TrustedFirmware Git Browser
Code Review
Sign In
review.trustedfirmware.org
/
mirror
/
mbed-tls.git
/
456d3b9b0ba06475bdad2b51da96948345cd2ba5
/
library
/
ssl_cli.c
568c9cf
Add ecp_supported_curves and simplify some code
by Manuel Pégourié-Gonnard
· 12 years ago
7038039
Dissociate TLS and internal EC curve identifiers
by Manuel Pégourié-Gonnard
· 12 years ago
a97c015
Rm useless/wrong DHM lenght test
by Manuel Pégourié-Gonnard
· 12 years ago
032c34e
Don't use DH blinding for ephemeral DH
by Manuel Pégourié-Gonnard
· 12 years ago
2d62764
Change dhm_calc_secret() prototype
by Manuel Pégourié-Gonnard
· 12 years ago
e09d2f8
Change ecp_mul() prototype to allow randomization
by Manuel Pégourié-Gonnard
· 12 years ago
9659dae
Some extra code defined out
by Paul Bakker
· 12 years ago
577e006
Merged ECDSA-based key-exchange and ciphersuites into development
by Paul Bakker
· 12 years ago
9cc6f5c
Fix some hash debugging
by Manuel Pégourié-Gonnard
· 12 years ago
4bd1284
Fix ECDSA hash selection bug with TLS 1.0 and 1.1
by Manuel Pégourié-Gonnard
· 12 years ago
9c9812a
Fix bug introduced in dbf69cf
by Manuel Pégourié-Gonnard
· 12 years ago
e511ffc
Allow compiling without RSA or DH
by Manuel Pégourié-Gonnard
· 12 years ago
f484282
Rm a few unneeded tests
by Manuel Pégourié-Gonnard
· 12 years ago
d11eb7c
Fix sig_alg extension on client.
by Manuel Pégourié-Gonnard
· 12 years ago
bfe32ef
pk_{sign,verify}() now accept hash_len = 0
by Manuel Pégourié-Gonnard
· 12 years ago
a20c58c
Use convert functions for SSL_SIG_* and SSL_HASH_*
by Manuel Pégourié-Gonnard
· 12 years ago
0d42049
Merge code for RSA and ECDSA in SSL
by Manuel Pégourié-Gonnard
· 12 years ago
070cc7f
Use the new PK RSA-alt interface
by Manuel Pégourié-Gonnard
· 12 years ago
a2d3f22
Add and use pk_encrypt(), pk_decrypt()
by Manuel Pégourié-Gonnard
· 12 years ago
8df2769
Introduce pk_sign() and use it in ssl
by Manuel Pégourié-Gonnard
· 12 years ago
583b608
Fix some return values
by Manuel Pégourié-Gonnard
· 12 years ago
76c18a1
Add client support for ECDSA client auth
by Manuel Pégourié-Gonnard
· 12 years ago
09edda8
Check key type against selected key exchange
by Manuel Pégourié-Gonnard
· 12 years ago
20846b1
Add client support for ECDHE_ECDSA key exchange
by Manuel Pégourié-Gonnard
· 12 years ago
efebb0a
Refactor ssl_parse_server_key_exchange() a bit
by Manuel Pégourié-Gonnard
· 12 years ago
0be444a
Ability to disable server_name extension (RFC 6066)
by Paul Bakker
· 12 years ago
d2f068e
Ability to enable / disable SSL v3 / TLS 1.0 / TLS 1.1 / TLS 1.2 individually
by Paul Bakker
· 12 years ago
b3d9187
PK: add nice interface functions
by Manuel Pégourié-Gonnard
· 12 years ago
04376b1
Fixed memory leak in ssl_parse_server_key_exchange from missing md_free_ctx()
by Paul Bakker
· 12 years ago
0b27267
Fix ifdef conditions for EC-related extensions.
