summaryrefslogtreecommitdiff
path: root/m4
Commit message (Collapse)AuthorAgeFilesLines
* Release 3.7.3Daiki Ueno2022-01-181-2/+2
| | | | Signed-off-by: Daiki Ueno <ueno@gnu.org>
* ktls: basic implementation of SW modeHedgehog50402021-10-191-0/+18
| | | | | | | | | | | | | | | | | ktls enables us to offload encryption/decryption to the kernel prerequisites: - configured with `--enable-ktls` - tls module `modprobe tls` check with 'lsmod | grep tls' - per connection: gnutls_transport_set_int{2} must be set When prerequisities are met then ktls is used by default. If GnuTLS encounters a error during KTLS initialization, it will not use ktls and fallback to userspace. Signed-off-by: Frantisek Krenzelok <krenzelok.frantisek@gmail.com>
* Release 3.7.2Daiki Ueno2021-05-291-3/+3
| | | | Signed-off-by: Daiki Ueno <ueno@gnu.org>
* build: require libkcapi 1.3.0 or later if --enable-afalgDaiki Ueno2021-05-281-1/+1
| | | | | | | | | The libkcapi 1.3.0 brings a couple of changes needed for GnuTLS: * fix: remove prctl PR_SET_DUMPABLE to allow library to be debugged * fix: ensure that sendmsg is always used as fallback when vmsplice cannot be used Signed-off-by: Daiki Ueno <ueno@gnu.org>
* afalg: use pkg-config to detect libkcapiDaiki Ueno2021-04-231-0/+3
| | | | Signed-off-by: Daiki Ueno <ueno@gnu.org>
* Add AF_ALG accelerationStephan Mueller2021-04-201-0/+12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The patch set adds the backend implementation to use the Linux kernel crypto API via the AF_ALG interface. The GnuTLS AF_ALG extension uses libkcapi [1] as the backend library which implements the actual kernel communication. [1] http://www.chronox.de/libkcapi.html The symmetric cipher support, the hashing and the MAC support are validated to work correctly using NIST CAVS test vectors. The AEAD cipher support was tested by connecting to a remote host using gnutls-cli (the following log strips out unrelated information): Processed 143 CA certificate(s). ... - Certificate type: X.509 - Got a certificate list of 1 certificates. - Certificate[0] info: ... - Description: (TLS1.2)-(ECDHE-SECP384R1)-(RSA-SHA512)-(AES-256-GCM) - Session ID: 9E:5E:FC:09:2A:4E:2A:3D:22:44:68:42:C3:F6:2D:AB:F9:67:08:CE:6D:EE:E4:A2:EF:80:43:FE:3B:D9:1E:FE - Ephemeral EC Diffie-Hellman parameters - Using curve: SECP384R1 - Curve size: 384 bits - Version: TLS1.2 - Key Exchange: ECDHE-RSA - Server Signature: RSA-SHA512 - Cipher: AES-256-GCM - MAC: AEAD - Options: extended master secret, safe renegotiation, - Handshake was completed - Simple Client Mode: Signed-off-by: Stephan Mueller <smueller@chronox.de> Co-authored-by: Daiki Ueno <ueno@gnu.org> Co-authored-by: Hedgehog5040 <krenzelok.frantisek@gmail.com>
* Release 3.7.13.7.1Daiki Ueno2021-03-101-1/+1
| | | | Signed-off-by: Daiki Ueno <ueno@gnu.org>
* Release 3.7.03.7.0Daiki Ueno2020-12-021-2/+2
| | | | Signed-off-by: Daiki Ueno <ueno@gnu.org>
* build: hard require nettle 3.6Daiki Ueno2020-11-041-1/+1
| | | | | | | This allows us to remove several backports, including XTS, CFB8, raw-ChaCha, CMAC64, Curve448, and the GOST curves and hashes. Signed-off-by: Daiki Ueno <ueno@gnu.org>
* Release 3.6.14 [ci skip]Daiki Ueno2020-06-031-2/+2
| | | | Signed-off-by: Daiki Ueno <ueno@gnu.org>
* bumped versionNikos Mavrogiannopoulos2020-03-301-3/+3
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* hooks.m4: bumped so-versionNikos Mavrogiannopoulos2020-02-011-1/+1
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* x509: do not tolerate invalid DER timeNikos Mavrogiannopoulos2019-12-261-0/+14
| | | | | | | | | | | This effectively reverts !400 and ensures that we no longer tolerate invalid DER time. This complements the previous commit by Lili Quan and ensures we provide the --disable-strict-der-time backwards compatibility option. Resolves: #207 Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* bumped versionNikos Mavrogiannopoulos2019-11-291-1/+1
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* bumped versionsgnutls_3_6_10Nikos Mavrogiannopoulos2019-09-291-2/+2
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* maint: Include Guile's M4 macros.Ludovic Courtès2019-09-051-0/+394
| | | | | | | | | | | | | | This ensures 'GUILE_PKG' & co. behaves as we want. Previously we had problem in CI when using 'guile.m4' coming from potentially old distro packages, as discussed in issue !1020: https://gitlab.com/gnutls/gnutls/merge_requests/1020#note_194443890 * m4/guile.m4: New file, from Guile's 'stable-2.2' branch, commit 9846178c69445142ef0b9432417453d2d4de6635. * .x-sc_prohibit_test_minus_ao: New file. Signed-off-by: Ludovic Courtès <ludo@gnu.org>
* bumped version for 3.6.9gnutls_3_6_9Nikos Mavrogiannopoulos2019-07-251-2/+2
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* bumped versiontmp-version-overrideNikos Mavrogiannopoulos2019-05-241-3/+3
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* Revert "bumped version"Nikos Mavrogiannopoulos2019-05-231-3/+3
| | | | | | | | | In order to make the CI functional again. The version number update seems to conflict with tests/tls13/prf-early.sh This reverts commit d34d93b8713cf10235ce7016fd69b6932b0752c0. Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* bumped versionNikos Mavrogiannopoulos2019-05-231-3/+3
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* bumped versionNikos Mavrogiannopoulos2019-03-261-1/+1
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* Use https:// in lib/, src/, and m4/Tim Rühsen2019-03-131-1/+1
| | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* Use https:// for www.gnu.org and www.example.comTim Rühsen2019-03-131-1/+1
| | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* Update ax_code_coverage.m4 to latest release of autoconf-archivetmp-update-ax-code-coverageTim Rühsen2019-02-227-151/+414
| | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* bumped versionsNikos Mavrogiannopoulos2019-01-251-1/+1
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* Implemented support for raw public-key functionality (RFC7250).Tom Vrancken2018-12-151-6/+6
| | | | Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
* Fix error message on old or missing nettle.Andreas Metzler2018-12-011-4/+5
| | | | Signed-off-by: Andreas Metzler <ametzler@bebt.de>
* released 3.4.1gnutls_3_6_5Nikos Mavrogiannopoulos2018-12-011-2/+2
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* bumped versionNikos Mavrogiannopoulos2018-11-301-2/+2
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* bumped versions and updated NEWS fileNikos Mavrogiannopoulos2018-09-241-2/+2
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* Enable the TLS1.3 protocol by defaultNikos Mavrogiannopoulos2018-09-241-15/+0
| | | | | | | As the protocol has been finalized, and the implementation is stable and interoperable, there is no need to enable it conditionally. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* bumped versionsNikos Mavrogiannopoulos2018-07-141-3/+3
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* The SSL 3.0 protocol is disabled on compile time by defaultNikos Mavrogiannopoulos2018-07-131-4/+5
| | | | | | | | | It can be re-enabled by specifying --enable-ssl3-support on configure script. This is the first step before removing support for the protocol completely. Relates #103 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* configure: Fix progress message for --enable-tls13-supportAndreas Metzler2018-07-071-2/+2
| | | | Signed-off-by: Andreas Metzler <ametzler@bebt.de>
* configure: added option --enable-tls13-supportNikos Mavrogiannopoulos2018-07-071-0/+15
| | | | | | | | | | The new option enables TLS1.3 draft-28 support unconditionally. Updated the test suite to run when TLS1.3 is enabled by default, and added a CI run with TLS1.3 enabled. Resolves #424 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* Add configure argument to disable GOST supportDmitry Eremin-Solenikov2018-06-231-0/+14
| | | | Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
* Add bootstrap + bootstrap.confTim Rühsen2018-06-145-561/+0
| | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* nettle: require Nettle library >= 3.4Dmitry Eremin-Solenikov2018-06-131-3/+3
| | | | | | | | Nettle version 3.4 was released more than a half year ago, require it to compile GnuTLS library. It allows us to remove bundled code that was merged into that release. Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
* TLS 1.3: Introduced TLS 1.3 session resumptionAnder Juaristi2018-05-261-16/+0
| | | | | | | | | | | | | | | | | This introduces session resumption under TLS 1.3. For that, it enables the psk_ke_modes extension when we enable session tickets. It enables sending session tickets in addition to PSK usernames. The detection of resumption vs pure PSK is done by comparing the indexes sent with the index received by the server. TLS 1.3 session tickets are always sent to the peer unless the GNUTLS_NO_TICKETS is specified. Resolves #290 Signed-off-by: Ander Juaristi <a@juaristi.eus> Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> Signed-off-by: Daiki Ueno <dueno@redhat.com>
* require nettle 3.3 or laterNikos Mavrogiannopoulos2018-02-191-7/+5
| | | | | | This will simplify handling of the x25519 key exchange. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* bumped versiongnutls_3_6_2Nikos Mavrogiannopoulos2018-02-161-1/+1
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* build: remove m4 files pulled in by autopointDaiki Ueno2017-11-303-905/+0
| | | | | | | Having these files in the git repository causes unnecessary changes after "make bootstrap". Signed-off-by: Daiki Ueno <dueno@redhat.com>
* bumped versionNikos Mavrogiannopoulos2017-10-181-1/+1
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* Modernize gtk-doc supporttmp-modernize-gtk-docAndreas Metzler2017-09-281-10/+37
| | | | | | | | | Update gtk-doc.make, m4/gtk-doc.m4 and doc/reference/Makefile.am from gtk-doc git head (that is 1.26 + c08cc78562c59082fc83b55b58747177510b7a70). Disable gtkdoc-check. Signed-off-by: Andreas Metzler <ametzler@bebt.de>
* m4: updated ax_code_coverage.m4 [ci skip]Nikos Mavrogiannopoulos2017-08-241-6/+6
| | | | | | | This version fixes a bug which prevented including the branch coverage into output. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* hooks.m4: reduce the gap between minor soversion of 3.5.x and 3.6.0Nikos Mavrogiannopoulos2017-08-201-2/+2
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* CONTRIBUTING.md: added section on symbol versioningNikos Mavrogiannopoulos2017-08-091-0/+3
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* _gnutls_digest_is_secure_for_certs: introducedNikos Mavrogiannopoulos2017-07-211-2/+2
| | | | | | | This is a macro to allow checking the security of a hash algorithm with respect to signing certificates. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* Removed support for openpgp certificates and keysNikos Mavrogiannopoulos2017-06-161-15/+0
| | | | | | Resolves #178 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* Fix autoconf progress message concerning heartbeat [ci skip]Andreas Metzler2017-05-141-1/+1
|