summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* Update ax_code_coverage.m4 to latest release of autoconf-archivetmp-update-ax-code-coverageTim Rühsen2019-02-2210-152/+420
| | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* Merge branch 'thread_local_msvc_fixed' into 'master'Nikos Mavrogiannopoulos2019-02-211-0/+2
|\ | | | | | | | | lib: Provide _Thread_local on MSVC See merge request gnutls/gnutls!933
| * lib: Provide _Thread_local on MSVCHugo Beauzée-Luyssen2019-02-201-0/+2
|/ | | | Signed-off-by: Hugo Beauzée-Luyssen <hugo@beauzee.fr>
* Merge branch 'tmp-get-source-branch' into 'master'Nikos Mavrogiannopoulos2019-02-191-0/+5
|\ | | | | | | | | check_if_signed: Get source branch if not set See merge request gnutls/gnutls!930
| * check_if_signed: Get source branch if not setTim Rühsen2019-02-181-0/+5
| | | | | | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* | Merge branch 'tmp-fix-record-size-limit-resumption' into 'master'Daiki Ueno2019-02-1815-124/+320
|\ \ | |/ |/| | | | | Fix issues in record_size_limit extension handling See merge request gnutls/gnutls!879
| * gnutls_record_set_max_size: make it work on server sidetmp-fix-record-size-limit-resumptionDaiki Ueno2019-02-142-79/+153
| | | | | | | | | | | | | | | | The record_size_limit extension can also be specified by the server to indicate the maximum plaintext. Also add test cases for asymmetric settings between server and client. Signed-off-by: Daiki Ueno <dueno@redhat.com>
| * tlsfuzzer: update to the latest upstream for record_size_limit testDaiki Ueno2019-02-143-12/+46
| | | | | | | | Signed-off-by: Daiki Ueno <dueno@redhat.com>
| * ext/record_size_limit: account for content type octet in TLS 1.3Daiki Ueno2019-02-142-7/+34
| | | | | | | | | | | | | | | | | | | | | | | | | | | | In TLS 1.3, the protocol maximum of plaintext size is 2^14+1, while it is 2^14 in TLS 1.2. To accommodate that, this introduces the following invariant: - when the maximum is set by the user with gnutls_record_set_max_size(), store it as is. The value range is [511, 16834]. - when the maximum is negotiated through record_size_limit extension, it can be [512, 16385]. In TLS 1.3, subtract by 1 to fit in [511, 16384]. Signed-off-by: Daiki Ueno <dueno@redhat.com>
| * decrypt_packet_tls13: add check for max plaintext sizeDaiki Ueno2019-02-141-0/+9
| | | | | | | | | | | | | | There is check in _gnutls_recv_in_buffers already, but for TLS 1.3 we need to take account of the padding. Signed-off-by: Daiki Ueno <dueno@redhat.com>
| * record: reject too large plaintext after decryptionDaiki Ueno2019-02-141-0/+9
| | | | | | | | Signed-off-by: Daiki Ueno <dueno@redhat.com>
| * constate: reset max_record_recv_size upon renegotiationDaiki Ueno2019-02-141-0/+9
| | | | | | | | Signed-off-by: Daiki Ueno <dueno@redhat.com>
| * session_pack: reset max_record_recv_size when packingDaiki Ueno2019-02-141-3/+12
| | | | | | | | Signed-off-by: Daiki Ueno <dueno@redhat.com>
| * ext/record_size_limit: don't confuse with negotiated/user-supplied maximumDaiki Ueno2019-02-142-14/+35
| | | | | | | | | | | | | | | | As documented in gnutls_int.h, max_record_send_size is for tracking the user-supplied maximum, while max_record_recv_size for the protocol negotiated maximum. Signed-off-by: Daiki Ueno <dueno@redhat.com>
| * ext/max_record: server shouldn't send it with record_size_limitDaiki Ueno2019-02-144-8/+11
| | | | | | | | | | | | | | | | | | Otherwise, the connection will be disconnected by the client, as suggested in RFC: A client MUST treat receipt of both "max_fragment_length" and "record_size_limit" as a fatal error, and it SHOULD generate an "illegal_parameter" alert. Signed-off-by: Daiki Ueno <dueno@redhat.com>
| * _gnutls_hello_ext_is_present: don't ignore max_fragment_lengthDaiki Ueno2019-02-141-1/+1
| | | | | | | | | | | | The extension is assigned the internal ID 0. Signed-off-by: Daiki Ueno <dueno@redhat.com>
| * .dir-locals.el: disable indent-tabs-mode in js-modeDaiki Ueno2019-02-141-1/+2
| | | | | | | | Signed-off-by: Daiki Ueno <dueno@redhat.com>
* | Merge branch 'gnutls-703' into 'master'Tim Rühsen2019-02-141-0/+5
|\ \ | | | | | | | | | | | | | | | | | | tests: wrap ADD_SYSCALL for getrandom in test for SYS_getrandom Closes #703 See merge request gnutls/gnutls!926
| * | tests: wrap ADD_SYSCALL for getrandom in test for SYS_getrandomR. Andrew Bailey2019-02-141-0/+5
| |/ | | | | | | Signed-off-by: R. Andrew Bailey <bailey@akamai.com>
* | Merge branch 'tmp-macosx-fix' into 'master'Tim Rühsen2019-02-141-10/+12
