| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
| |
|
|
|
|
| |
This introduces gnutls_utf8_password_normalize() and a dependency on libunistring.
|
|
|
|
|
|
|
|
| |
The old DN parsing functions are changed to return the original
non-fully compliant with RFC4514 string format, while the new
ones return the compliant string by default. This allows applications
which relied on the previous format to continue functioning without
changes.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
response
That is, we no longer reply to a client's hello with a status request, with
a status request extension. Although that behavior which was introduced
in 6b76e0c899b1ff08df9bd9b41588f771f050be89 is legal, it creates incompatibility
issues with gnutls 3.3.x branch. That is because versions prior 3.3.26
translates the presence of the extension as a guarrantee that the status
response data will be sent. Even though, that is false assumption we
replicate the previous behavior to allow such clients to connect to
a gnutls 3.5.x server.
Relates !66
|
|
|
|
|
|
|
|
|
| |
While the change was fully backwards compatible for applications that were
adding a single certificate, and applications that were checking for negative
errors codes, many applications do not. As this may cause incompatibility issues
with software properly utilizing the previously documented API, the change
is reverted, and applications need to explicitly enable a flag (GNUTLS_CERTIFICATE_API_V2)
in the credentials structure for the set_key functions to return an index.
|
|
|
|
|
|
| |
These flags allow the callers to disable the automatically enabled
session tickets. This could be done only with GNUTLS_NO_EXTENSIONS
which also disabled other useful extensions.
|
| |
|
|
|
|
|
|
| |
certificate
That is check the provided certificate for validity in time and key usage.
|
|
|
|
|
|
|
|
|
|
|
| |
That is, the functions gnutls_certificate_set_known_dh_params(),
gnutls_anon_set_server_known_dh_params(),
gnutls_psk_set_server_known_dh_params().
These functions allow to statically set the DH parameters, based
on the RFC7919 FFDHE parameters. This can simplify server configuration
by allowing DH without loading parameters from file.
Relates #37
|
| |
|
|
|
|
|
|
|
|
| |
This flag allows the export of the stored embedded data with any wrapping
encoding included. This in particular, it allows to read the data from the
microsoft catalog PKCS#7 structures, which store as embedded data elements
of a SEQUENCE, but only authenticate the inner parts without the bytes
forming the SEQUENCE header.
|
|
|
|
|
|
| |
This allows to decode very old PKCS#7 structures where the content is not
an octet string. In addition, it introduces gnutls_pkcs7_get_embedded_data_oid()
to obtain the OID of the signature data.
|
|
|
|
|
| |
This allows a caller to add supplemental data handling which will
only be made available for a specific session.
|
|
|
|
|
| |
This allows a caller to add extensions which will be made available
for a specific session.
|
|
|
|
|
| |
This allows to mark objects as distrusted, as well as to be
able to list distrusted objects.
|
|
|
|
|
|
| |
This allows functions like decryption and verification to report
the specific issue they encountered on public key error.
The new codes are GNUTLS_E_PK_INVALID_PUBKEY and GNUTLS_E_PK_INVALID_PRIVKEY
|
|
|
|
|
|
|
|
|
|
|
| |
That introduces a new function to allow setting an OCSP status
request handling function per certificate. Furthermore it repurposes
the flag parameters to an index option on gnutls_certificate_set_ocsp_status_request_file.
The changes above allow setting a different OCSP status response
file per certificate, and a different function. The indexes they
rely on to associate with existing certs are the indexes returned
by the gnutls_certificate_set_key() and friends functions.
|
| |
|
|
|
|
|
|
|
| |
While this is a legacy (and insecure) cipher combination it is the
default output of openssl up until the 1.0.2 version. We introduce
this option to allow decrypting private keys from these versions of
openssl.
|
|
|
|
| |
This improves compatibility with new openssl versions.
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Moved IP/CIDR to string conversion functions into separate
header and export privately for the use in tests.
