TrustedFirmware Git Browser
Code Review
Sign In
review.trustedfirmware.org
/
mirror
/
mbed-tls.git
/
cffe4a65bd44152dfd2d8c5c84aed3105c4b3b13
/
library
/
ssl_tls.c
577e006
Merged ECDSA-based key-exchange and ciphersuites into development
by Paul Bakker
· 12 years ago
2fb15f6
Un-rename ssl_set_own_cert_alt()
by Manuel Pégourié-Gonnard
· 12 years ago
a20c58c
Use convert functions for SSL_SIG_* and SSL_HASH_*
by Manuel Pégourié-Gonnard
· 12 years ago
0d42049
Merge code for RSA and ECDSA in SSL
by Manuel Pégourié-Gonnard
· 12 years ago
070cc7f
Use the new PK RSA-alt interface
by Manuel Pégourié-Gonnard
· 12 years ago
8df2769
Introduce pk_sign() and use it in ssl
by Manuel Pégourié-Gonnard
· 12 years ago
ac75523
Adapt ssl_set_own_cert() to generic keys
by Manuel Pégourié-Gonnard
· 12 years ago
0be444a
Ability to disable server_name extension (RFC 6066)
by Paul Bakker
· 12 years ago
d2f068e
Ability to enable / disable SSL v3 / TLS 1.0 / TLS 1.1 / TLS 1.2 individually
by Paul Bakker
· 12 years ago
fb08fd2
Entropy collector and CTR-DRBG now also work on SHA-256 if SHA-512 not available
by Paul Bakker
· 12 years ago
38d1eba
Move verify_result from ssl_context to session
by Manuel Pégourié-Gonnard
· 12 years ago
75c1a6f
Fixed potential heap buffer overflow on large hostname setting
by Paul Bakker
· 12 years ago
5fd4917
Add missing ifdefs in ssl modules
by Paul Bakker
· 12 years ago
1f2bc62
Made support for the truncated_hmac extension configurable
by Paul Bakker
· 12 years ago
05decb2
Made support for the max_fragment_length extension configurable
by Paul Bakker
· 12 years ago
606b4ba
Session ticket expiration checked on server
by Paul Bakker
· 12 years ago
a503a63
Made session tickets support configurable from config.h
by Paul Bakker
· 12 years ago
56dc9e8
Authenticate session tickets.
by Manuel Pégourié-Gonnard
· 12 years ago
990c51a
Encrypt session tickets
by Manuel Pégourié-Gonnard
· 12 years ago
779e429
Start adding ticket keys (only key_name for now)
by Manuel Pégourié-Gonnard
· 12 years ago
aa0d4d1
Add ssl_set_session_tickets()
by Manuel Pégourié-Gonnard
· 12 years ago
06650f6
Fix reusing session more than once
by Manuel Pégourié-Gonnard
· 12 years ago
c086cce
Don't cache empty session ID nor resumed session
by Manuel Pégourié-Gonnard
· 12 years ago
7cd5924
Rework NewSessionTicket handling in state machine
by Manuel Pégourié-Gonnard
· 12 years ago
7a358b8
ssl_srv: write & parse session ticket ext & msg
by Manuel Pégourié-Gonnard
· 12 years ago
a5cc602
Parse NewSessionTicket message
by Manuel Pégourié-Gonnard
· 12 years ago
75d4401
Introduce ticket field in session structure
by Manuel Pégourié-Gonnard
· 12 years ago
5f280cc
Implement saving peer cert as part of session.
