Paul Bakker
|
defc0ca337
|
Migrated the Memory layer to the Platform layer
Deprecated POLARSSL_MEMORY_C and placed placeholder for memory.h to make
sure current code will not break on new version.
|
2014-02-06 13:20:17 +01:00 |
|
Paul Bakker
|
7dc4c44267
|
Library files moved to use platform layer
|
2014-02-06 13:20:16 +01:00 |
|
Paul Bakker
|
747a83a0f7
|
Platform abstraction layer for memory, printf and fprintf
|
2014-02-06 13:15:25 +01:00 |
|
Paul Bakker
|
ab50d8d30c
|
Merged RSA-PSS support in Certificate, CSR and CRL
|
2014-02-06 13:14:56 +01:00 |
|
Manuel Pégourié-Gonnard
|
f07031aa98
|
debug_ecp: don't print Z, always 1
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
f6dc5e1d16
|
Remove temporary debug code
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
c3f6b62ccc
|
Print curve name instead of size in debugging
Also refactor server-side curve selection
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
ab24010b54
|
Enforce our choice of allowed curves.
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
7f38ed0bfa
|
ssl_set_curves is no longer ECDHE only
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
cd49f76898
|
Make ssl_set_curves() work client-side too.
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
ac7194133e
|
Renamings and other fixes
|
2014-02-06 10:28:38 +01:00 |
|
Gergely Budai
|
e40c469ad3
|
The default ECDH curve list will be dynamically built in the ecp module based on ecp_supported_curves[].
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
de05390c85
|
Rename ecdh_curve_list to curve_list
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
5de2580563
|
Make ssl_set_ecdh_curves() a compile-time option
|
2014-02-06 10:28:38 +01:00 |
|
Gergely Budai
|
987bfb510b
|
Added the possibility to define the allowed curves for ECDHE handshake. It also defines the preference of the curves.
|
2014-02-06 10:28:38 +01:00 |
|
Manuel Pégourié-Gonnard
|
fbf0915404
|
Fix bug in RSA PKCS#1 v1.5 "reversed" operations
|
2014-02-05 17:01:24 +01:00 |
|
Paul Bakker
|
5fb8efe71e
|
Merged HMAC-DRBG code
|
2014-02-05 15:55:18 +01:00 |
|
Manuel Pégourié-Gonnard
|
6e8e34d61e
|
Fix ecp_gen_keypair()
Too few tries caused failures for some curves (esp. secp224k1)
|
2014-02-05 15:53:45 +01:00 |
|
Manuel Pégourié-Gonnard
|
b05db2a6aa
|
Save memory by not storing the HMAC key
|
2014-02-01 11:38:05 +01:00 |
|
Manuel Pégourié-Gonnard
|
cf38367f45
|
Fix HMAC_DRBG and RIPEMD160 error codes
|
2014-02-01 10:24:53 +01:00 |
|
Manuel Pégourié-Gonnard
|
446ee6618f
|
Add LCOV_EXCLUDE_LINE on some IO errors
|
2014-02-01 10:08:26 +01:00 |
|
Manuel Pégourié-Gonnard
|
b3b205e081
|
Clean up details in ctr_drbg_selftest()
|
2014-01-31 12:04:06 +01:00 |
|
Manuel Pégourié-Gonnard
|
79afaa0551
|
Add hmac_drbg_selftest()
|
2014-01-31 11:52:14 +01:00 |
|
Manuel Pégourié-Gonnard
|
48bc3e81da
|
Add hmac_drbg_{write,update}_seed_file()
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
efc8d8078b
|
Use safer names for macros
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
6e897c2a59
|
Add more checks and references
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
d742a032f4
|
Use md_hmac_reset() when possible
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
658dbed080
|
Add automatic periodic reseeding
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
af786ff6cc
|
Add hmac_drbg_set_prediction_resistance()
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
8fc484d1df
|
Add hmac_drbg_reseed()
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
4e669c614d
|
Add hmac_drbg_set_entropy_len()
|
2014-01-30 23:17:33 +01:00 |
|
Manuel Pégourié-Gonnard
|
fe34a5fb83
|
Add entropy callbacks to HMAC_DRBG
|
2014-01-30 15:06:40 +01:00 |
|
Manuel Pégourié-Gonnard
|
8208d167da
|
Add hmac_random_with_add()
|
2014-01-30 12:19:26 +01:00 |
|
Manuel Pégourié-Gonnard
|
7845fc06c9
|
Use new HMAC_DRBG module for deterministic ECDSA
|
2014-01-30 10:58:48 +01:00 |
|
Manuel Pégourié-Gonnard
|
490bdf3928
|
Add minimalistic HMAC_DRBG implementation
(copied from ECDSA)
|
2014-01-30 10:58:48 +01:00 |
|
Paul Bakker
|
2aca241425
|
Ready for release 1.3.4
|
2014-01-27 11:59:30 +01:00 |
|
Paul Bakker
|
42099c3155
|
Revert "Add pk_rsa_set_padding() and rsa_set_padding()"
This reverts commit b4fae579e8 .
Conflicts:
library/pk.c
tests/suites/test_suite_pk.data
tests/suites/test_suite_pk.function
|
2014-01-27 11:59:29 +01:00 |
|
Manuel Pégourié-Gonnard
|
27b93ade6e
|
Factor common code for printing sig_alg
|
2014-01-25 12:48:58 +01:00 |
|
Manuel Pégourié-Gonnard
|
5cac583482
|
Factor out some common code
|
2014-01-25 12:48:58 +01:00 |
|
Manuel Pégourié-Gonnard
|
41cae8e1f9
|
Parse CSRs signed with RSASSA-PSS
|
2014-01-25 12:48:58 +01:00 |
|
Manuel Pégourié-Gonnard
|
5eeb32b552
|
Parse CRLs signed with RSASSA-PSS
|
2014-01-25 12:48:58 +01:00 |
|
Manuel Pégourié-Gonnard
|
ce7c6fd433
|
Fix dependencies
|
2014-01-25 12:48:58 +01:00 |
|
Manuel Pégourié-Gonnard
|
b7de86d834
|
More checks for length match in rsassa-pss params
|
2014-01-25 12:48:58 +01:00 |
|
Manuel Pégourié-Gonnard
|
3c1e8b539c
|
Finish parsing RSASSA-PSS parameters
|
2014-01-25 12:48:58 +01:00 |
|
Manuel Pégourié-Gonnard
|
d9fd87be33
|
Start parsing RSASSA-PSS parameters
|
2014-01-25 12:48:58 +01:00 |
|
Manuel Pégourié-Gonnard
|
b1d4eb16e4
|
Basic parsing of certs signed with RSASSA-PSS
|
2014-01-25 12:48:58 +01:00 |
|
Paul Bakker
|
556efba51c
|
Added AES CFB8 mode
|
2014-01-24 15:38:12 +01:00 |
|
Paul Bakker
|
80025417eb
|
net_is_block() renamed to net_would_block() and corrected behaviour on
non-blocking sockets
net_would_block() now does not return 1 if the socket is blocking.
|
2014-01-23 21:00:57 +01:00 |
|
Paul Bakker
|
c2024f4592
|
Added MPI_CHK around unguarded mpi calls
|
2014-01-23 21:00:57 +01:00 |
|
Manuel Pégourié-Gonnard
|
8e205fc0bc
|
Fix potential buffer overflow in suported_curves_ext
|
2014-01-23 17:27:10 +01:00 |
|