summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* released 3.3.19gnutls_3_3_19Nikos Mavrogiannopoulos2015-11-221-1/+1
|
* updated auto-generated filesNikos Mavrogiannopoulos2015-11-211-0/+1
|
* getfuncs.pl: don't consider functions with _gnutls prefixNikos Mavrogiannopoulos2015-11-211-1/+1
|
* gnutls_global_init_skip: prefixed with an underscoreNikos Mavrogiannopoulos2015-11-213-7/+7
|
* bumped versionNikos Mavrogiannopoulos2015-11-212-2/+2
|
* doc updateNikos Mavrogiannopoulos2015-11-201-1/+4
|
* tests: corrected copyright infoNikos Mavrogiannopoulos2015-11-202-4/+4
|
* tests: added check for overriding global initializationNikos Mavrogiannopoulos2015-11-202-1/+66
|
* documented GNUTLS_SKIP_GLOBAL_INIT macroNikos Mavrogiannopoulos2015-11-191-1/+4
|
* Added GNUTLS_SKIP_GLOBAL_INIT macro to allow programs skip implicit global ↵Nikos Mavrogiannopoulos2015-11-193-0/+35
| | | | initialization
* utils: backported sec_sleep()Nikos Mavrogiannopoulos2015-11-162-0/+33
|
* tests: backported mini-handshake-timeoutNikos Mavrogiannopoulos2015-11-161-4/+4
|
* .gitlab-ci.yml: added build and check in FIPS140-2 modeNikos Mavrogiannopoulos2015-11-161-0/+10
|
* tests: backported mini-dtls-record.c and resume-dtls.cNikos Mavrogiannopoulos2015-11-162-82/+69
|
* .gitlab-ci.yml: remove the minimal library from targetsNikos Mavrogiannopoulos2015-11-161-14/+0
|
* disable_optional_stuff: don't disable unique IDs if setNikos Mavrogiannopoulos2015-11-151-4/+18
| | | | | There are sideways set these values even if they are not in the public API, and we shouldn't disable them unconditionally.
* Added CI build rulesNikos Mavrogiannopoulos2015-11-151-0/+45
|
* doc updateNikos Mavrogiannopoulos2015-11-151-0/+4
|
* Require TLS 1.2 for all the ciphersuites which are defined for it onlyNikos Mavrogiannopoulos2015-11-152-98/+98
| | | | This solves an interoperability issue with openssl. Reported by Viktor Dukhovni.
* doc updateNikos Mavrogiannopoulos2015-11-111-0/+3
|
* Allow switching a ciphersuite to DHE and ECDHE on a rehandshakeNikos Mavrogiannopoulos2015-11-112-2/+2
|
* doc updateNikos Mavrogiannopoulos2015-11-081-0/+3
|
* gnutls.pc: don't use the libtool version of the link optionsNikos Mavrogiannopoulos2015-11-031-1/+1
| | | | | Reported by Dan Kegel. Resolves #49
* doc updateNikos Mavrogiannopoulos2015-10-231-0/+3
|
* Disable the NULL cipher on runtime when FIPS140 mode is enabled instead of ↵Nikos Mavrogiannopoulos2015-10-233-5/+12
| | | | | | statically That way the NULL cipher can be used when not in FIPS140 mode.
* backport: Tolerate priority strings with names of legacy ciphers and key ↵Nikos Mavrogiannopoulos2015-10-235-11/+53
| | | | | | | | exchanges That enables better backwards compatibility with old applications which disable or enable algorithms which no longer are supported. Relates #44
* doc updateNikos Mavrogiannopoulos2015-10-151-0/+3
|
* pkcs11: write CKA_ISSUER and CKA_SERIAL_NUMBER when writing on a certificateNikos Mavrogiannopoulos2015-10-151-2/+16
| | | | | That allows NSS to read and use the written certificate. Resolves #43
* doc updateNikos Mavrogiannopoulos2015-10-121-1/+10
|
* Fix memory leak in wrap_nettle_hash_algorithm().Lennert Buytenhek2015-10-121-1/+2
| | | | | | | | | | | | | wrap_nettle_hash_algorithm() leaks an mpz_t if it is called with pk == GNUTLS_PK_RSA and sig == NULL, in which case it will return without going through the regular exit path that clears the mpz_t it allocated at the beginning of the function. Use the regular exit path instead to fix this. This leak can be triggered via calls to gnutls_pubkey_get_preferred_hash_algorithm(). Signed-off-by: Lennert Buytenhek <buytenh@wantstofly.org>
* _gnutls_hex2bin: avoid overrun in the provided bufferNikos Mavrogiannopoulos2015-09-141-2/+1
|
* tpmtool.1: updatedgnutls_3_3_18Nikos Mavrogiannopoulos2015-09-121-34/+56
|
* bumped versionNikos Mavrogiannopoulos2015-09-123-3/+3
|
* Don't use formatted output for fixed stringsNikos Mavrogiannopoulos2015-09-111-3/+3
| | | | Resolves #35
* session packing: corrected issue in PSK session unpackNikos Mavrogiannopoulos2015-08-211-1/+5
|
* doc updateNikos Mavrogiannopoulos2015-08-211-0/+3
|
* x509: when appending CRLs to a trust list ensure that we don't have duplicatesNikos Mavrogiannopoulos2015-08-212-3/+32
| | | | That is, overwrite CRLs if they have been obsoleted.
* certtool: allow exporting very long CRLsNikos Mavrogiannopoulos2015-08-211-5/+4
|
* doc updateNikos Mavrogiannopoulos2015-08-191-0/+9
|
* tests: check whether the CRL generation code works as expectedNikos Mavrogiannopoulos2015-08-192-1/+57
|
* certtool: removed limit on maximum imported certificates in the -i optionNikos Mavrogiannopoulos2015-08-191-17/+8
|
* certtool: eliminated memory leaks due to new cert loading codeNikos Mavrogiannopoulos2015-08-192-5/+14
|
* certtool: lifted limits on file size to loadNikos Mavrogiannopoulos2015-08-192-56/+38
|
* before dist ensure that included libopts matches autogenNikos Mavrogiannopoulos2015-08-101-0/+5
|
* tests: backported fix in mini-eagain2gnutls_3_3_17Nikos Mavrogiannopoulos2015-08-091-2/+3
|
* pkcs11: increase attributes size in gnutls_pkcs11_copy_x509_privkeyNikos Mavrogiannopoulos2015-08-091-1/+1
|
* bumped versionNikos Mavrogiannopoulos2015-08-092-2/+2
|
* doc updateNikos Mavrogiannopoulos2015-08-091-1/+3
|
* doc updateNikos Mavrogiannopoulos2015-08-031-0/+4
|
* pkcs11: set the CKA_TOKEN attribute on generated public keysNikos Mavrogiannopoulos2015-08-032-2/+11
| | | | | That also introduces the GNUTLS_PKCS11_OBJ_FLAG_NO_STORE_PUBKEY flag, to simulate the previous behavior.