by Manuel Pégourié-Gonnard
· 12 years ago
5734b2d
Actually use the point format selected for ECDH
by Manuel Pégourié-Gonnard
· 12 years ago
7b19c16
Handle suported_point_formats in ServerHello
by Manuel Pégourié-Gonnard
· 12 years ago
6b8846d
Stop advertising support for compressed points
by Manuel Pégourié-Gonnard
· 12 years ago
1f2bc62
Made support for the truncated_hmac extension configurable
by Paul Bakker
· 12 years ago
05decb2
Made support for the max_fragment_length extension configurable
by Paul Bakker
· 12 years ago
a503a63
Made session tickets support configurable from config.h
by Paul Bakker
· 12 years ago
aa0d4d1
Add ssl_set_session_tickets()
by Manuel Pégourié-Gonnard
· 12 years ago
7cd5924
Rework NewSessionTicket handling in state machine
by Manuel Pégourié-Gonnard
· 12 years ago
6377e41
Complete client support for session tickets
by Manuel Pégourié-Gonnard
· 12 years ago
a5cc602
Parse NewSessionTicket message
by Manuel Pégourié-Gonnard
· 12 years ago
60182ef
ssl_cli: write & parse session ticket extension
by Manuel Pégourié-Gonnard
· 12 years ago
57c2852
Added truncated hmac negociation (without effect)
by Manuel Pégourié-Gonnard
· 12 years ago
e048b67
Misc minor fixes
by Manuel Pégourié-Gonnard
· 12 years ago
de600e5
Read max_fragment_length extension (client)
by Manuel Pégourié-Gonnard
· 12 years ago
a052849
Send max_fragment_length extension (client)
by Manuel Pégourié-Gonnard
· 12 years ago
ff56da3
Fix direct uses of x509_cert.rsa, now use pk_rsa()
by Manuel Pégourié-Gonnard
· 12 years ago
61d113b
Init and free new contexts in the right place for SSL to prevent memory leaks
by Paul Bakker
· 12 years ago
fa9b100
Also compiles / runs without time-based functions in OS
by Paul Bakker
· 12 years ago
9e36f04
SHA2 renamed to SHA256, SHA4 renamed to SHA512 and functions accordingly
by Paul Bakker
· 12 years ago
3866b9f
Removed redundant inclusion
by Paul Bakker
· 12 years ago
5dc6b5f
Made supported curves configurable
by Paul Bakker
· 12 years ago
2fbefde
Client and server now filter sent and accepted ciphersuites on minimum
by Paul Bakker
· 12 years ago
c5a79cc
Fixed compiler warnings for unused parameter ssl
by Paul Bakker
· 12 years ago
73d4431
Fixed parse error in ssl_parse_certificate_request()
by Paul Bakker
· 12 years ago
48f7a5d
DHE-PSK based ciphersuite support added and cleaner key exchange based
by Paul Bakker
· 12 years ago
188c8de
Only allow missing SereverKeyExchange message in bare PSK mode
by Paul Bakker
· 12 years ago
ed27a04
More granular define selections within code to allow for smaller code sizes
by Paul Bakker
· 12 years ago
d4a56ec
Added pre-shared key handling for the client side of SSL / TLS
by Paul Bakker
· 12 years ago
f7abd42
Removed extra spaces on end of lines
by Paul Bakker
· 12 years ago
29e1f12
split parts of ssl_parse_server_key_exchange() into separate functions
by Paul Bakker
· 12 years ago
8f4ddae
Ability to specify allowed ciphersuites based on the protocol version.
by Paul Bakker
· 12 years ago
c70b982
OID functionality moved to a separate module.
