Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2014-02-20 | Fxi typo | Manuel Pégourié-Gonnard | 1 | -1/+1 | |
2014-02-12 | Fix verion-major intolerance | Manuel Pégourié-Gonnard | 1 | -0/+1 | |
2014-02-12 | Revert "Merged RSA-PSS support in Certificate, CSR and CRL" | Manuel Pégourié-Gonnard | 1 | -5/+0 | |
This reverts commit ab50d8d30c22f38e3e2d2373219cfbeb1940082e, reversing changes made to e31b1d992ad0a3874646c73a44f3eb750d13e900. | |||||
2014-02-12 | Revert "Mutex call in x509_crt.c depended on PTHREAD specific instead of ↵ | Manuel Pégourié-Gonnard | 1 | -1/+0 | |
generic" This reverts commit 9eae7aae80c5e9c7a6b798b3930e00b53c063604. | |||||
2014-02-06 | Ability to force the Entropy module to use SHA-256 as its basis | Paul Bakker | 1 | -0/+2 | |
By default the SHA-512 module is used if both are available. On some systems, SHA-256 is the better choice. Contributed by: Gergely Budai | |||||
2014-02-06 | Fixed testing with out-of-source builds using cmake | Paul Bakker | 1 | -0/+1 | |
2014-02-06 | Ability to provide alternate timing implementation | Paul Bakker | 1 | -0/+1 | |
2014-02-06 | More entropy functions made thread-safe (add_source, update_manual, gather) | Paul Bakker | 1 | -0/+2 | |
2014-02-06 | Mutex call in x509_crt.c depended on PTHREAD specific instead of generic | Paul Bakker | 1 | -0/+1 | |
threading | |||||
2014-02-06 | Merged platform compatibility layer | Paul Bakker | 1 | -0/+4 | |
2014-02-06 | Merged RSA-PSS support in Certificate, CSR and CRL | Paul Bakker | 1 | -0/+5 | |
2014-02-06 | Added Curve preference order to ChangeLog | Paul Bakker | 1 | -0/+1 | |
2014-02-05 | Fix bug in RSA PKCS#1 v1.5 "reversed" operations | Manuel Pégourié-Gonnard | 1 | -0/+1 | |
2014-02-05 | Merged HMAC-DRBG code | Paul Bakker | 1 | -0/+3 | |
2014-02-05 | Fix ecp_gen_keypair() | Manuel Pégourié-Gonnard | 1 | -0/+5 | |
Too few tries caused failures for some curves (esp. secp224k1) | |||||
2014-01-27 | Fixed indication for TrustInSoft fixpolarssl-1.3.4 | Paul Bakker | 1 | -1/+3 | |
2014-01-27 | Fixed up ChangeLog with missing bug fixes | Paul Bakker | 1 | -0/+5 | |
2014-01-27 | Ready for release 1.3.4 | Paul Bakker | 1 | -1/+1 | |
2014-01-27 | Updated ChangeLog with deterministic ECDSA | Paul Bakker | 1 | -0/+1 | |
2014-01-27 | Revert "Add pk_rsa_set_padding() and rsa_set_padding()" | Paul Bakker | 1 | -2/+0 | |
This reverts commit b4fae579e8fd72b5e57864d28b5b2c07bad5ce27. Conflicts: library/pk.c tests/suites/test_suite_pk.data tests/suites/test_suite_pk.function | |||||
2014-01-25 | Factor out some common code | Manuel Pégourié-Gonnard | 1 | -0/+3 | |
2014-01-24 | SMTP lines are officially terminated with CRLF, ssl_mail_client fixed | Paul Bakker | 1 | -0/+1 | |
2014-01-24 | Added AES CFB8 mode | Paul Bakker | 1 | -0/+1 | |
2014-01-22 | Merged RIPEMD-160 support | Paul Bakker | 1 | -0/+1 | |
2014-01-22 | Merged support for secp224k1, secp192k1 and secp25k1 | Paul Bakker | 1 | -0/+1 | |
2014-01-22 | Updated ChangeLog with recent changes | Paul Bakker | 1 | -0/+9 | |
