Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Use the IANA assigned padding extension number. | Nikos Mavrogiannopoulos | 2014-04-07 | 1 | -1/+3 |
| | |||||
* | updated patch to take account of function renames | Nikos Mavrogiannopoulos | 2014-04-05 | 2 | -6/+6 |
| | |||||
* | set the same flags in the second search | Nikos Mavrogiannopoulos | 2014-04-05 | 1 | -0/+1 |
| | |||||
* | The GNUTLS_PKCS11_OBJ_FLAG_RETRIEVE_DISTRUSTED flag is specific to p11-kit ↵ | Nikos Mavrogiannopoulos | 2014-04-04 | 1 | -0/+11 |
| | | | | trust modules. | ||||
* | Perform time check when removing a certificate in ↵ | Nikos Mavrogiannopoulos | 2014-04-04 | 1 | -4/+20 |
| | | | | | | _gnutls_pkcs11_verify_crt_status() This brings the function in par with _gnutls_verify_crt_status(). | ||||
* | When verifying, check for the same certificate in the pkcs11 trusted list, ↵ | Nikos Mavrogiannopoulos | 2014-04-04 | 2 | -0/+22 |
| | | | | | | | | | not only the issuer When the certificate list verifying ends in a non self-signed certificate, and the self-signed isn't in our pkcs11 trusted list, make sure that we search for the non-self-signed as well. This affects, gnutls_x509_trust_list_verify_crt() when used with a PKCS #11 trust module. | ||||
* | When verifying check for the same certificate in the trusted list, not only ↵ | Nikos Mavrogiannopoulos | 2014-04-03 | 1 | -0/+23 |
| | | | | | | | | | | the issuer When the certificate list verifying ends in a non self-signed certificate, and the self-signed isn't in our trusted list, make sure that we search for the non-self-signed in our list as well. This affects, gnutls_x509_trust_list_verify_crt() and makes its results identical to gnutls_x509_crt_list_verify(). | ||||
* | corrected version numbers. | Nikos Mavrogiannopoulos | 2014-04-02 | 1 | -1/+1 |
| | |||||
* | corrected version number | Nikos Mavrogiannopoulos | 2014-03-31 | 1 | -1/+1 |
| | |||||
* | doc update | Nikos Mavrogiannopoulos | 2014-03-31 | 1 | -2/+2 |
| | |||||
* | cleaned up documentation of gnutls_record_send() | Nikos Mavrogiannopoulos | 2014-03-31 | 1 | -10/+10 |
| | |||||
* | make gnutls_record_uncork() more DTLS friendly. | Nikos Mavrogiannopoulos | 2014-03-31 | 1 | -1/+14 |
| | |||||
* | Check explicitly for the errors gnutls_record_uncork() should recover from. | Nikos Mavrogiannopoulos | 2014-03-28 | 1 | -1/+1 |
| | |||||
* | do not consider wildcards in non-ascii names. | Nikos Mavrogiannopoulos | 2014-03-27 | 1 | -1/+15 |
| | |||||
* | set the invalid flag when the owner is unexpected. | Nikos Mavrogiannopoulos | 2014-03-20 | 1 | -1/+1 |
| | |||||
* | Changed the behaviour in wildcard acceptance in certificates. | Nikos Mavrogiannopoulos | 2014-03-20 | 2 | -0/+11 |
| | | | | | | | | | Wildcards are only accepted when there are more than two domain components after the wildcard. This will prevent accepting certificates from CAs that issued '*.com', or 'www.*'. Conflicts: tests/hostname-check.c | ||||
* | export _gnutls_vasprintf that is used by xssl. | Nikos Mavrogiannopoulos | 2014-03-11 | 1 | -0/+1 |
| | | | | Report and patch by Tobias Gruetzmacher. | ||||
* | set correct value if found | Nikos Mavrogiannopoulos | 2014-03-08 | 1 | -0/+1 |
| | |||||
* | ciphersuites that utilize SHA256 or SHA384 are only available in TLS 1.0 | Nikos Mavrogiannopoulos | 2014-03-08 | 1 | -39/+39 |
| | | | | | | The SSL 3.0 protocol (rfc6101) uses a variant of HMAC that is only defined for MD5 and SHA1. Thus if such a ciphersuite is negotiated under SSL 3.0, it will during MAC initialization. | ||||
* | explicit type conversions when needed | Nikos Mavrogiannopoulos | 2014-03-08 | 5 | -50/+51 |
| | |||||
* | more clang warning fixes | Nikos Mavrogiannopoulos | 2014-03-08 | 6 | -7/+10 |
| | |||||
* | silence some warnings | Nikos Mavrogiannopoulos | 2014-03-08 | 1 | -2/+2 |
| | |||||
* | clang warning fixes | Nikos Mavrogiannopoulos | 2014-03-08 | 4 | -7/+16 |
| | |||||
* | Ensure failure when no base64 data have been read. Suggested by Ramkumar ↵ | Nikos Mavrogiannopoulos | 2014-03-06 | 1 | -6/+11 |
| | | | | Chinchani. | ||||
