TrustedFirmware Git Browser
Code Review
Sign In
review.trustedfirmware.org
/
mirror
/
mbed-tls
/
e3be6723b042337fa4ee4150cee10366a49e9ec9
/
library
/
ssl_tls.c
5a15fa3
Merge remote-tracking branch 'public/pr/2096' into mbedtls-2.7-proposed
by Simon Butcher
· 7 years ago
ca31b47
Fail when encountering invalid CBC padding in EtM records
by Hanno Becker
· 7 years ago
d82e0c0
Add missing zeroization of reassembled handshake messages
by Hanno Becker
· 7 years ago
9877efb
Merge remote-tracking branch 'restricted/pr/437' into mbedtls-2.7-restricted
by Simon Butcher
· 7 years ago
6910201
Merge remote-tracking branch 'restricted/pr/493' into mbedtls-2.7-restricted
by Simon Butcher
· 7 years ago
f7be6b0
Merge remote-tracking branch 'public/pr/1960' into mbedtls-2.7
by Simon Butcher
· 7 years ago
12f7ede
Compute record expansion in steps to ease readability
by Hanno Becker
· 7 years ago
dbd3e88
Fix mbedtls_ssl_get_record_expansion() for CBC modes
by Hanno Becker
· 7 years ago
cd6a64a
Reset session_in/out pointers in ssl_session_reset_int()
by Hanno Becker
· 7 years ago
2c16114
Revert change of a return variable name
by k-stachowiak
· 7 years ago
7daacda
Merge remote-tracking branch 'restricted/pr/494' into mbedtls-2.7
by Simon Butcher
· 7 years ago
d5a3ed3
Merge remote-tracking branch 'public/pr/1863' into mbedtls-2.7
by Simon Butcher
· 7 years ago
bc5ec41
Merge remote-tracking branch 'public/pr/1847' into mbedtls-2.7
by Simon Butcher
· 7 years ago
8946b0d
Check for invalid short Alert messages
by Angus Gratton
· 7 years ago
b91cb6e
TLSv1.2: Treat zero-length fragments as invalid, unless they are application data
by Angus Gratton
· 7 years ago
1ba8e91
CBC mode: Allow zero-length message fragments (100% padding)
by Angus Gratton
· 7 years ago
7c34432
Avoid debug message that might leak length
by Manuel Pégourié-Gonnard
· 7 years ago
aeeaaf2
Add counter-measure to cache-based Lucky 13
by Manuel Pégourié-Gonnard
· 7 years ago
c2eddee
Fix memory leak in ssl_setup
by k-stachowiak
· 7 years ago
33e5c32
Fixes different off by ones
by Philippe Antoine
· 7 years ago
a35dbf1
about a issue Replace "new" variable #1782
by niisato
· 7 years ago
0fc4e08
Document ssl_write_real() behaviour in detail
by Andres Amaya Garcia
· 8 years ago
bb5e1c3
Fix multiple quality issues in the source
by Simon Butcher
· 7 years ago
bb07ca0
Fix Lucky13 attack protection when using HMAC-SHA-384
by Gilles Peskine
· 7 years ago
149f3a4
Change variable bytes_written to header_bytes in record decompression
by Andrzej Kurek
· 7 years ago
c3a3e2d
ssl_tls: Fix invalid buffer sizes during compression / decompression
by Andrzej Kurek
· 7 years ago
d8e0cec
Merge remote-tracking branch 'upstream-public/pr/1464' into mbedtls-2.7-proposed
by Jaeden Amero
· 7 years ago
b5f53b1
Merge remote-tracking branch 'upstream-public/pr/1401' into mbedtls-2.7-proposed
by Jaeden Amero
· 7 years ago
29ed80f
Fix compatibility problem in the printed message
by mohammad1603
· 7 years ago
44a6a68
Check whether INT_MAX larger than SIZE_MAX scenario
by mohammad1603
· 7 years ago
2ea2d68
Verify that f_send and f_recv send and receive the expected length
by mohammad1603
· 7 years ago
2170130
Robustness fix in mbedtls_ssl_derive_keys
by Gilles Peskine
· 7 years ago
b11af86
Avoid wraparound on in_left
by mohammad1603
· 7 years ago
