aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2015-10-05Bump version to 1.2.17polarssl-1.2.17Manuel Pégourié-Gonnard6-10/+10
2015-10-05Merge branch 'polarssl-1.2-restricted' of ↵Simon Butcher7-26/+20
ssh://github.com/ARMmbed/mbedtls-restricted into polarssl-1.2-restricted
2015-10-05Added CVE code to ChangeLogSimon Butcher1-3/+3
2015-10-05Merge branch 'polarssl-1.2' into polarssl-1.2-restrictedManuel Pégourié-Gonnard7-26/+20
* polarssl-1.2: Fix spurious #endif from previous cherry-pick Fix macroization of inline in C++ Add missing warning in doc Fix compile error in net.c with musl libc
2015-10-05Changed attribution for Guido VrankenSimon Butcher1-14/+14
2015-10-05Merge of multiple security fixesSimon Butcher7-10/+58
2015-10-05Fix references to non-standard SIZE_T_MAXManuel Pégourié-Gonnard3-5/+7
Turns out C99 doesn't define SIZE_T_MAX, so let's not use it.
2015-10-05Fix spurious #endif from previous cherry-pickManuel Pégourié-Gonnard2-4/+2
2015-10-05Fix macroization of inline in C++Manuel Pégourié-Gonnard5-20/+11
When compiling as C++, MSVC complains about our macroization of a keyword. Stop doing that as we know inline is always available in C++
2015-10-05Add missing warning in docManuel Pégourié-Gonnard1-1/+2
Found by Nicholas Wilson fixes #288
2015-10-05Fix compile error in net.c with musl libcManuel Pégourié-Gonnard2-1/+7
fixes #278
2015-10-02Fix potential overflow in CertificateRequestManuel Pégourié-Gonnard2-2/+11
2015-10-02Add ChangeLog entryManuel Pégourié-Gonnard1-0/+11
2015-10-01Fix typos in ChangeLogManuel Pégourié-Gonnard1-1/+1
2015-10-01Fix potential overflow in base64_encodeManuel Pégourié-Gonnard3-5/+12
2015-10-01Fix potential random malloc in pem_read()Manuel Pégourié-Gonnard3-0/+10
2015-10-01Fix potential buffer overflow in mpi_read_string()Manuel Pégourié-Gonnard2-2/+12
Found by Guido Vranken. Two possible integer overflows (during << 2 or addition in BITS_TO_LIMB()) could result in far too few memory to be allocated, then overflowing the buffer in the subsequent for loop. Both integer overflows happen when slen is close to or greater than SIZE_T_MAX >> 2 (ie 2^30 on a 32 bit system). Note: one could also avoid those overflows by changing BITS_TO_LIMB(s << 2) to CHARS_TO_LIMB(s >> 1) but the solution implemented looks more robust with respect to future code changes.
2015-10-01Fix stack buffer overflow in pkcs12Manuel Pégourié-Gonnard2-1/+15
2015-09-30Added max length checking of hostnameSimon Butcher2-0/+5
2015-09-22Refined credits in ChangeLog for fuzzing issueSimon Butcher1-1/+2
Changed GDS to Gotham Digital Science
2015-09-21Remove file that should never have been addedManuel Pégourié-Gonnard1-2876/+0
Oops.
2015-09-17Bump version to 1.2.15polarssl-1.2.16Manuel Pégourié-Gonnard6-10/+10
2015-09-17Fix GNUism in bump_version.shManuel Pégourié-Gonnard1-11/+11
2015-09-17Merge pull request #296 from ARMmbed/polarssl-1.2-restrictedSimon Butcher4-3/+2934
Merge of polarssl-1.2-restricted
2015-09-09Add counter-measure against RSA-CRT attackManuel Pégourié-Gonnard2-3/+41
https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy/ backport of a1cdcd2
2015-09-03Fix possible client crash on API misuseManuel Pégourié-Gonnard3-0/+2893
2015-08-31Fix warning with MD/SHA ALT implementationManuel Pégourié-Gonnard7-12/+18
backport of e217cee see #239
2015-08-11Disable -Wunused-result in programs and testsManuel Pégourié-Gonnard2-1/+5
2015-08-10Fix compiler warning in testManuel Pégourié-Gonnard1-2/+3
2015-08-10Silence compiler warning in testManuel Pégourié-Gonnard1-1/+1
Happens with some, but not all, versions of GCC/Glibc.
2015-08-10Accept a trailing space at end of PEM linesManuel Pégourié-Gonnard2-0/+3
With certs being copy-pasted from webmails and all, this will probably become more and more common.
2015-08-10Fix compile error with armcc5 --gnuManuel Pégourié-Gonnard2-1/+4
2015-08-10Fix missing -static-libgcc for dllsManuel Pégourié-Gonnard2-1/+3
2015-08-10Fix bug with cmake and old version of GCCManuel Pégourié-Gonnard2-2/+11
2015-08-10Make tests/compat.sh executableManuel Pégourié-Gonnard1-0/+0
2015-08-10Prepare for 1.2.15 releasepolarssl-1.2.15Paul Bakker6-10/+10
2015-07-03Up default server DH params to 2048 bitsManuel Pégourié-Gonnard3-4/+6
2015-07-03Update dh_genprime programManuel Pégourié-Gonnard1-12/+36
- no warning - configurable size - default to 2048 bits
2015-06-29Fix unchecked malloc()Manuel Pégourié-Gonnard1-0/+5
Found using Infer.
2015-06-29Fix thread-safety issue in debug.cManuel Pégourié-Gonnard3-5/+24
2015-06-29Up min size of DHM params to 1024 bitsManuel Pégourié-Gonnard5-2/+15
2015-06-26Prepare for 1.2.14 releasepolarssl-1.2.14Paul Bakker6-10/+10
2015-04-29Add countermeasure against cache-based lucky 13Manuel Pégourié-Gonnard2-4/+9
2015-04-23Fix invalid memory read in x509_get_sig()Manuel Pégourié-Gonnard2-2/+4
2015-04-23Fix bug in Via Padlock supportManuel Pégourié-Gonnard2-2/+3
Backport of cf201201 from the 1.3 branch
2015-04-23Fix hardclock with some versions of mingw64Manuel Pégourié-Gonnard2-1/+5
Backport of 383433535 from the 1.3 branch
2015-04-23Fix warnings from mingw64 in timing.cManuel Pégourié-Gonnard3-8/+17
Backport from dda52139 from the 1.3 branch
2015-04-23Fix potential unintended sign extensionManuel Pégourié-Gonnard2-3/+9
Backport of 6fdc4cae from the 1.3 branch
2015-04-23Update Changelog for the last two commitsManuel Pégourié-Gonnard1-0/+6
2015-04-10Fix version-major intolerance againManuel Pégourié-Gonnard1-3/+8
This time doing minimal changes to avoid introducing other issues.