
Changed the code to reserve bytes for hostname only if needed.
2016-02-22 10:16:01 +01:00
Slavey Karadzhov
63da8991c2
Added SNI ( https://en.wikipedia.org/wiki/Server_Name_Indication ) support.
2016-02-19 16:48:58 +01:00
Slavey Karadzhov
7c38865f66
Restructured the lwip raw comat code.
...
Added replacements for the time functions on ESP8266.
2016-02-19 13:31:00 +01:00
Ivan Grokhotkov
885ff3e8f0
Merge pull request #6 from slaff/feature/lwip-raw
...
Initial support for LWIP raw tcp mode.
2016-02-01 14:56:08 +03:00
Slavey Karadzhov
d78e7a0799
Initial version of axTLS integration with lwip raw tcp mode ( http://lwip.wikia.com/wiki/Raw/TCP ).
2016-02-01 12:05:09 +01:00
Ivan Grokhotkov
514b6685c5
Disable RC4
2015-12-09 23:39:26 +03:00
Ivan Grokhotkov
f98cae7b2f
Don't try to load certificate and private key if it is null
2015-12-04 18:44:40 +03:00
Ivan Grokhotkov
1551076816
Remove default private key and certificate ( #3 )
2015-12-04 17:08:04 +03:00
Ivan Grokhotkov
34ff4421d2
Get random bytes from hardware RNG
2015-12-02 23:49:49 +03:00
Ivan Grokhotkov
6830d98c7f
Pre-allocate encrypt/decrypt ctx to reduce memory fragmentation
2015-11-17 02:35:09 +03:00
Ivan Grokhotkov
10b41c811a
Increase plaintext buffer size after handshake is complete
2015-11-17 01:50:35 +03:00
olereinhardt
d1bcdc5f97
Tag 64-bit constants with "LL" (make e.g. AVR32 gcc happy)
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@251 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2015-10-01 15:58:22 +00:00
Ivan Grokhotkov
6f48f0d114
Store fingerprint as raw byte array
2015-09-18 12:38:27 +03:00
Ivan Grokhotkov
a069bc0eb6
Add function to match certificate fingerprint
2015-09-14 10:24:51 +03:00
Ivan Grokhotkov
ad9780684a
Calculate SHA-1 fingerprint when loading the certificate
2015-09-14 08:51:13 +03:00
Ivan Grokhotkov
6095fde37e
Allocation debugging, reduce SSL structure size.
2015-09-01 16:39:29 +03:00
Ivan Grokhotkov
6c91aa10fc
Create README.md
2015-08-31 09:22:23 +03:00
Ivan Grokhotkov
6030371051
Initial compilation fixes
2015-08-31 09:05:04 +03:00
Ivan Grokhotkov
3661c54000
Add makefile
2015-08-30 13:46:41 +03:00
Ivan Grokhotkov
4e0ccaf9b2
Import axTLS 1.4.9
2015-08-30 13:34:00 +03:00
cameronrich
a5f7ede493
* Fixed client certificate issue where there is no client certificate and a certificate verify msg was still being sent.
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@250 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2015-07-28 02:44:52 +00:00
cameronrich
acf35f0ea7
* Added named unions in SHA256 code for compilers that don't support it.
...
* Some other porting suggestions from Chris Ghormley.
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@248 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2015-04-30 06:06:09 +00:00
cameronrich
a88fd947b2
* Updated the release notes.
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@246 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2015-03-10 04:41:32 +00:00
cameronrich
b0bd12beda
* Added SHA384 and SHA512 digests.
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@245 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2015-03-10 03:08:16 +00:00
cameronrich
0d334d81c2
* PT_APP_PROTOCOL_DATA has a test for hs_status=SSL_OK to prevent possible exchanges before the handshake is complete.
...
* Changed license on sha256.c to full BSD.
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@244 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2015-03-09 01:42:59 +00:00
cameronrich
67111693e6
* fixed issue where SSL mutex was not being picked up.
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@243 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2014-11-26 19:50:20 +00:00