Manuel Pégourié-Gonnard
|
9533765b25
|
Reject certs and CRLs from the future
|
2014-03-13 19:25:06 +01:00 |
|
Manuel Pégourié-Gonnard
|
6304f786e0
|
Add x509_time_future()
|
2014-03-13 19:25:06 +01:00 |
|
Manuel Pégourié-Gonnard
|
1ec220b002
|
Add missing #ifdefs in aes.h
|
2014-03-13 19:25:06 +01:00 |
|
Manuel Pégourié-Gonnard
|
c9093085ed
|
Revert "Merged RSA-PSS support in Certificate, CSR and CRL"
This reverts commit ab50d8d30c , reversing
changes made to e31b1d992a .
|
2014-02-12 09:39:59 +01:00 |
|
Paul Bakker
|
2ceda57989
|
Ability to force the Entropy module to use SHA-256 as its basis
By default the SHA-512 module is used if both are available. On some
systems, SHA-256 is the better choice.
Contributed by: Gergely Budai
|
2014-02-06 15:55:25 +01:00 |
|
Paul Bakker
|
f2561b3f69
|
Ability to provide alternate timing implementation
|
2014-02-06 15:32:26 +01:00 |
|
Paul Bakker
|
47703a0a80
|
More entropy functions made thread-safe (add_source, update_manual, gather)
|
2014-02-06 15:01:20 +01:00 |
|
Paul Bakker
|
6a28e722c9
|
Merged platform compatibility layer
|
2014-02-06 13:44:19 +01:00 |
|
Paul Bakker
|
71dfa861a6
|
Made valid prototypes by adding ( void ) as parameter prototype
|
2014-02-06 13:20:18 +01:00 |
|
Paul Bakker
|
a9066cf8f1
|
Include stdlib in the right spot
|
2014-02-06 13:20:18 +01:00 |
|
Paul Bakker
|
defc0ca337
|
Migrated the Memory layer to the Platform layer
Deprecated POLARSSL_MEMORY_C and placed placeholder for memory.h to make
sure current code will not break on new version.
|
2014-02-06 13:20:17 +01:00 |
|
Paul Bakker
|
b2f66c9158
|
Only include platform files when needed
|
2014-02-06 13:20:16 +01:00 |
|
Paul Bakker
|
747a83a0f7
|
Platform abstraction layer for memory, printf and fprintf
|
2014-02-06 13:15:25 +01:00 |
|
Paul Bakker
|
ab50d8d30c
|
Merged RSA-PSS support in Certificate, CSR and CRL
|
2014-02-06 13:14:56 +01:00 |
|
Manuel Pégourié-Gonnard
|
792657045b
|
Disable ecp_set_curve() for compatibility
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
ab24010b54
|
Enforce our choice of allowed curves.
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
7f38ed0bfa
|
ssl_set_curves is no longer ECDHE only
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
cd49f76898
|
Make ssl_set_curves() work client-side too.
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
ac7194133e
|
Renamings and other fixes
|
2014-02-06 10:28:38 +01:00 |
|
Gergely Budai
|
e40c469ad3
|
The default ECDH curve list will be dynamically built in the ecp module based on ecp_supported_curves[].
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
de05390c85
|
Rename ecdh_curve_list to curve_list
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
5de2580563
|
Make ssl_set_ecdh_curves() a compile-time option
|
2014-02-06 10:28:38 +01:00 |
|
Gergely Budai
|
987bfb510b
|
Added the possibility to define the allowed curves for ECDHE handshake. It also defines the preference of the curves.
|
2014-02-06 10:28:38 +01:00 |
|
Paul Bakker
|
5fb8efe71e
|
Merged HMAC-DRBG code
|
2014-02-05 15:55:18 +01:00 |
|
Manuel Pégourié-Gonnard
|
ffd94cce6b
|
Fix curve list in dependency checking
|
2014-02-05 15:54:16 +01:00 |
|
Manuel Pégourié-Gonnard
|
ad3fab602d
|
Fix outdated comment
|
2014-02-05 15:54:04 +01:00 |
|
Manuel Pégourié-Gonnard
|
b05db2a6aa
|
Save memory by not storing the HMAC key
|
2014-02-01 11:38:05 +01:00 |
|
Manuel Pégourié-Gonnard
|
cf38367f45
|
Fix HMAC_DRBG and RIPEMD160 error codes
|
2014-02-01 10:24:53 +01:00 |
|
Manuel Pégourié-Gonnard
|
f6a17d0776
|
Fix some doc comments
|
2014-01-31 11:52:14 +01:00 |
|
Manuel Pégourié-Gonnard
|
48bc3e81da
|
Add hmac_drbg_{write,update}_seed_file()
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
0520b60faf
|
Make options configurable for HMAC_DRBG
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
efc8d8078b
|
Use safer names for macros
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
658dbed080
|
Add automatic periodic reseeding
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
af786ff6cc
|
Add hmac_drbg_set_prediction_resistance()
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
8fc484d1df
|
Add hmac_drbg_reseed()
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
4e669c614d
|
Add hmac_drbg_set_entropy_len()
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
fe34a5fb83
|
Add entropy callbacks to HMAC_DRBG
|
2014-01-30 15:06:40 +01:00 |
|
Manuel Pégourié-Gonnard
|
8208d167da
|
Add hmac_random_with_add()
|
2014-01-30 12:19:26 +01:00 |
|
Manuel Pégourié-Gonnard
|
7845fc06c9
|
Use new HMAC_DRBG module for deterministic ECDSA
|
2014-01-30 10:58:48 +01:00 |
|
Manuel Pégourié-Gonnard
|
490bdf3928
|
Add minimalistic HMAC_DRBG implementation
(copied from ECDSA)
|
2014-01-30 10:58:48 +01:00 |
|
Paul Bakker
|
2aca241425
|
Ready for release 1.3.4
|
2014-01-27 11:59:30 +01:00 |
|
Paul Bakker
|
42099c3155
|
Revert "Add pk_rsa_set_padding() and rsa_set_padding()"
This reverts commit b4fae579e8 .
Conflicts:
library/pk.c
tests/suites/test_suite_pk.data
tests/suites/test_suite_pk.function
|
2014-01-27 11:59:29 +01:00 |
|
Manuel Pégourié-Gonnard
|
27b93ade6e
|
Factor common code for printing sig_alg
|
2014-01-25 12:48:58 +01:00 |
|
Manuel Pégourié-Gonnard
|
5cac583482
|
Factor out some common code
|
2014-01-25 12:48:58 +01:00 |
|
Manuel Pégourié-Gonnard
|
41cae8e1f9
|
Parse CSRs signed with RSASSA-PSS
|
2014-01-25 12:48:58 +01:00 |
|
Manuel Pégourié-Gonnard
|
5eeb32b552
|
Parse CRLs signed with RSASSA-PSS
|
2014-01-25 12:48:58 +01:00 |
|
Manuel Pégourié-Gonnard
|
ce7c6fd433
|
Fix dependencies
|
2014-01-25 12:48:58 +01:00 |
|
Manuel Pégourié-Gonnard
|
3c1e8b539c
|
Finish parsing RSASSA-PSS parameters
|
2014-01-25 12:48:58 +01:00 |
|
Manuel Pégourié-Gonnard
|
d9fd87be33
|
Start parsing RSASSA-PSS parameters
|
2014-01-25 12:48:58 +01:00 |
|
Manuel Pégourié-Gonnard
|
b1d4eb16e4
|
Basic parsing of certs signed with RSASSA-PSS
|
2014-01-25 12:48:58 +01:00 |
|