|\ \ | |/ |/| | | | | bootstrap.conf: do not override GNULIB_SRCDIR See merge request gnutls/gnutls!925
| * bootstrap.conf: do not override GNULIB_SRCDIRtmp-macosx-fixNikos Mavrogiannopoulos2019-02-141-10/+12
|/ | | | | | | This was not set in all of our CI platforms, and was causing issues in MacOSX. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* Merge branch 'tmp-fix-cert-params-checks' into 'master'Nikos Mavrogiannopoulos2019-02-147-62/+136
|\ | | | | | | | | | | | | x509: corrected issue in the algorithm parameters comparison Closes #698 See merge request gnutls/gnutls!921
| * x509: corrected issue in the algorithm parameters comparisonNikos Mavrogiannopoulos2019-02-147-62/+136
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Each certificate has two fields to set the signature algorithm and parameters used for the digital signature. One of the fields is authenticated and the other is not. It is required from RFC5280 to enforce the equality of these fields, but currently due to an issue we wouldn't enforce the equality of the parameters fields. This fix corrects the issue. We also move an RSA-PSS certificate in chainverify that was relying on invalid parameters, to this set of invalid certificates. Resolves: #698 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* | Merge branch 'tmp-fix-uninitialized2' into 'master'Tim Rühsen2019-02-142-26/+53
|\ \ | | | | | | | | | | | | Fix uninitialized warning in pkcs11.c See merge request gnutls/gnutls!906
| * | tests: added further checks for gnutls_pkcs11_token_get_infotmp-fix-uninitialized2Nikos Mavrogiannopoulos2019-02-141-2/+9
| | | | | | | | | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
| * | Fix uninitialized warning in pkcs11.cTim Rühsen2019-02-142-26/+46
|/ / | | | | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* | Merge branch 'tmp-serv-args' into 'master'Tim Rühsen2019-02-121-1/+1
|\ \ | | | | | | | | | | | | | | | | | | Fix 32bit overflow issue in src/serv-args.def Closes #700 See merge request gnutls/gnutls!922
| * | Fix 32bit overflow issue in src/serv-args.defTim Rühsen2019-02-121-1/+1
| |/ | | | | | | | | | | | | | | | | | | | | Fixing this warning seen on 32bit architectures: serv-args.c: In function 'doOptMaxearlydata': serv-args.c:1431:14: warning: overflow in conversion from 'long long int' to 'long int' changes value from '4294967296' to '0' [-Woverflow] { 1, 4294967296 } }; ^~~~~~~~~~ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* | Merge branch 'tmp-ssize-t' into 'master'Tim Rühsen2019-02-122-19/+4
|\ \ | |/ |/| | | | | | | | | Remove typedef'ing ssize_t in gnutls.h Closes #688 See merge request gnutls/gnutls!916
| * Remove typedef'ing ssize_t in gnutls.htmp-ssize-tTim Rühsen2019-02-122-19/+4
|/ | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* Merge branch 'tmp-gnulib-pton' into 'master'Tim Rühsen2019-02-1012-300/+20
|\ | | | | | | | | Use inet_pton() from gnulib See merge request gnutls/gnutls!913
| * Use inet_pton() from gnulibtmp-gnulib-ptonTim Rühsen2019-02-1012-300/+20
| | | | | | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* | Merge branch 'tmp-gitlab-triage' into 'master'Tim Rühsen2019-02-101-0/+71
|\ \ | | | | | | | | | | | | .triage-policies.yml: added [ci skip] See merge request gnutls/gnutls!908
| * | .triage-policies.yml: added [ci skip]tmp-gitlab-triageNikos Mavrogiannopoulos2019-02-041-0/+71
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This adds a set of policies regarding issues and merge requests to be enforced by the gitlab-triage bot. That is: - Issues without any label for more than a month are marked with needs attention label - Issues with needinfo label are closed if they are not updated within a month - Merge requests marked as WIP with no update within 5 months are closed. These rules are not enforced automatically; we have to schedule a run of the gitlab-triage bot. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* | | Merge branch 'tmp-enforce-gnulib-rules-for-lib' into 'master'Tim Rühsen2019-02-091-1/+11
|\ \ \ | | | | | | | | | | | | | | | | bootstrap: refuse to bootstrap if any new dependencies bring gnulib's network stack See merge request gnutls/gnutls!919
| * | | bootstrap: refuse to bootstrap if any dependencies bring gnulib's network stacktmp-enforce-gnulib-rules-for-libNikos Mavrogiannopoulos2019-02-091-1/+11