by Manuel Pégourié-Gonnard
· 12 years ago
7471803
Add ssl_get_session() to save session on client
by Manuel Pégourié-Gonnard
· 12 years ago
8c1ede6
Changed prototype for ssl_set_truncated_hmac() to allow disabling
by Paul Bakker
· 12 years ago
277f7f2
Implement hmac truncation
by Manuel Pégourié-Gonnard
· 12 years ago
e980a99
Add interface for truncated hmac
by Manuel Pégourié-Gonnard
· 12 years ago
e048b67
Misc minor fixes
by Manuel Pégourié-Gonnard
· 12 years ago
ed4af8b
Move negotiated max fragment length to session
by Manuel Pégourié-Gonnard
· 12 years ago
581e6b6
Prepare migrating max fragment length to session
by Manuel Pégourié-Gonnard
· 12 years ago
6b4f237
Forbid setting max_frag_len > MAX_CONTENT_LEN
by Manuel Pégourié-Gonnard
· 12 years ago
30dc7ef
Reset max_fragment_length in ssl_session_reset()
by Manuel Pégourié-Gonnard
· 12 years ago
787b658
Implement max_frag_len write restriction
by Manuel Pégourié-Gonnard
· 12 years ago
8b46459
Add ssl_set_max_frag_len()
by Manuel Pégourié-Gonnard
· 12 years ago
61d113b
Init and free new contexts in the right place for SSL to prevent memory leaks
by Paul Bakker
· 12 years ago
fa9b100
Also compiles / runs without time-based functions in OS
by Paul Bakker
· 12 years ago
6e339b5
Memory-allocation abstraction layer and buffer-based allocator added
by Paul Bakker
· 12 years ago
abf2f8f
zlib compression/decompression skipped on empty blocks
by Paul Bakker
· 12 years ago
e5bffc3
Removed redundant includes
by Paul Bakker
· 12 years ago
d2681d8
Renamed sha2.{c,h} to sha256.{c,h} and sha4.{c,h} to sha512.{c,h}
by Paul Bakker
· 12 years ago
9e36f04
SHA2 renamed to SHA256, SHA4 renamed to SHA512 and functions accordingly
by Paul Bakker
· 12 years ago
2fbefde
Client and server now filter sent and accepted ciphersuites on minimum
by Paul Bakker
· 12 years ago
b6c5d2e
Cleanup up non-prototyped functions (static) and const-correctness
by Paul Bakker
· 12 years ago
90995b5
Added mechanism to provide alternative cipher / hash implementations
by Paul Bakker
· 12 years ago
89ecb2d
ssl_parse_certificate() now calls x509parse_crt_der() directly
by Paul Bakker
· 12 years ago
3c2122f
Fixed const correctness issues that have no impact on the ABI
by Paul Bakker
· 12 years ago
48f7a5d
DHE-PSK based ciphersuite support added and cleaner key exchange based
by Paul Bakker
· 12 years ago
ed27a04
More granular define selections within code to allow for smaller code sizes
by Paul Bakker
· 12 years ago
d4a56ec
Added pre-shared key handling for the client side of SSL / TLS
by Paul Bakker
· 12 years ago
f7abd42
Removed extra spaces on end of lines
by Paul Bakker
· 12 years ago
8f4ddae
Ability to specify allowed ciphersuites based on the protocol version.
by Paul Bakker
· 12 years ago
b7149bc
Corrected behaviour for CBC-based suites using the SHA384 MAC and PRF
by Paul Bakker
· 12 years ago
41c83d3
Added Ephemeral Elliptic Curve Diffie Hellman ciphersuites to SSL/TLS
by Paul Bakker
· 12 years ago
68884e3
Moved to advanced ciphersuite representation and more dynamic SSL code
by Paul Bakker
· 13 years ago
c9118b4
Renamed hash structures to ctx
by Paul Bakker
· 12 years ago
92be97b
Align data with future location based on IV size
by Paul Bakker
· 13 years ago
07eb38b
Update ssl_hw_record_init() to receive keylen, ivlen and maclen as well
by Paul Bakker
· 13 years ago
c787811
Do not set done in case of a fall-through
by Paul Bakker
· 13 years ago
5bd4229
Reverted commit 186751d9dd28082d4b19e69a2c15fd432d366133 and made out_hdr and out_msg back-to-back again
by Paul Bakker
· 13 years ago
926c8e4
Fixed possible NULL pointer exception in ssl_get_ciphersuite()
by Paul Bakker
· 12 years ago
e47b34b
Removed further timing differences during SSL message decryption in ssl_decrypt_buf()
by Paul Bakker
· 12 years ago
86f04f4
Fixed comment
by Paul Bakker
· 12 years ago
c046350
Fixed memory leak in ssl_free() and ssl_reset() for active session
by Paul Bakker
· 12 years ago
40865c8
Added sending of alert messages in case of decryption failures as per RFC
by Paul Bakker
· 13 years ago
d66f070
Disable debug messages that can introduce a timing side channel.