* | xssl compilation fix; patch by Colin Leroy | Nikos Mavrogiannopoulos | 2014-03-06 | 1 | -1/+1 |
| | |||||
* | Fixed checking the length of a null string | Jason Spafford | 2014-03-06 | 1 | -3/+3 |
| | | | | | | | | in cdk_strlist_add, it would check the strlen of the 'string' parameter before it checked if the parameter was null. Signed-off-by Jason Spafford nullprogrammer@gmail.com | ||||
* | check the blacklist for certificates provided in ↵gnutls_3_2_12 | Nikos Mavrogiannopoulos | 2014-03-02 | 1 | -0/+8 |
| | | | | | | | gnutls_x509_trust_list_verify_named_crt(). Conflicts: lib/x509/verify-high.c | ||||
* | print message before failing when the pull timeout function isn't replaced. | Nikos Mavrogiannopoulos | 2014-03-02 | 1 | -1/+3 |
| | |||||
* | Allow all ciphersuites in SSL3.0 when they are available in TLS1.0 | Nikos Mavrogiannopoulos | 2014-02-28 | 1 | -79/+79 |
| | |||||
* | corrected return codes. | Nikos Mavrogiannopoulos | 2014-02-28 | 1 | -11/+24 |
| | |||||
* | Corrected error checking in _gnutls_x509_ext_gen_proxyCertInfo | Nikos Mavrogiannopoulos | 2014-02-28 | 1 | -3/+3 |
| | |||||
* | removed not trusted message; reported by Michel Briand. | Nikos Mavrogiannopoulos | 2014-02-26 | 1 | -4/+0 |
| | |||||
* | combined initialization | Nikos Mavrogiannopoulos | 2014-02-22 | 1 | -5/+4 |
| | |||||
* | reinitialize the handshake timers when gnutls_handshake() is called. | Nikos Mavrogiannopoulos | 2014-02-18 | 2 | -1/+5 |
| | |||||
* | Corrected bug in gnutls_pcert_list_import_x509_raw(). | Nikos Mavrogiannopoulos | 2014-02-15 | 1 | -4/+5 |
| | | | | | | The bug caused gnutls_pcert_list_import_x509_raw() to crash if gnutls_x509_crt_list_import() would fail with the provided data. Reported by Dmitriy Anisimkov. | ||||
* | ensure that the issuer in present in a trusted module. | Nikos Mavrogiannopoulos | 2014-02-13 | 1 | -1/+1 |
| | |||||
* | removed flag GNUTLS_PKCS11_TOKEN_TRUSTED_UINT | Nikos Mavrogiannopoulos | 2014-02-13 | 2 | -27/+1 |
| | |||||
* | Added flag GNUTLS_PKCS11_TOKEN_TRUSTED for gnutls_pkcs11_token_get_flags(). | Nikos Mavrogiannopoulos | 2014-02-13 | 2 | -2/+11 |
| | |||||
* | Use the GNUTLS_PKCS11_OBJ_FLAG_PRESENT_IN_TRUSTED_MODULE to ensure that only ↵ | Nikos Mavrogiannopoulos | 2014-02-13 | 1 | -19/+2 |
| | | | | | | | trusted modules are used. Conflicts: lib/x509/verify.c | ||||
* | Added flag GNUTLS_PKCS11_OBJ_FLAG_PRESENT_IN_TRUSTED_MODULE. | Nikos Mavrogiannopoulos | 2014-02-13 | 3 | -8/+19 |
| | | | | | | This flag can be used to ensure that the object request lies on a marked as trusted PKCS #11 module. The marking is done on p11-kit configuration. | ||||
* | mark trusted p11-kit modules as trusted. | Nikos Mavrogiannopoulos | 2014-02-13 | 1 | -0/+5 |
| | | | | | Conflicts: lib/pkcs11.c | ||||
* | Fix bug that prevented the rejection of v1 intermediate CA certificates. | Nikos Mavrogiannopoulos | 2014-02-12 | 1 | -1/+4 |
| | | | | Reported by Suman Jana. | ||||
* | do not redefine the _gnutls_x86_cpuid_s symbol | Nikos Mavrogiannopoulos | 2014-02-10 | 3 | -5/+2 |
| | |||||
* | removed unimplemented API. | Nikos Mavrogiannopoulos | 2014-02-03 | 1 | -2/+0 |
| | |||||
* | when using a PKCS #11 module for verification ensure that it has been marked ↵ | Nikos Mavrogiannopoulos | 2014-02-03 | 1 | -0/+19 |
| | | | | a trusted module in p11-kit. | ||||
* | Added flag GNUTLS_PKCS11_TOKEN_TRUSTED_UINT that can be used to obtain ↵ | Nikos Mavrogiannopoulos | 2014-02-03 | 2 | -6/+37 |
| | | | | p11-kit's P11_KIT_MODULE_TRUSTED flag. | ||||
* | When setting multiple initial keywords in a priority string, the security ↵ | Nikos Mavrogiannopoulos | 2014-02-03 | 1 | -16/+12 |
| | | | | level set is the one of the lowest security. | ||||
* | consider the initial keyword set even when it's set to NONE. | Nikos Mavrogiannopoulos | 2014-02-02 | 1 | -0/+1 |
| | |||||
* | When two initial keywords are specified then treat the second as having the ↵ | Nikos Mavrogiannopoulos | 2014-02-02 | 1 | -1/+3 |
| | | | | | | '+' modifier. This will handle SECURE256:SECURE128 the same way as SECURE256:+SECURE128. | ||||
* | corrected typo | Nikos Mavrogiannopoulos | 2014-02-01 | 1 | -1/+1 |
| |