AndreiD
feed1ca219
decrease RAM usage using PROGMEM
2017-04-29 18:42:22 +08:00
Myles Eftos
8afe55267a
Prefixing max/min defines with axtls_ so they don't clash with other libraries that use the sam name
2017-04-27 09:12:47 -05:00
ADiea
47efb7adf4
use snprintf in print_blob ( #40 )
2017-03-13 02:39:00 -05:00
ADiea
33833fb3c6
Fix memleak in rsa.c ( #35 )
...
* fix memleak in rsa.c
* don't alloc block from the start;check block;don't use goto
* fix whitespaces
2017-03-13 02:36:51 -05:00
silbe
993a29f2b2
Add support for verifying SHA-256 hash of Subject Public Key Info ( #31 )
...
For HTTP public key pinning (RFC7469), the SHA-256 hash of the Subject
Public Key Info (which usually only changes when the public key
changes) is used rather than the SHA-1 hash of the entire certificate
(which will change on each certificate renewal).
2017-02-19 05:29:31 +03:00
slaff
d768568ae7
Memory optimization for static const data. ( #30 )
2016-12-11 09:48:15 -06:00
slaff
5282123a96
Updated Lwirax to its latest version. ( #29 )
2016-11-22 03:05:03 -06:00
slaff
cf4c0bba34
Added initial support for max fragment size extension. ( #25 )
...
Refactored the code to support more SSL extensions in the future.
2016-11-21 14:03:23 -06:00
slaff
aa87239cbd
Moved the LWIP RAW compat module into a submodule. ( #26 )
2016-11-21 14:02:17 -06:00
anmaped
b20140f867
axTLS fails to aws iot with SSL_ERROR_INVALID_HANDSHAKE. It is a wrong OFFSET. ( #27 )
2016-10-14 20:39:10 -05:00
Ivan Grokhotkov
d94ccb9181
Merge pull request #24 from slaff/master
...
Re-added the SNI extension.
2016-09-16 00:12:26 +08:00
Slavey Karadzhov
fac976c5d5
Re-added the SNI extension.
...
Add code for better handling of SSL extension types in the CLIENT_HELLO message.
2016-09-15 17:59:08 +02:00
Ivan Grokhotkov
144994c4e4
Merge pull request #23 from me-no-dev/add-send-calculator
...
add send packet size calculator
2016-08-29 13:46:09 +08:00
Me No Dev
23d532ae2d
add send packet size calculator
2016-08-27 18:47:02 +03:00
Ivan Grokhotkov
d26f23a1ce
ssl: disable default cert, enable cert chain verification
2016-08-25 12:48:10 +08:00
Ivan Grokhotkov
f3e154b870
ssl: use malloc instead of alloca
2016-08-25 12:46:51 +08:00
Ivan Grokhotkov
a682206523
Merge pull request #19 from ikeyasu/merge-200
...
Merging axtls 2.0.0
2016-08-25 10:50:14 +08:00
Yasuki Ikeuchi
9ca7e76cf3
Fix build error on ESP8266
2016-08-20 12:32:42 +09:00
Yasuki Ikeuchi
ab9f8b53b7
Fix unused variable error
2016-08-20 10:27:09 +09:00
cameronrich
29b478f3cf
* Put back TLS 1.0.
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@268 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 07:42:10 +09:00
cameronrich
f599ff830e
* Tightened up the buffer sizes
...
* Removed support for TLS1.0.
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@267 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 07:41:33 +09:00
cameronrich
871a70e495
TLS 1.2 now passing a bunch of tests.
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@266 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 07:41:01 +09:00
cameronrich
fc6b6b346f
Server side v1.2 is basically working
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@265 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:22:57 +09:00
cameronrich
09619c9340
Client side works with a certificate verify - still lots of work to go.
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@264 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:21:23 +09:00
cameronrich
d476a79411
* Initial crack at TLS 1.2 client side only (server side is seriously broken).