2013-12-31 | Removed POLARSSL_THREADING_DUMMY option | Paul Bakker | 1 | -0/+1 | |
2013-12-31 | Fixed potential overflow in certificate size in ssl_write_certificate() | Paul Bakker | 1 | -0/+2 | |
2013-12-31 | Added missing MPI_CHK() around some statements | Paul Bakker | 1 | -0/+2 | |
2013-12-31 | Prepped for 1.3.3 | Paul Bakker | 1 | -1/+1 | |
2013-12-31 | Merged ECP memory usage optimizations | Paul Bakker | 1 | -0/+1 | |
2013-12-30 | Reduced the input / output overhead with 200+ bytes and covered corner | Paul Bakker | 1 | -0/+4 | |
case The actual input / output buffer overhead is only 301 instead of 512. This requires a proper check on the padding_idx to prevent out of bounds reads. Previously a remote party could potentially trigger an access error and thus stop the application when sending a malicious packet having MAX_CONTENT_LEN of data, 32 bytes of MAC and a decrypted padlen of . This would result in reading from in_ctr + 13 + 32 + MAX_CONTENT_LEN - 1 - 1 for 256 bytes (including fake padding check). Or 13 + 32 bytes over the buffer length. We now reset padding_idx to 0, if it's clear that it will never be a valid padding (padlen > msg_len || msg_len + padlen + 256 > buffer_len) | |||||
2013-12-30 | Added version of the SSL pthread server example | Paul Bakker | 1 | -0/+1 | |
2013-12-30 | Merged AES-NI support for AES, AES-GCM and AES key scheduling | Paul Bakker | 1 | -0/+1 | |
2013-12-19 | Fixed x509_crt_parse_path() bug on Windows platforms | Paul Bakker | 1 | -0/+1 | |
2013-12-17 | Merged IPv6 support in the NET module | Paul Bakker | 1 | -0/+1 | |
2013-12-17 | Merged storing curves fully in ROM | Paul Bakker | 1 | -0/+1 | |
2013-12-17 | Merged support for ECDH-RSA / ECDH-ECDSA key exchanges and ciphersuites | Paul Bakker | 1 | -0/+1 | |
2013-12-17 | Fixed memory leak in benchmark application | Paul Bakker | 1 | -0/+1 | |
2013-12-17 | Potential memory leak in ssl_ticket_keys_init() | Paul Bakker | 1 | -0/+1 | |
2013-12-05 | Merged support for Curve25519 | Paul Bakker | 1 | -0/+2 | |
2013-12-05 | Fix bug in mpi_set_bit | Manuel Pégourié-Gonnard | 1 | -0/+1 | |
2013-12-02 | Updated ChangeLog for splitting off curves from ecp.c | Paul Bakker | 1 | -0/+1 | |
2013-12-02 | Merged client ciphersuite order preference option | Paul Bakker | 1 | -0/+2 | |
2013-12-02 | Merged EC key generation support | Paul Bakker | 1 | -0/+3 | |
2013-12-02 | Merged more constant-time checking in RSA | Paul Bakker | 1 | -0/+1 | |
2013-12-02 | Merged change from readdir_r() to readdir() + threading | Paul Bakker | 1 | -0/+1 | |
2013-11-26 | Updated ChangeLog to reflect recent changes | Paul Bakker | 1 | -0/+7 | |
2013-11-21 | SSL now gracefully handles missing RNG | Paul Bakker | 1 | -0/+1 | |
2013-11-21 | Fixed X.509 hostname comparison (with non-regular characters) | Paul Bakker | 1 | -0/+4 | |
In situations with 'weird' certificate names or hostnames (containing non-western allowed names) the check would falsely report a name or wildcard match. |