458b8f2a59
Revert "Remove unused TLS, NET, and X.509 files"
...
This reverts commit a4308b29a4
.
2020-03-19 13:36:33 +01:00
a4308b29a4
Remove unused TLS, NET, and X.509 files
...
We've removed all software that depends on or uses the TLS, NET, and
X.509 modules. This means TLS, NET, and X.509 are unused and can be
removed. Remove TLS, NET, and X.509.
2019-04-25 11:46:21 +01:00
37ff14062e
Change main license to Apache 2.0
2015-09-04 14:21:07 +02:00
6fb8187279
Update date in copyright line
2015-07-28 17:11:58 +02:00
3a89559d71
Fix compile errors in pkcs11.c
2015-05-27 17:09:21 +02:00
7551cb9ee9
Replace malloc with calloc
...
- platform layer currently broken (not adapted yet)
- memmory_buffer_alloc too
2015-05-26 16:04:06 +02:00
eab147c4d0
Rename pkcs11_xxx_init() to bind()
2015-04-29 02:08:34 +02:00
2cf5a7c98e
The Great Renaming
...
A simple execution of tmp/invoke-rename.pl
2015-04-08 13:25:31 +02:00
7f8099773e
Rename include directory to mbedtls
2015-03-10 11:23:56 +00:00
fe44643b0e
Rename website and repository
2015-03-06 13:17:10 +00:00
00ab47026b
cleanup library and some basic tests. Includes, add guards to includes
2015-02-10 11:28:46 +00:00
860b51642d
Fix url again
2015-01-28 17:12:07 +00:00
085ab040aa
Fix website url to use https.
2015-01-23 11:06:27 +00:00
9698f5852c
Remove maintainer line.
2015-01-23 10:59:00 +00:00
19f6b5dfaa
Remove redundant "all rights reserved"
2015-01-23 10:54:00 +00:00
a658a4051b
Update copyright
2015-01-23 09:55:24 +00:00
967a2a5f8c
Change name to mbed TLS in the copyright notice
2015-01-22 14:28:16 +00:00
66d5d076f7
Fix formatting in various code to match spacing from coding style
2014-06-17 17:06:47 +02:00
d8bb82665e
Fix code styling for return statements
2014-06-17 14:06:49 +02:00
b9e4e2c97a
Fix formatting: fix some 'easy' > 80 length lines
2014-05-01 14:18:25 +02:00
4ffcd2f9c3
Typo in PKCS#11 module
2014-04-25 11:44:12 +02:00
db1f05985e
Add a check for buffer overflow to pkcs11_sign()
...
pkcs11_sign() reuses *sig to store the header and hash, but those might
be larger than the actual sig, causing a buffer overflow.
An overflow can occur when using raw sigs with hashlen > siglen, or when
the RSA key is less than 664 bits long (or less when using hashes
shorter than SHA512)
As siglen is always within the 'low realm' < 32k, an overflow of asnlen
+ hashlen is not possible.
2014-03-26 15:14:21 +01:00
7dc4c44267
Library files moved to use platform layer
2014-02-06 13:20:16 +01:00
28d81a009c
Fix pkcs11.c to conform to PolarSSL 1.3 API.
...
This restores previous functionality, and thus still allows only RSA to be
used through PKCS#11.
Signed-off-by: Steffan Karger <steffan.karger@fox-it.com >
Signed-off-by: Paul Bakker <p.j.bakker@polarssl.org >
2013-11-20 16:13:27 +01:00
c559c7a680
Renamed x509_cert structure to x509_crt for consistency
2013-09-18 14:32:52 +02:00
6e339b52e8
Memory-allocation abstraction layer and buffer-based allocator added
2013-07-03 17:22:31 +02:00
9a73632fd9
- Merged changesets 1399 up to and including 1415 into 1.2 branch
2012-11-14 12:39:52 +00:00
23986e5d5d
- Major type rewrite of int to size_t for most variables and arguments used for buffer lengths and loops
2011-04-24 08:57:21 +00:00
d61e7d98cb
- Cleaned up warning-generating code
2011-01-18 16:17:47 +00:00
43b7e35b25
- Support for PKCS#11 through the use of the pkcs11-helper library
2011-01-18 15:27:19 +00:00