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@263 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:21:01 +09:00
cameronrich
abda243710
Cleaned up alerts as per TLS v1.2 spec (7.2.2)
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@262 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:08:45 +09:00
cameronrich
01a0531bc3
* Backed out code where close notify from other side closed the socket and ssl session. This needs to be done by the application.
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@261 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:08:15 +09:00
cameronrich
549bcb478e
Tightened up closure alerts for v1.2 (7.2.1)
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@260 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:08:11 +09:00
cameronrich
106a59cf23
Removed some printfs in skeleton mode
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@258 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:08:06 +09:00
cameronrich
6d0a2c03c3
Fixed some skeleton mode warnings
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@257 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:08:00 +09:00
cameronrich
14d6809c0d
removed endian.h from os_int.h as it is no longer needed and was causing issues with the micropython build
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@256 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:05:45 +09:00
cameronrich
a9eab10499
Now include os_port.h in tls1.h, but removed ax_malloc and friends
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@255 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:05:23 +09:00
cameronrich
acc38e3ab3
Can handle SSL chains which are out of order (thanks Paul Johnstone)
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@254 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:01:45 +09:00
cameronrich
0d6e51aae4
Removed RC4 from the list of negotiated ciphers as browsers don't support it anymore
...
git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@252 9a5d90b5-6617-0410-8a86-bb477d3ed2e3
2016-08-19 00:00:39 +09:00
Ivan Grokhotkov
ab516f799d
Purge certificates only when expanding plaintext buffer
2016-06-13 00:50:25 +08:00
Ivan Grokhotkov
f41146fb17
Merge pull request #16 from jmue/fix/doubled_code
...
fix doubled code introduced with r231 - 97f9f969
2016-06-01 18:11:09 +08:00
Ivan Grokhotkov
9a9be633f2
Merge pull request #17 from jmue/fix/memset_usage
...
fix memset usage
2016-06-01 18:11:02 +08:00
Ivan Grokhotkov
a2311331f9
Update README.md
2016-06-01 17:41:09 +08:00
Ivan Grokhotkov
fe6e51a556
Merge pull request #15 from jmue/axtls-upgrade
...
axtls upgrade to svn r251 (1.5.3+)
2016-06-01 17:35:58 +08:00
Jens Mueller
07fe883157
fix doubled code introduced with r231 - 97f9f969
2016-05-21 21:26:39 +02:00
Jens Mueller
87163b23e0
fix memset usage
2016-05-21 21:13:48 +02:00
Yasuki Ikeuchi
0c09e2c8a3
add be64toh
2016-05-13 23:45:46 +02:00
Jens Mueller
36e8b497ba
Merge branch upstream into axtls-upgrade
2016-05-13 23:40:49 +02:00
Jens Müller
6209eaca16
Merge remote-tracking branch 'origin/master' into axtls-8266
2016-05-13 23:17:03 +02:00
Jens Müller
c5c9c73e47
Merge branch 'master' into tail
...
Conflicts:
ssl/os_port.h
ssl/tls1.c
ssl/tls1.h
2016-05-13 23:12:21 +02:00
Ivan Grokhotkov
139914f312
Add option for blocking reads
2016-05-10 23:17:44 +08:00
Ivan Grokhotkov
cd6c04a809
Add hooks to feed watchdog during lengthy bigint operations
2016-05-10 23:00:33 +08:00
Ivan Grokhotkov
69c757f2a3
Allow plain buffer size increase during handshake
2016-04-19 09:30:50 +03:00
Ivan Grokhotkov
3fdea2885d
Fix Travis build
2016-04-19 08:41:06 +03:00
Ivan Grokhotkov
fe4518da8d
Make SNI host name an ssl_client_new argument
...
ssl_set_hostname was mostly useless, because it allowed setting host name of an existing SSL object. However SNI was sent as part of client_hello, which was done in ssl_client_new. So it wasn't possible to actually set host name before connection would start.
2016-04-19 08:23:15 +03:00