summaryrefslogtreecommitdiff
path: root/lib
Commit message (Collapse)AuthorAgeFilesLines
* Corrected bugs in gnutls_x509_rdn_get(). Added a test to print the server's ↵Nikos Mavrogiannopoulos2003-02-146-21/+37
| | | | trusted CAs in gnutls-cli-debug, and in gnutls-cli.
* ported to libtasn1 0.2.x. Also the included minitasn1 was replaced by the ↵Nikos Mavrogiannopoulos2003-02-1427-357/+550
| | | | 0.2.1 version of libtasn1.
* gnutls_const_datum was removed from exported types, for the time being.Nikos Mavrogiannopoulos2003-02-145-84/+3
|
* *** empty log message ***Nikos Mavrogiannopoulos2003-02-141-3/+7
|
* Added option to allow an X.509 server not to send the trusted CA list to the ↵Nikos Mavrogiannopoulos2003-02-134-9/+35
| | | | peer.
* Added test which prints the Diffie Hellman prime bits used.Nikos Mavrogiannopoulos2003-02-121-1/+1
|
* Added some private key handling functions. They are primitive enough for now.Nikos Mavrogiannopoulos2003-02-1214-65/+246
|
* gnutls_x509_certificate_* were renamed gnutls_x509_crt_*.Nikos Mavrogiannopoulos2003-02-1222-303/+303
|
* added gnutls_x509_certificate_get_fingerprint(). Untested yet.Nikos Mavrogiannopoulos2003-02-124-4/+59
|
* renamed gnutls_x509_fingerprint to gnutls_fingerprint.Nikos Mavrogiannopoulos2003-02-1010-58/+21
|
* fixes in pkcs3 DH parameter generation.Nikos Mavrogiannopoulos2003-02-091-2/+3
|
* Several internal changes to use the new certificate API. CRL support is ↵Nikos Mavrogiannopoulos2003-02-0924-1690/+991
| | | | complete.
* Certificate revocation support is almost complete.Nikos Mavrogiannopoulos2003-02-0810-140/+299
|
* added a crl verification function (untested yet).Nikos Mavrogiannopoulos2003-02-088-87/+408
|
* Added some new certificate verification functions.Nikos Mavrogiannopoulos2003-02-0818-372/+946
|
* *** empty log message ***Nikos Mavrogiannopoulos2003-02-082-3/+55
|
* removed the raw part in the gnutls_privkey internal structure..Nikos Mavrogiannopoulos2003-02-074-26/+2
|
* Criticality of an X.509 extension can now be extracted.Nikos Mavrogiannopoulos2003-02-076-19/+33
|
* Added function to extract the key usage extension from an X.509 certificate, ↵Nikos Mavrogiannopoulos2003-02-075-112/+307
| | | | and combined some code.
* *** empty log message ***Nikos Mavrogiannopoulos2003-02-071-1/+1
|
* More stuff for the new certificate API.Nikos Mavrogiannopoulos2003-02-0710-41/+130
|
* The old certificate parsing API was reimplemented over the new one. It will ↵Nikos Mavrogiannopoulos2003-02-078-1097/+679
| | | | stay in the 1.0.0 release for compatibility reasons.
* Added the new PKCS7 parsing functions.Nikos Mavrogiannopoulos2003-02-078-10/+407
|
* Added the new certificate handling functions.Nikos Mavrogiannopoulos2003-02-072-0/+795
|
* Added the new certificate handling functions.Nikos Mavrogiannopoulos2003-02-079-52/+61
|
* More improvements in the CRL support, and the X.509 backend. Added a ↵Nikos Mavrogiannopoulos2003-02-0711-450/+711
| | | | function to get some parts of the DN using an OID.
* CRL parsing support is almost complete.Nikos Mavrogiannopoulos2003-02-065-38/+261
|
* Several fixes and improvements in CRL support.Nikos Mavrogiannopoulos2003-02-0611-112/+175
|
* Added preliminary CRL support. This will be under the new X.509 API. Other ↵Nikos Mavrogiannopoulos2003-02-058-6/+457
| | | | x509 functions will be updated later.