by Paul Bakker
· 12 years ago
3b6a07b
Prevented compiler warning on uninitialized end
by Paul Bakker
· 12 years ago
d3edc86
Moved writing of client extensions to separate functions in ssl_cli.c
by Paul Bakker
· 12 years ago
b7149bc
Corrected behaviour for CBC-based suites using the SHA384 MAC and PRF
by Paul Bakker
· 12 years ago
41c83d3
Added Ephemeral Elliptic Curve Diffie Hellman ciphersuites to SSL/TLS
by Paul Bakker
· 12 years ago
68884e3
Moved to advanced ciphersuite representation and more dynamic SSL code
by Paul Bakker
· 13 years ago
1961b70
Added ssl_handshake_step() to allow single stepping the handshake process
by Paul Bakker
· 13 years ago
9c94cdd
Correctly handle CertificateRequest with empty DN list in <= TLS 1.1
by Paul Bakker
· 13 years ago
769075d
Fixed dependency on POLARSSL_SHA4_C in ssl modules
by Paul Bakker
· 13 years ago
926af75
Fixed client certificate handling with TLS 1.2
by Paul Bakker
· 13 years ago
645ce3a
- Moved ciphersuite naming scheme to IANA reserved names
by Paul Bakker
· 13 years ago
993d11d
- Send ClientHello with 'minimal version'
by Paul Bakker
· 13 years ago
23f3680
- Added proper support for TLS 1.2 signature_algorithm extension on server
by Paul Bakker
· 13 years ago
1d29fb5
- Added option to add minimum accepted SSL/TLS protocol version
by Paul Bakker
· 13 years ago
eb2c658
- Generalized external private key implementation handling (like PKCS#11) in SSL/TLS
by Paul Bakker
· 13 years ago
0a59707
- Added simple SSL session cache implementation
by Paul Bakker
· 13 years ago
29b6476
- Added predefined DHM groups from RFC 5114
by Paul Bakker
· 13 years ago
d0f6fa7
- Sending of handshake_failures during renegotiation added
by Paul Bakker
· 13 years ago
48916f9
- Added Secure Renegotiation (RFC 5746)
by Paul Bakker
· 13 years ago
2770fbd
- Added DEFLATE compression support as per RFC3749 (requires zlib)
by Paul Bakker
· 13 years ago
380da53
- Abstracted checksum updating during handshake
by Paul Bakker
· 13 years ago
ca4ab49
- Added GCM ciphersuites to TLS implementation
by Paul Bakker
· 13 years ago
10cd225
- Added support for the SHA256 ciphersuites of AES and Camellia
by Paul Bakker
· 13 years ago
bf63b36
- Updated comments
by Paul Bakker
· 13 years ago
c3f177a
- Added client side support for signature_algorithm extension and affiliated handling
by Paul Bakker
· 13 years ago
1ef83d6
- Initial bare version of TLS 1.2
by Paul Bakker
· 13 years ago
1504af5
- Removed redundant POLARSSL_DEBUG_MSG define
by Paul Bakker
· 13 years ago
fab5c82
- Added support for NULL cipher (POLARSSL_CIPHER_NULL_CIPHER) and weak ciphersuites (POLARSSL_ENABLE_WEAK_CIPHERSUITES). They are disabled by default!
by Paul Bakker
· 13 years ago
87e5cda
- Fixed warning for t if no debugging defined
by Paul Bakker
· 14 years ago
55d3fd9
- Enlarged maximum size of DHM a client accepts to 512 bytes
by Paul Bakker
· 14 years ago
a3d195c
- Changed the used random function pointer to more flexible format. Renamed havege_rand() to havege_random() to prevent mistakes. Lots of changes as a consequence in library code and programs
by Paul Bakker
· 14 years ago
490ecc8
- Added ssl_set_max_version() to set the client's maximum sent version number
by Paul Bakker
· 14 years ago
5690efc
- Fixed a whole bunch of dependencies on defines between files, examples and tests
by Paul Bakker
· 14 years ago
23986e5
- Major type rewrite of int to size_t for most variables and arguments used for buffer lengths and loops
by Paul Bakker
· 14 years ago
99a03af
- Fixed possible uninitialized values
by Paul Bakker
· 14 years ago
9dcc322
- Added support for PKCS#1 v2.1 encoding and thus support for the RSAES-OAEP and RSASSA-PSS operations (enabled by POLARSSL_PKCS1_V21)
by Paul Bakker
· 14 years ago
e2a39cc
- Do not bail out if no client certificate specified. Try to negotiate anonymous connection (Fixes ticket #12)
by Paul Bakker
· 14 years ago
e3166ce
- Renamed ciphers member of ssl_context and cipher member of ssl_session to ciphersuites and ciphersuite respectively. This clarifies the difference with the generic cipher layer and is better naming altogether
by Paul Bakker
· 15 years ago
43b7e35
- Support for PKCS#11 through the use of the pkcs11-helper library
by Paul Bakker
· 15 years ago
Next »