158fc33
Merge remote-tracking branch 'upstream-public/pr/1296' into HEAD
by Gilles Peskine
· 7 years ago
6085c72
Backport 2.7:Add guard to out_left to avoid negative values
by mohammad1603
· 7 years ago
3f9cff2
Merge branch 'prr_424' into mbedtls-2.7-proposed
by Gilles Peskine
· 7 years ago
784de59
Merge remote-tracking branch 'upstream-restricted/pr/410' into development-restricted
by Jaeden Amero
· 8 years ago
66954e1
Merge branch 'development' into development-restricted
by Jaeden Amero
· 8 years ago
5e9f14d
Set correct minimal versions in default conf
by Ron Eldor
· 8 years ago
9e4f77c
New MD API: rename functions from _ext to _ret
by Gilles Peskine
· 8 years ago
d91f2a2
Merge branch 'development' into iotssl-1251-2.7
by Gilles Peskine
· 8 years ago
3d8c907
Compute outgoing MAC in temporary buffer for MAC-then-Encrypt
by Hanno Becker
· 8 years ago
82d607e
Merge remote-tracking branch 'upstream-restricted/pr/433' into development-restricted
by Gilles Peskine
· 8 years ago
d04c623
Merge remote-tracking branch 'restricted/pr/403' into development-restricted
by Manuel Pégourié-Gonnard
· 8 years ago
b053efb
Fix magic constant in previous commit
by Manuel Pégourié-Gonnard
· 8 years ago
464147c
Fix SSLv3 MAC computation
by Manuel Pégourié-Gonnard
· 8 years ago
02e28fe
Merge remote-tracking branch 'upstream-restricted/pr/425' into development-restricted
by Gilles Peskine
· 8 years ago
0960f06
Merge branch 'development' into development-restricted
by Gilles Peskine
· 8 years ago
0884f48
Merge remote-tracking branch 'upstream-public/pr/1141' into development
by Gilles Peskine
· 8 years ago
1df4923
Remove compile-time deprecation warning for TRUNCATED_HMAC_COMPAT
by Hanno Becker
· 8 years ago
c753f5d
Merge remote-tracking branch 'upstream-restricted/pr/369' into development-restricted
by Gilles Peskine
· 8 years ago
68306ed
Merge remote-tracking branch 'upstream-public/pr/1094' into development
by Gilles Peskine
· 8 years ago
4c2ac7e
Deprecate MBEDTLS_SSL_TRUNCATED_HMAC_COMPAT
by Hanno Becker
· 8 years ago
563423f
Improve documentation of MBEDTLS_SSL_TRUNCATED_HMAC_COMPAT option
by Hanno Becker
· 8 years ago
e89353a
Add fallback to non-compliant truncated HMAC for compatibiltiy
by Hanno Becker
· 8 years ago
81c7b18
Don't truncate MAC key when truncated HMAC is negotiated
by Hanno Becker
· 8 years ago
992b687
Fix heap corruption in ssl_decrypt_buf
by Hanno Becker
· 8 years ago
888fede
Merge branch 'development' into development-restricted
by Manuel Pégourié-Gonnard
· 8 years ago
21df7f9
Fix handling of HS msgs in mbedtls_ssl_read if renegotiation unused
by Hanno Becker
· 8 years ago
b4ff0aa
Swap branches accepting/refusing renegotiation in in ssl_read
by Hanno Becker
· 8 years ago
1a9a51c
Enhance documentation of ssl_write_hostname_ext, adapt ChangeLog.
by Hanno Becker
· 8 years ago
947194e
Make mbedtls_ssl_set_hostname safe to be called multiple times
by Hanno Becker
· 8 years ago
a90658f
Add ssl_conf_dh_param_bin superseding ssl_conf_dh_param
by Hanno Becker
· 8 years ago
470a8c4
Deprecate mbedtls_ssl_conf_dh_param
by Hanno Becker
· 8 years ago
184f675
Improve debugging output
by Hanno Becker
· 8 years ago
00d0a68
Adapt code setting default DHM parameters
by Hanno Becker
· 8 years ago
2f38a43
Enhance documentation of ssl_write_hostname_ext, adapt ChangeLog.
