summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* bumped library versiongnutls_2_12_8Nikos Mavrogiannopoulos2011-08-082-2/+2
|
* document new config files of p11-kit.Nikos Mavrogiannopoulos2011-08-081-7/+6
|
* Prevent from loading twice the same module.Nikos Mavrogiannopoulos2011-08-081-4/+17
|
* better placement of ifdefs.Nikos Mavrogiannopoulos2011-08-051-3/+3
|
* updated newsNikos Mavrogiannopoulos2011-08-041-3/+4
|
* check the output of fgets.Nikos Mavrogiannopoulos2011-08-011-1/+3
|
* corrected uninitialized warning.Nikos Mavrogiannopoulos2011-08-011-6/+2
|
* document p11-kitNikos Mavrogiannopoulos2011-08-012-6/+9
|
* documented p11-kit addition.Nikos Mavrogiannopoulos2011-08-011-0/+4
|
* Don't try to do PKCS#11 login if session is already logged in.Stef Walter2011-08-011-0/+10
| | | | | | | | | * It is possible for new PKCS#11 sessions to be logged in if another logged in session already exists. * In these cases, don't log in, but detect the condition and return success. Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* When finding private keys fail, return error code.Stef Walter2011-08-011-2/+4
| | | | | | * Previously this would result in an endless loop. Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* pkcs11: Use p11_kit_pin_xxx() functionality when 'pinfile' is in uris.Stef Walter2011-08-016-80/+202
| | | | | | | | * This allows other apps to register a handler for a specific pinfile and then that application will be able to provide the PIN for those URIs. Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* Use pkcs11.h specification file from p11-kit.Stef Walter2011-08-012-1/+2
| | | | | | * Remove one included briefly in gnutls. Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* Fix up compiler warnings.Stef Walter2011-08-015-12/+6
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* The attached patch ports gnutls to p11-kit.Stef Walter2011-08-0127-4291/+1056
| | | | | | | | | | | | * p11-kit is added as a dependency. p11-kit itself has no dependencies outside of basic libc stuff. The source code for p11-kit is available both in git and tarball form. * If the gnutls dependency on p11-kit is disabled (via a configure option) then the PKCS#11 support is disabled. This is useful in bare bones embedded systems or places where very minimal dependencies are limited. Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* gnutls-cli: Fix uninitialized variable when PKCS#11 uris in use.Stef Walter2011-08-011-1/+1
| | | | | | | * When PKCS#11 URIs are in use previously tried to free uninitialized memory. Initialize to zero. Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* Added GNUTLS_X509_CRT_LIST_FAIL_IF_UNSORTED flag for ↵Nikos Mavrogiannopoulos2011-07-316-6/+279
| | | | | | gnutls_x509_crt_list_import. It checks whether the list to be imported is properly sorted.
* checking converted to gnutls_cert from pcert.Nikos Mavrogiannopoulos2011-07-311-3/+3
|
* removed unused variableNikos Mavrogiannopoulos2011-07-311-1/+0
|
* bumped version to 2.12.8Nikos Mavrogiannopoulos2011-07-313-3/+3
|
* Added GNUTLS_E_CERTIFICATE_LIST_UNSORTED.Nikos Mavrogiannopoulos2011-07-314-0/+77
| | | | | | | | If a certificate list is loaded then verify that it is sorted with order to starts with the subject and finished with the trusted root. That way we make sure we don't send data that violate the TLS protocol.
* corrected typoNikos Mavrogiannopoulos2011-07-282-2/+2
|
* documented updates.Nikos Mavrogiannopoulos2011-07-271-1/+8
|
* only add zlib.pc if found. Corrected libs.private in nettle case.Nikos Mavrogiannopoulos2011-07-272-4/+11
|
* documented fixes.Nikos Mavrogiannopoulos2011-07-251-0/+11
|
* Replaced all occurences of gcry_sexp_nth_mpi (..., 0) withAndreas Metzler2011-07-251-16/+16
| | | | gcry_sexp_nth_mpi (..., GCRYMPI_FMT_USG).
* writev_emu: stop on the first incomplete writeSjoerd Simons2011-07-251-0/+3
| | | | | | | | Just like standard writev, we should only move on to the next block if all the previous ones have been successfully written out. Otherwise there is a potential for data loss and/or confusing push functions. Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* Honor uninitialized private key in destructorPetr Písař2011-07-231-0/+2
| | | | | | Fixes bug #107730. Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* Corrected initialization of key when generating request. Reported by Petr Pisar.Nikos Mavrogiannopoulos2011-07-231-3/+4
|
* Crippled status of gnutls_x509_privkey_t was removed to avoid thread safety ↵Nikos Mavrogiannopoulos2011-07-234-80/+26
| | | | issues.
* bumped version.gnutls_2_12_7_aNikos Mavrogiannopoulos2011-06-185-5/+5
|
* Limit the number of attempts with the same PIN, to avoid attempting again ↵gnutls_2_12_7Nikos Mavrogiannopoulos2011-06-171-2/+5
| | | | and again with a wrong PIN.
* When writing an object with CKA_TRUSTED set CKA_PRIVATE explicitly to FALSE, ↵Nikos Mavrogiannopoulos2011-06-171-1/+8
| | | | to allow the SO to write it. Reported by Rickard Bellgrim.
* corrected makefile.Nikos Mavrogiannopoulos2011-06-161-1/+1
|
* updated newsNikos Mavrogiannopoulos2011-06-161-0/+18
|
* Corrections on security officer login.Nikos Mavrogiannopoulos2011-06-164-74/+15
|
* The CKA_SUBJECT must be specified for a certificate.Rickard Bellgrim2011-06-161-1/+15
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* When setting the TRUSTED flag login as security officer.Nikos Mavrogiannopoulos2011-06-153-1/+9
|
* write label in PKCS #11 privkey.Nikos Mavrogiannopoulos2011-06-151-0/+8
|
* define ck_bool_t to be compatible with PKCS #11 bool type.Nikos Mavrogiannopoulos2011-06-157-7/+6
|
* Return error code when an object is not found.Nikos Mavrogiannopoulos2011-06-072-2/+2
| | | | | | Only request for token insertion if the expected data is not found. Based on patch by Stef Walter.
* tests: Build eagain-cli with correct librariesStef Walter2011-06-071-1/+1
| | | | | | * Add -ldl -lpthread to linker flags Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* pkcs11: Accept CKR_USER_ALREADY_LOGGED_IN as successful result for PAP LoginStef Walter2011-06-071-2/+2
| | | | | | | | | | * When doing CKF_PROTECTED_AUTHENTICATION_PATH login, accept CKR_USER_ALREADY_LOGGED_IN as a successful result. * Another code path, or another consumer of the same PKCS#11 module may have already logged in. * This is what the non PAP code path already does. Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* Corrected typo. Reported by Andreas Metzler.Nikos Mavrogiannopoulos2011-06-051-1/+1
|
* regenerated Makefile.Nikos Mavrogiannopoulos2011-06-051-8/+11
|
* corrected .so version number.gnutls_2_12_6_1Nikos Mavrogiannopoulos2011-06-052-2/+2
|
* preparing for release.gnutls_2_12_6Nikos Mavrogiannopoulos2011-06-045-5/+11
|
* Follow http://tools.ietf.org/html/draft-mavrogiannopoulos-tls-dss-00 in DSA ↵Nikos Mavrogiannopoulos2011-06-045-37/+28
| | | | signature generation.
* updatesNikos Mavrogiannopoulos2011-06-011-3/+3
|
* Added parameter generation section.Nikos Mavrogiannopoulos2011-05-311-16/+62
|