summaryrefslogtreecommitdiff
path: root/lib
Commit message (Expand)AuthorAgeFilesLines
* several updates to address issues found by clang static analyzerNikos Mavrogiannopoulos2018-05-096-10/+16
* nettle: fix casts which result to warnings in newer gccNikos Mavrogiannopoulos2018-05-091-4/+14
* handshake: use GNUTLS_E_RECEIVED_ILLEGAL_PARAMETER consistentlyNikos Mavrogiannopoulos2018-05-073-3/+4
* post_handshake_auth: send extension irrespective of certificates being presentNikos Mavrogiannopoulos2018-05-041-1/+1
* tls13/certificate_request: corrected check of duplicate signature algorithmsNikos Mavrogiannopoulos2018-05-043-3/+16
* gnutls_reauth: doc updateNikos Mavrogiannopoulos2018-05-041-1/+3
* tls13/certificate: send empty certificate instead of skippingNikos Mavrogiannopoulos2018-05-041-25/+24
* _gnutls_figure_common_ciphersuite: ignore certificate check if PSK is negotiatedNikos Mavrogiannopoulos2018-05-041-6/+2
* tls13/certificate_verify: corrected context in signatures in client sideNikos Mavrogiannopoulos2018-05-041-7/+24
* _gnutls13_handshake_sign_data: avoid unnecessary copyNikos Mavrogiannopoulos2018-05-041-6/+9
* handshake: cleanup in TLS1.3 initial secret calculationNikos Mavrogiannopoulos2018-05-041-15/+3
* psk: compute binder which is compatible with draft-ietf-tls-tls13Nikos Mavrogiannopoulos2018-05-042-15/+21
* encrypt_packet_tls13: made size check saferNikos Mavrogiannopoulos2018-05-031-1/+1
* pkcs11: mark private key objects as sensitive by defaulttmp-pkcs11-sensitive-fixNikos Mavrogiannopoulos2018-05-035-16/+26
* psk: mark psk_ke_modes as invalid when ignoredNikos Mavrogiannopoulos2018-04-301-4/+11
* priority: handle RSA-PSK ciphersuites similar to SRPNikos Mavrogiannopoulos2018-04-301-5/+11
* retrieve_pin: refuse to retrieve PIN from URI more than one timeNikos Mavrogiannopoulos2018-04-251-0/+10
* doc: updated OCSP documentation [ci skip]Nikos Mavrogiannopoulos2018-04-241-6/+6
* gnutls.h.in: corrected typo [ci skip]Nikos Mavrogiannopoulos2018-04-221-3/+3
* _gnutls_epoch_new: allow re-allocation epoch next epochtmp-constate-fixNikos Mavrogiannopoulos2018-04-184-10/+22
* tls13/finished: addressed memory leak in receiving finished packetNikos Mavrogiannopoulos2018-04-171-3/+7
* priority: document the reasons for the order of supported groups [ci skip]Nikos Mavrogiannopoulos2018-04-161-0/+5
* handshake: described the epoch reference counting [ci skip]Nikos Mavrogiannopoulos2018-04-161-0/+4
* ANON,SRP,NULL ciphersuites: when set do not negotiate TLS1.3 or laterNikos Mavrogiannopoulos2018-04-136-14/+72
* ext/pre_shared_key: cleanups in error handlingNikos Mavrogiannopoulos2018-04-071-16/+38
* ext/psk_ke_modes: corrected data accessNikos Mavrogiannopoulos2018-04-071-1/+2
* constate: fixed key generation for TLS1.3Nikos Mavrogiannopoulos2018-04-062-8/+4
* psk: save the username on auth info struct under TLS1.3Nikos Mavrogiannopoulos2018-04-062-1/+18
* priority: added GROUP-DH-ALL and GROUP-EC-ALLNikos Mavrogiannopoulos2018-04-061-0/+28
* dumbfw: account for extension data paddingNikos Mavrogiannopoulos2018-04-061-3/+5
* Simplified the _gnutls13_psk_ext_parser interface and added unit testsNikos Mavrogiannopoulos2018-04-065-85/+75
* Added support for out-of-band Pre-shared keys under TLS1.3Ander Juaristi2018-04-0633-136/+1379
* gnutls_record_can_use_length_hiding: corrected return typeNikos Mavrogiannopoulos2018-04-042-2/+2
* encrypt_packet_tls13: reverted to original APINikos Mavrogiannopoulos2018-04-041-23/+23
* nettle: corrected typo in version check for compatibility mode with 3.3tmp-nettle-version-check-updateNikos Mavrogiannopoulos2018-03-251-1/+1
* protocols: bumped TLS1.3 protocol to draft -26Nikos Mavrogiannopoulos2018-03-231-1/+1
* record: added AAD data when encrypting or decryptingNikos Mavrogiannopoulos2018-03-231-36/+54
* priorities: disable any key exchange methods if there is no TLS1.2 or earlierNikos Mavrogiannopoulos2018-03-231-14/+35
* _gnutls_supported_ecc_recv_params: take into account precedenceNikos Mavrogiannopoulos2018-03-234-57/+95
* supported_versions: cannot be used to negotiate pre-TLS1.3Nikos Mavrogiannopoulos2018-03-231-0/+3
* doc: added since field in gnutls_record_send2() descriptionNikos Mavrogiannopoulos2018-03-232-1/+3
* nettle/pk: include nettle/version.hNikos Mavrogiannopoulos2018-03-201-0/+1
* alert: send the appropriate alert on GNUTLS_E_ERROR_IN_FINISHED_PACKETNikos Mavrogiannopoulos2018-03-091-0/+1
* Bumped TLS1.3 draft version to -23Nikos Mavrogiannopoulos2018-03-091-1/+1
* Hello retry request matches server helloNikos Mavrogiannopoulos2018-03-097-20/+89
* signatures: distinguish RSA-PSS signatures with RSA PKCS#1 1.5 certificates f...Nikos Mavrogiannopoulos2018-03-099-45/+155
* Server hello format follows TLS1.2 formatNikos Mavrogiannopoulos2018-03-085-173/+293
* Renumbered the key share extension to 51Nikos Mavrogiannopoulos2018-03-081-1/+1
* record: ignore any ChangeCipherSpec messages under TLS1.3 handshakeNikos Mavrogiannopoulos2018-03-085-65/+128
* record: send 0x0303 under TLS1.3Nikos Mavrogiannopoulos2018-03-081-5/+6