by Paul Bakker
· 13 years ago
4582999
Fixed timing difference resulting from badly formatted padding.
by Paul Bakker
· 13 years ago
1961b70
Added ssl_handshake_step() to allow single stepping the handshake process
by Paul Bakker
· 13 years ago
769075d
Fixed dependency on POLARSSL_SHA4_C in ssl modules
by Paul Bakker
· 13 years ago
645ce3a
- Moved ciphersuite naming scheme to IANA reserved names
by Paul Bakker
· 13 years ago
b0550d9
- Added ssl_get_peer_cert() to SSL API
by Paul Bakker
· 13 years ago
23f3680
- Added proper support for TLS 1.2 signature_algorithm extension on server
by Paul Bakker
· 13 years ago
1d29fb5
- Added option to add minimum accepted SSL/TLS protocol version
by Paul Bakker
· 13 years ago
62f2dee
- Set POLARSSL_DHM_RFC5114_MODP_1024_[PG] as default DHM MODP group for SSL/TLS
by Paul Bakker
· 13 years ago
915275b
- Revamped x509_verify() and the SSL f_vrfy callback implementations
by Paul Bakker
· 13 years ago
5701cdc
- Added ServerName extension parsing (SNI) at server side
by Paul Bakker
· 13 years ago
eb2c658
- Generalized external private key implementation handling (like PKCS#11) in SSL/TLS
by Paul Bakker
· 13 years ago
0a59707
- Added simple SSL session cache implementation
by Paul Bakker
· 13 years ago
d0f6fa7
- Sending of handshake_failures during renegotiation added
by Paul Bakker
· 13 years ago
48916f9
- Added Secure Renegotiation (RFC 5746)
by Paul Bakker
· 13 years ago
5f70b25
- Correctly handle SHA256 ciphersuites in SSLv3
by Paul Bakker
· 13 years ago
b68cad6
- Made cipersuites in ssl context const (no intention to modify)
by Paul Bakker
· 13 years ago
2770fbd
- Added DEFLATE compression support as per RFC3749 (requires zlib)
by Paul Bakker
· 13 years ago
186751d
- Moved out_msg to out_hdr + 32 to support hardware acceleration
by Paul Bakker
· 13 years ago
05ef835
- Added support for Hardware Acceleration hooking in SSL/TLS
by Paul Bakker
· 13 years ago
380da53
- Abstracted checksum updating during handshake
by Paul Bakker
· 13 years ago
ca4ab49
- Added GCM ciphersuites to TLS implementation
by Paul Bakker
· 13 years ago
0a92518
- Report unexpected_message if unknown record type is received
by Paul Bakker
· 13 years ago
10cd225
- Added support for the SHA256 ciphersuites of AES and Camellia
by Paul Bakker
· 13 years ago
1ef83d6
- Initial bare version of TLS 1.2
by Paul Bakker
· 13 years ago
f34cf85
- Fixed too restrictive test
by Paul Bakker
· 13 years ago
452d532
- Fixed potential memory corruption on miscrafted client messages (found by Frama-C team at CEA LIST)
by Paul Bakker
· 13 years ago
fab5c82
- Added support for NULL cipher (POLARSSL_CIPHER_NULL_CIPHER) and weak ciphersuites (POLARSSL_ENABLE_WEAK_CIPHERSUITES). They are disabled by default!
by Paul Bakker
· 13 years ago
b15b851
- Check for failed malloc() in ssl_set_hostname() and x509_get_entries() (Closes ticket #47, found by Hugo Leisink)
by Paul Bakker
· 14 years ago
69e095c
- Changed the behaviour of x509parse_parse_crt for permissive parsing. Now returns the number of 'failed certificates' instead of having a switch to enable it.
by Paul Bakker
· 14 years ago
6c0ceb3
- Added permissive certificate parsing to x509parse_crt() and x509parse_crtfile(). With permissive parsing the parsing does not stop on encountering a parse-error
by Paul Bakker
· 14 years ago
Next »