- Placed ip_in_cidr() into separate header for easy testing
- Add publicly available function to convert text CIDR to RFC5280
format for the use in name constraints extension.
- certtool: Use GnuTLS exported CIDR functions instead of local ones.
- Export mask_to_prefix, mask_ip for internal GnuTLS use.
- Introduce new error value (malformed cidr) and add to description
functions in errors.c.
Signed-off-by: Martin Ukrop <mukrop@redhat.com>
|
|
|
|
|
| |
This will allow minor modifications to the semantics of the function
in the future, without introducing a new API.
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
| |
This introduces a new function gnutls_transport_set_fastopen().
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Signed-off-by: Tim Ruehsen <tim.ruehsen@gmx.de>
|
|
|
|
|
| |
This is to prevent issues to callers who may check for negative
error values.
|
|
|
|
|
|
|
|
|
| |
This error code is returned when the session resumption parameters
are requested during a handshake. That is, to increase the clarity
when requesting these parameters while false start is active and
the handshake is not complete even if gnutls_handshake() has returned.
Relates #114
|
|
|
|
|
|
|
| |
- If the intersection of name constraints of the given type was empty, the results allowed all names instead of none.
- Fixed by adding an universal excluded name constraint in case the intersection for the particular type is empty.
- Moved the logic of creating a name constraint node copy from _gnutls_name_constraints_intersect to name_constraints_intersect_nodes (previously name_constraints_match), as intersecting IP addresses will require further processing (not just taking one of the compared nodes as was the implementation till now).
- GNUTLS_SAN_MAX added in order to comfortably iterate over SAN type enum.
|
|
|
|
|
| |
That is, define all the elements that were available prior
the move from #define to enum, to allow code relying on
|
| |
|
|
|
|
| |
This allows initializing a gnutls_x509_dn_t structure via a DN string.
|
|
|
|
|
| |
This is a function to add an arbitrary extension into a
certificate request.
|
| |
|
|
|
|
|
|
|
|
|
| |
This verifies whether a chain complies with RFC7366 p.4.2.2 requirements.
That is whether the issuer's features are a superset of the certificate
under verification.
This enhances gnutls_x509_crt_get_tlsfeatures() to allow appending
of TLSFeatures, and introduces gnutls_x509_tlsfeatures_check_crt().
|
|
|
|
|
| |
This allows copying specific OIDs from a certificate
request to the certificate.
|
| |
|
|
|
|
|
|
| |
This verification status flag indicates an OCSP status response
being stapled but it being invalid for some reason (e.g., unable
to parse or doesn't contain the expected certificate).
|
|
|
|
| |
In addition function documentation was updated.
|
|
|
|
|
|
|
|
|
|
| |
This replaces the usage of "int" in functions which could only
have accepted an "unsigned" value. Also functions which return
unsigned values are explicitly tagged as such. The ABI remains
the same with these changes.
This allows easier catching of sign/unsigned related errors from
the calling applications.
|
|
|
|
|
|
| |
That is, account for the OCSP-Must staple extension. If we have sent an OCSP
status request and have not gotten anything, but the certificate has the
Status Request TLSFeature extension present, fail to verify the certificate.
|
|
|
|
| |
The exported function is gnutls_ext_get_name()
|
| |
|
|
|
|
| |
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
|
|
|
|
|
|
|
|
| |
That adds:
gnutls_x509_ext_export_tlsfeatures
gnutls_x509_tlsfeatures_add
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
In addition provide function to enumerate the features it lists,
and output information with the output functions.
This adds:
gnutls_x509_tlsfeatures_init
gnutls_x509_tlsfeatures_deinit
gnutls_x509_tlsfeatures_get
gnutls_x509_ext_import_tlsfeatures
gnutls_x509_crt_get_tlsfeatures
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
|
|
|
|
|
|
| |
To better test support for server_name extension in TLS, it's
necessary to be able to differentiate between name being rejected
because it is unknown to the server and it being malformed.
|