* some fixes. There wasn't any limitation in libtasn1 code... just my lazyness.Nikos Mavrogiannopoulos2003-02-052-5/+3
|
* * Added gnutls_pkcs3_extract_dh_params() and gnutls_pkcs3_export_dh_params()Nikos Mavrogiannopoulos2003-02-034-5/+129
| | | | | | | which extracts and export parameters from and to PKCS#3 encoded structures. These were added to read parameters generated using the openssl dhparam tool. * The prime program was modified to also print the generated prime and generator using the PKCS#3 format.
* * gnutls_dh_params_generate() and gnutls_rsa_params_generate() now useNikos Mavrogiannopoulos2003-02-0319-508/+227
| | | | | | | | | | | | gnutls_malloc() to allocate the output parameters. * Added gnutls_pkcs3_extract_dh_params() which extracts parameters from PKCS#3 encoded structures. This was in order to read parameters generated using the openssl dhparam tool. * Several changes in the temporary (DH/RSA) parameter codebase. No DH parameters are now included in the library. Also a credentials structure can now hold only one temporary parameter.
* more doc for the gnutls_set_dh_prime_bits().Nikos Mavrogiannopoulos2003-01-301-0/+5
|
* removed backward compatibility functions for 0.9.0 version.Nikos Mavrogiannopoulos2003-01-303-155/+8
|
* *** empty log message ***Nikos Mavrogiannopoulos2003-01-301-0/+6
|
* use RECEIVED_ILLEGAL_PARAMETER instead of SRP_PROTOCOL_FAILURE, whenNikos Mavrogiannopoulos2003-01-252-2/+0
| | | | the SRP protocol fails.
* The gcrypt log handler is only set when we are in debugging mode.Nikos Mavrogiannopoulos2003-01-241-0/+3
|
* *** empty log message ***Nikos Mavrogiannopoulos2003-01-241-0/+4
|
* Added ability to send some messages back to the application usingNikos Mavrogiannopoulos2003-01-2311-46/+38
| | | | the gnutls_global_set_log_function(). This is quite experimental.
* Added check and error code for some SRP fatal protocol failures.Nikos Mavrogiannopoulos2003-01-233-0/+4
|
* *** empty log message ***Nikos Mavrogiannopoulos2003-01-233-1/+3
|
* The library notifies the application on empty and illegal SRP usernames,Nikos Mavrogiannopoulos2003-01-233-2/+5
| | | | | | | | so that proper notification (via an alert) is sent to the peer. Currently when the SRP ciphersuite is advertized but no username is sent by the peer, the library returns GNUTLS_E_EMPTY_SRP_USERNAME, and the alert associated with this is GNUTLS_A_ACCESS_DENIED (to be changed when the srp draft defines something more appropriate).
* *** empty log message ***gnutls_0_8_1Nikos Mavrogiannopoulos2003-01-221-1/+1
|
* *** empty log message ***Nikos Mavrogiannopoulos2003-01-221-1/+1
|
* Improved the SRP support, to prevent attackers guessing theNikos Mavrogiannopoulos2003-01-222-47/+0
| | | | | available usernames by brute force. The g,n values sent are now obtained by the password conf file. (they were static ones)
* *** empty log message ***Nikos Mavrogiannopoulos2003-01-2037-37/+38
|
* Prefixed with underscore some internal functions.Nikos Mavrogiannopoulos2003-01-166-23/+23
|
* GNUTLS_E_PARSING_ERROR error code was replaced by GNUTLS_E_BASE64_DECODING_ERNikos Mavrogiannopoulos2003-01-135-15/+20
| | | | | and GNUTLS_E_SRP_PWD_PARSING_ERROR. GNUTLS_E_ASCII_ARMOR_ERROR was also replaced by GNUTLS_E_BASE64_DECODING_ERROR.
* *** empty log message ***Nikos Mavrogiannopoulos2003-01-091-0/+2
|
* Only the documented symbols are now exported.Nikos Mavrogiannopoulos2003-01-0910-138/+188
|