by Hanno Becker
· 8 years ago
39f5d35
Make mbedtls_ssl_set_hostname safe to be called multiple times
by Hanno Becker
· 8 years ago
8c8b0ab
Change default Diffie-Hellman parameters from RFC 5114 to RFC 7919
by Hanno Becker
· 8 years ago
0b7b83f
Fixed SIGSEGV problem when writing with ssl_write_real a buffer that is over MBEDTLS_SSL_MAX_CONTENT_LEN bytes
by Florin
· 8 years ago
2b187c4
Correct typo
by Hanno Becker
· 8 years ago
9648f8b
Add run-time check for handshake message size in ssl_write_record
by Hanno Becker
· 8 years ago
d33f1ca
Add run-time check for record content size in ssl_encrypt_buf
by Hanno Becker
· 8 years ago
0169253
Document code silently discarding invalid records
by Andres Amaya Garcia
· 8 years ago
2fad94b
Dont send alert on invalid DTLS record type
by Andres Amaya Garcia
· 8 years ago
3395250
Fix use of uninitialised ret ssl_tls.c
by Andres Amaya Garcia
· 8 years ago
46f5a3e
Check return codes from MD in ssl code
by Andres Amaya Garcia
· 8 years ago
bbafd34
Set len var to 0 when buf is freed in ssl_tls.c
by Andres Amaya Garcia
· 8 years ago
1a607a1
Change ssl_tls to use new MD API and check ret code
by Andres Amaya Garcia
· 8 years ago
a004988
Zeroize old psk buf when changing value in ssl_tls
by Andres Amaya Garcia
· 8 years ago
bdf3905
Ensure application data records are not kept when fully processed
by Hanno Becker
· 8 years ago
bb9dd0c
Add hard assertion to mbedtls_ssl_read_record_layer
by Hanno Becker
· 8 years ago
4a810fb
Fix mbedtls_ssl_read
by Hanno Becker
· 8 years ago
af0665d
Simplify retaining of messages for future processing
by Hanno Becker
· 8 years ago
e6706e6
Add tests for missing CA chains and bad curves.
by Hanno Becker
· 8 years ago
39ae8cd
Fix implementation of VERIFY_OPTIONAL verification mode
by Hanno Becker
· 8 years ago
383a118
Merge remote-tracking branch 'gilles/IOTSSL-1330/development' into development
by Manuel Pégourié-Gonnard
· 8 years ago
5d2511c
SHA-1 deprecation: allow it in key exchange
by Gilles Peskine
· 8 years ago
5e79cb3
Remove SHA-1 in TLS by default
by Gilles Peskine
· 8 years ago
23b33f8
Merge remote-tracking branch 'hanno/sig_hash_compatibility' into development
by Manuel Pégourié-Gonnard
· 8 years ago
088ce43
Implement optional CA list suppression in Certificate Request
by Janos Follath
· 8 years ago
7e5437a
Remember suitable hash function for any signature algorithm.
by Hanno Becker
· 8 years ago
92e4426
SSLv3: when refusing renegotiation, stop processing
by Gilles Peskine
· 8 years ago
c94f735
Ignore failures when sending fatal alerts
by Gilles Peskine
· 8 years ago
8498cb3
Cleaned up double variable declaration
by Gilles Peskine
· 8 years ago
064a85c
Code portability fix
by Gilles Peskine
· 8 years ago
1cc8e34
Send TLS alerts in many more cases
by Gilles Peskine
· 8 years ago
f982852
Balanced braces across preprocessor conditionals
by Gilles Peskine
· 8 years ago
182013f
Prevent SLOTH attacks
by Janos Follath
· 9 years ago
2196c7f
Fix renegotiation at incorrect times in DTLS
by Andres AG
· 9 years ago
Next »