1
0
mirror of https://github.com/Mbed-TLS/mbedtls.git synced 2025-07-11 21:41:47 +03:00
Commit Graph

4287 Commits

Author SHA1 Message Date
f9c8a606b5 Merge commit '8b9bcec' into dtls
* commit '8b9bcec':
  Stop assuming chars are signed
  Fix len miscalculation in buffer-based allocator
  Fix NULL dereference in buffer-based allocator
  Add test_suite_memory_buffer_alloc
  Add memory_buffer_alloc_self_test()
  Fix missing bound check
  Add test for ctr_drbg_update() input sanitizing
  Refactor for clearer correctness/security
  Stop assuming chars are signed

Conflicts:
	library/ssl_tls.c
2015-01-20 16:38:39 +00:00
5b8f7eaa3e Merge new security defaults for programs (RC4 disabled, SSL3 disabled) 2015-01-14 16:26:54 +01:00
c82b7e2003 Merge option to disable truncated hmac on the server-side 2015-01-14 16:16:55 +01:00
e522d0fa57 Merge smarter certificate selection for pre-TLS-1.2 clients 2015-01-14 16:12:48 +01:00
78803c0567 Fix char signedness issue 2015-01-13 21:20:22 +01:00
f3561154ff Merge support for 1/n-1 record splitting 2015-01-13 16:31:34 +01:00
f6080b8557 Merge support for enabling / disabling renegotiation support at compile-time 2015-01-13 16:18:23 +01:00
d7e2483bfc Merge miscellaneous fixes into development 2015-01-13 16:04:38 +01:00
5ba1d52f96 Add memory_buffer_alloc_self_test() 2015-01-13 14:58:00 +01:00
5cb4b31057 Fix missing bound check 2015-01-13 14:58:00 +01:00
bd47a58221 Add ssl_set_arc4_support()
Rationale: if people want to disable RC4 but otherwise keep the default suite
list, it was cumbersome. Also, since it uses a global array,
ssl_list_ciphersuite() is not a convenient place. So the SSL modules look like
the best place, even if it means temporarily adding one SSL setting.
2015-01-13 13:03:06 +01:00
448ea506bf Set min version to TLS 1.0 in programs 2015-01-12 12:32:04 +01:00
e117a8fc0d Make truncated hmac a runtime option server-side
Reading the documentation of ssl_set_truncated_hmac() may give the impression
I changed the default for clients but I didn't, the old documentation was
wrong.
2015-01-09 12:52:20 +01:00
f01768c55e Specific error for suites in common but none good 2015-01-08 17:06:16 +01:00
cfa477ef2f Allow disabling record splitting at runtime 2015-01-07 14:56:54 +01:00
d76314c44c Add 1/n-1 record splitting 2015-01-07 14:56:54 +01:00
edd371a82c Enhance doc on ssl_write() 2015-01-07 14:56:54 +01:00
d94232389e Skip signature_algorithms ext if PSK only 2014-12-02 11:57:29 +01:00
837f0fe831 Make renego period configurable 2014-12-02 10:40:55 +01:00
037170465a Switch from an enable to a disable flag 2014-12-02 10:40:54 +01:00
6186019d5d Save 48 bytes if SSLv3 is not defined 2014-12-02 10:40:54 +01:00
615e677c0b Make renegotiation a compile-time option 2014-12-02 10:40:54 +01:00
9439f93ea4 Use pk_load_file() in X509
Saves a bit of ROM. X509 depends on PK anyway.
2014-11-27 17:44:46 +01:00
cb7da352fd Fix typo in #ifdef
Since length is checked afterwards anyway, no security risk here
2014-11-27 17:44:45 +01:00
150c4f62f1 Clarify documentation a bit 2014-11-27 17:44:45 +01:00
3e9449350c Fix comment on resumption 2014-11-27 17:44:45 +01:00
6b298e6cc1 Update comment from draft to RFC 2014-11-27 17:44:45 +01:00
d16d1cb96a Use more #ifdef's on CLI_C and SRV_C in ssl_tls.c 2014-11-27 17:44:45 +01:00
fd6c85c3eb Set a compile-time limit to X.509 chain length 2014-11-20 16:37:41 +01:00
426d4ae7ff Split x509_crl_parse_der() out of x509_crl_parse() 2014-11-20 16:36:07 +01:00
70bdadf54b Add pk_check_pair() 2014-11-06 18:25:51 +01:00
30668d688d Add ecp_check_pub_priv() 2014-11-06 18:25:51 +01:00
2f8d1f9fc3 Add rsa_check_pub_priv() 2014-11-06 18:25:51 +01:00
e10e06d863 Blind RSA operations even without CRT 2014-11-06 18:25:44 +01:00
d056ce0e3e Use seq_num as AEAD nonce by default 2014-11-06 18:23:49 +01:00
f9d778d635 Merge branch 'etm' into dtls
* etm:
  Fix warning in reduced config
  Update Changelog for EtM
  Keep EtM state across renegotiations
  Adjust minimum length for EtM
  Don't send back EtM extension if not using CBC
  Fix for the RFC erratum
  Implement EtM
  Preparation for EtM
  Implement initial negotiation of EtM

Conflicts:
	include/polarssl/check_config.h
2014-11-06 01:36:32 +01:00
56d985d0a6 Merge branch 'session-hash' into dtls
* session-hash:
  Update Changelog for session-hash
  Make session-hash depend on TLS versions
  Forbid extended master secret with SSLv3
  compat.sh: allow git version of gnutls
  compat.sh: make options a bit more robust
  Implement extended master secret
  Add negotiation of Extended Master Secret

Conflicts:
	include/polarssl/check_config.h
	programs/ssl/ssl_server2.c
2014-11-06 01:25:09 +01:00
fedba98ede Merge branch 'fb-scsv' into dtls
* fb-scsv:
  Update Changelog for FALLBACK_SCSV
  Implement FALLBACK_SCSV server-side
  Implement FALLBACK_SCSV client-side
2014-11-05 16:12:09 +01:00
769c6b6351 Make session-hash depend on TLS versions 2014-11-05 16:00:50 +01:00
699cafaea2 Implement initial negotiation of EtM
Not implemented yet:
- actually using EtM
- conditions on renegotiation
2014-11-05 16:00:50 +01:00
01b2699198 Implement FALLBACK_SCSV server-side 2014-11-05 16:00:49 +01:00
1cbd39dbeb Implement FALLBACK_SCSV client-side 2014-11-05 16:00:49 +01:00
367381fddd Add negotiation of Extended Master Secret
(But not the actual thing yet.)
2014-11-05 16:00:49 +01:00
f2a459df05 Preparation for PolarSSL 1.4.0 2014-10-21 16:40:54 +02:00
ef88e68188 Deprecate ssl_set_bio() 2014-10-21 16:32:58 +02:00
df3acd82e2 Limit HelloRequest retransmission if not enforced 2014-10-21 16:32:58 +02:00
8e704f0f74 DTLS depends on TIMING_C for now 2014-10-21 16:32:56 +02:00
b0643d152d Add ssl_set_dtls_badmac_limit() 2014-10-21 16:32:55 +02:00
9b35f18f66 Add ssl_get_record_expansion() 2014-10-21 16:32:55 +02:00
a6fcffe516 Add warnings about disabling replay detection 2014-10-21 16:32:53 +02:00