summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* build: fix make distclean by including src/gl only oncegnutls_3_4_8Nikos Mavrogiannopoulos2016-01-082-2/+3
|
* symbols.last: added new symbolNikos Mavrogiannopoulos2016-01-081-0/+1
|
* bumped versionNikos Mavrogiannopoulos2016-01-083-4/+4
|
* trust_list_get_issuer_by_dn: fixed check for DN or SPKINikos Mavrogiannopoulos2016-01-071-19/+19
|
* symbols.last: don't include internal symbols into exported listNikos Mavrogiannopoulos2016-01-071-1/+1
|
* updated auto-generated filesNikos Mavrogiannopoulos2016-01-073-17/+3
|
* configure: no longer distribute lzip tarballsNikos Mavrogiannopoulos2016-01-071-1/+1
|
* tests: updated to account for cert generation after ↵Nikos Mavrogiannopoulos2016-01-058-67/+67
| | | | 2adb9b2bfb31afebbdd9f990e2b74c9a3d4e5c57 fix
* doc updateNikos Mavrogiannopoulos2016-01-041-0/+3
|
* Fix out-of-bounds read in gnutls_x509_ext_export_key_usageTim Kosse2016-01-041-1/+1
|
* .gitlab-ci.yml: optimized build processNikos Mavrogiannopoulos2015-12-311-2/+2
| | | | That is, in slow asan and valgrind builds don't check the full test suite.
* doc update [ci skip]Nikos Mavrogiannopoulos2015-12-311-0/+3
|
* doc update [ci skip]Nikos Mavrogiannopoulos2015-12-311-2/+3
|
* gnutls_pkcs11_copy_x509_privkey2: corrected the writing of ECC private keyNikos Mavrogiannopoulos2015-12-311-1/+1
|
* tests: pkcs11-pubkey-import will check both RSA and ECDSA keysNikos Mavrogiannopoulos2015-12-314-13/+102
|
* gnutls_pkcs11_copy_x509_privkey2: corrected the type of the written objectNikos Mavrogiannopoulos2015-12-311-5/+5
| | | | Previously only RSA objects were correctly written.
* tests: added ECDSA key in cert-common.hNikos Mavrogiannopoulos2015-12-311-0/+26
|
* pkcs11: import public keys from any available objectNikos Mavrogiannopoulos2015-12-311-15/+56
| | | | | | | That is, load public keys from the public key object, or the certificate object if they are present. That affects non-RSA public keys which do not contain all required fields on the private key object.
* session DB: made the magic number depending on gnutls' versionNikos Mavrogiannopoulos2015-12-311-1/+1
| | | | | That will make sure that sessions not stored by this version of gnutls will not be resumed by another (which may be incompatible).
* Fix some typos [ci skip]Andreas Metzler2015-12-277-8/+8
|
* NEWS: doc update [ci skip]Nikos Mavrogiannopoulos2015-12-241-0/+3
|
* max_record: don't consider this extension on DTLSNikos Mavrogiannopoulos2015-12-241-0/+6
| | | | | That is because it doesn't work as expected, and does not fragment handshake messages. Relates with #61
* updated documentation on supported algorithms [ci skip]Nikos Mavrogiannopoulos2015-12-222-17/+25
|
* Added SHA384 to the list of TLS support MAC algorithmsNikos Mavrogiannopoulos2015-12-221-3/+6
|
* tests: don't run the no-signal test in systems which MSG_NOSIGNAL is not ↵Nikos Mavrogiannopoulos2015-12-181-11/+21
| | | | available
* doc: manpages: remove generated tpmtool.1 pageNikos Mavrogiannopoulos2015-12-181-229/+0
|
* .gitignore: add m4/extern-inline.m4Alon Bar-Lev2015-12-181-0/+1
|
* doc updateNikos Mavrogiannopoulos2015-12-171-2/+2
|
* tests: added check to verify that the PKCS#7 embedded data are recovered as ↵Nikos Mavrogiannopoulos2015-12-171-0/+16
| | | | expected
* certtool: introduced the --p7-show-data optionNikos Mavrogiannopoulos2015-12-172-6/+50
| | | | | This option allows printing the embedded data in a PKCS#7 signed structure.
* gnutls_pkcs7_get_embedded_data: added functionNikos Mavrogiannopoulos2015-12-173-0/+62
| | | | | This function allows extracting the embedded data from a PKCS#7 signed structure.
* tests: updated pkcs7-gen to account for content-type attributeNikos Mavrogiannopoulos2015-12-161-2/+14
|
* doc updateNikos Mavrogiannopoulos2015-12-161-0/+3
|
* tests: check whether the content-type attribute is set if we sign using timeNikos Mavrogiannopoulos2015-12-161-0/+7
|
* pkcs7: set by default the content type attributeNikos Mavrogiannopoulos2015-12-161-1/+45
| | | | That is a requirement of rfc5652. Relates #59
* pkcs7: use the PK_PKIX1_RSA_OID when writing RSA signature OIDs for PKCS#7 ↵Nikos Mavrogiannopoulos2015-12-165-7/+18
| | | | | | | structures That is because there are implementations which cannot cope with the normal RSA signature OIDs. Relates #59
* pkcs7: Disable the optional fields prior to generating the PKCS#7 structureNikos Mavrogiannopoulos2015-12-162-2/+25
| | | | | This resolves issue with our PKCS#7 structures not being parsed by MacOSX' tools. Relates #59
* certtool: warn if an ECDSA key is marked for encryptionNikos Mavrogiannopoulos2015-12-151-4/+10
|
* certtool: corrected invalid freeNikos Mavrogiannopoulos2015-12-151-2/+2
|
* make sure gnutls_assert is present at the cases where ↵Nikos Mavrogiannopoulos2015-12-153-31/+28
| | | | GNUTLS_E_INTERNAL_ERROR is returned
* configure: really make --disable-crywrap workGustavo Zacarias2015-12-151-5/+4
| | | | | | | | | The crywrap variable is set regardless of the state of enable_crywrap, hence --disable-crywrap never works. Just put the tests for crywrap deps inside the enable_crywrap conditional. Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
* doc updateNikos Mavrogiannopoulos2015-12-141-0/+3
|
* updated chacha20 ciphers to conform to latest draftNikos Mavrogiannopoulos2015-12-141-8/+8
|
* Modified the CHACHA20 cipher to conform to draft-ietf-tls-chacha20-poly1305-02Nikos Mavrogiannopoulos2015-12-146-82/+87
|
* gnutls-cli-debug: rephrased inappropriate fallback test description to match ↵Nikos Mavrogiannopoulos2015-12-131-1/+1
| | | | the rest
* doc updateNikos Mavrogiannopoulos2015-12-131-0/+2
|
* .gitlab-ci.yml: valgrind build was moved at the end as it is the slowest buildNikos Mavrogiannopoulos2015-12-131-9/+9
|
* certtool: the --p7-include-cert option is enabled by defaultNikos Mavrogiannopoulos2015-12-132-2/+4
| | | | | This allows to generate PKCS#7 structures by default that can be read by iOS.
* #56 Feature: certtool --p7-sign support GNUTLS_PKCS7_INCLUDE_CERTsskaje2015-12-132-0/+10
|
* Do not allow importing public keys from PKCS #11 private keys for DSA and ECDSANikos Mavrogiannopoulos2015-12-081-0/+8
| | | | | This prevents the reading of the public key when non-RSA keys are available. This is a much cleaner approach than 5a4e692511dc3a829eda0d7c5a87e56cbc2055f0.