|/ / / | | | | | | | | | | | | | | | | | | | | | | | | | | | If gnulib's network stack is brought (due to a dependency) in the library it will make the library unusable to non-gnulib using applications. This prevents windows applications for example to use gnutls, and so on. Even more it is quite hard to catch that issue because our testsuite uses gnulib as well. Instead we try to catch the these modules at import time. Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* | | Merge branch 'tmp-key-usage' into 'master'Nikos Mavrogiannopoulos2019-02-0815-59/+320
|\ \ \ | |_|/ |/| | | | | | | | | | | | | | When negotiating TLS1.3 enforce certificate key usage Closes #690 See merge request gnutls/gnutls!902
| * | _gnutls_gen_rawpk_crt: corrected the use of asserttmp-key-usageNikos Mavrogiannopoulos2019-02-061-9/+10
| | | | | | | | | | | | | | | | | | | | | The API could return 0 or 1 matching certificates. The case of zero can only happen in client side. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
| * | raw public keys: apply the key usage bits the same way as X.509Nikos Mavrogiannopoulos2019-02-065-6/+142
| | | | | | | | | | | | | | | | | | | | | That is, we require a signing certificate when negotiating TLS1.3, or when sending a client certificate (on all cases). Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
| * | Fallback to TLS 1.2 when incompatible with signature certs are providedNikos Mavrogiannopoulos2019-02-067-34/+70
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This only takes into account certificates in the credentials structure. If certificates are provided in a callback, these must be checked by the provider. For that we assume that the credentials structure is filled when associated with a session; if not then the fallback mechanism will not work and the handshake will fail. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
| * | Enforce the certificate key usage restrictions on all casesNikos Mavrogiannopoulos2019-02-0610-16/+104
| |/ | | | | | | | | | | | | | | | | | | | | | | | | | | | | That is, we require a signing certificate when negotiating TLS1.3, or when sending a client certificate (on all cases). Before we would not perform any checks under TLS1.3 or when client certificates are sent, assuming that the certificates used will always be signing ones. However if the user sets up incorrectly a decryption certificate we would use it for signing. This fix makes sure that an error is returned early when these scenarios are detected. Resolves: #690 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* | Merge branch 'tmp-gnulib-ntop' into 'master'Tim Rühsen2019-02-086-264/+4
|\ \ | |/ |/| | | | | Use inet_ntop() from gnulib See merge request gnutls/gnutls!912
| * Use inet_ntop() from gnulibtmp-gnulib-ntopTim Rühsen2019-02-076-264/+4
|/ | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* Merge branch 'fix-nettle-check' into 'master'Nikos Mavrogiannopoulos2019-02-041-2/+2
|\ | | | | | | | | build: pass NETTLE_LIBS together with HOGWEED_LIBS See merge request gnutls/gnutls!903
| * build: pass NETTLE_LIBS together with HOGWEED_LIBSDmitry Eremin-Solenikov2019-02-021-2/+2
| | | | | | | | | | | | | | libhogweed might depend on exact non-system-wide nettle, so let's pass NETTLE_LIBS flags together when using HOGWEED_LIBS. Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
* | Merge branch 'fix-pkcs11-mechs' into 'master'Nikos Mavrogiannopoulos2019-02-041-2/+3
|\ \ | | | | | | | | | | | | build: do not generate mech-list.h if p11-kit is not available See merge request gnutls/gnutls!904
| * | build: do not generate mech-list.h if p11-kit is not availableDmitry Eremin-Solenikov2019-02-021-2/+3
| |/ | | | | | | | | | | | | | | | | Compiling GnuTLS with no p11-kit installed will result in a serie of warnings during build time because mech-list.h will be generated even if pkcs11 tool compilation is disabled. Move mech-list.h generation to happen only if pkcs11 is enabled, thus removing these warnings. Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
* | Merge branch 'tmp-fix-sni-error' into 'master'Tim Rühsen2019-01-318-10/+18
|\ \ | | | | | | | | | | | | | | | | | | Amend error code when SNI name is not accepted Closes #683 See merge request gnutls/gnutls!891
| * | Add GNUTLS_E_RECEIVED_DISALLOWED_NAME for illegal SNI namesTim Rühsen2019-01-318-10/+18
|/ / | | | | | | | | | | | | | | | | | | An illegal/disallowed SNI server name previously generated the misleading message "An illegal parameter has been received.". This commit changes it to "A disallowed SNI server name has been received.". Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* | Merge branch 'nettle-stdint' into 'master'Tim Rühsen2019-01-301-1/+1
|\ \ | | | | | | | | | | | | lib/nettle: replace nettle-stdint.h with just stdint.h See merge request gnutls/gnutls!901