Gilles Peskine
41e974178f
Merge remote-tracking branch 'upstream-restricted/pr/419' into development-restricted
...
Resolved simple conflicts caused by the independent addition of
calls to mbedtls_zeroize with sometimes whitespace or comment
differences.
2017-11-28 16:16:27 +01:00
Gilles Peskine
80441c666f
Merge branch 'iotssl-1419-safermemcmp-volatile' into development-restricted
2017-11-28 13:52:33 +01:00
Hanno Becker
4c2ac7ef58
Deprecate MBEDTLS_SSL_TRUNCATED_HMAC_COMPAT
2017-11-21 18:28:35 +00:00
Hanno Becker
563423fb21
Improve documentation of MBEDTLS_SSL_TRUNCATED_HMAC_COMPAT option
...
Explain more clearly when this option should be used and which versions of Mbed
TLS build on the non-compliant implementation.
2017-11-21 17:20:17 +00:00
Hanno Becker
e89353a6b4
Add fallback to non-compliant truncated HMAC for compatibiltiy
...
In case truncated HMAC must be used but the Mbed TLS peer hasn't been updated
yet, one can use the compile-time option MBEDTLS_SSL_TRUNCATED_HMAC_COMPAT to
temporarily fall back to the old, non-compliant implementation of the truncated
HMAC extension.
2017-11-20 16:50:43 +00:00
Andres Amaya Garcia
5a6da63138
Fix indentation for mbedtls_x509_crt_check_key_usage()
2017-11-14 21:47:08 +00:00
Andres Amaya Garcia
c81fcb9d36
Fix typos in documentation for mbedtls_x509_crt_check_extended_key_usage()
2017-11-14 21:43:14 +00:00
Andres Amaya Garcia
7786abc16b
Define ASN1 bitmask macros in more direct way
2017-11-07 20:21:56 +00:00
Andres Amaya Garcia
7512bf7d63
Add macros to ASN.1 module to parse ASN.1 tags
...
The macros simply extract the component bits of an ASN.1 tag value
2017-11-07 19:34:35 +00:00
Hanno Becker
2412061a5a
Correct typo and improve documentation
2017-10-26 11:53:35 +01:00
Hanno Becker
3319555b7c
Improve documentation of mbedtls_rsa_import[_raw]
2017-10-25 17:04:10 +01:00
Manuel Pégourié-Gonnard
08eacecc62
Fix some style issues and comment typos
2017-10-18 14:40:11 +02:00
Hanno Becker
15f2b3e538
Mention that mpi_fill_random interprets PRNG output as big-endian
2017-10-17 15:17:05 +01:00
Hanno Becker
6851b10ec7
Note that disabling SSL_RENEGO doesn't open door for renego attack
2017-10-17 11:03:50 +01:00
Hanno Becker
fc8fbfa059
Switch to gender neutral wording in rsa.h
2017-10-17 10:34:04 +01:00
Hanno Becker
554c32dae6
Mention validate_params does primality tests only if GENPRIME def'd
2017-10-17 10:34:01 +01:00
Hanno Becker
68767a6e88
Improve documentation in mbedtls_rsa_check_privkey
2017-10-17 10:13:31 +01:00
Hanno Becker
f8c028a2fb
Minor corrections
2017-10-17 09:20:57 +01:00
Hanno Becker
c36aab69b5
Swap D,E parameters in mbedtls_rsa_deduce_primes
2017-10-17 09:15:06 +01:00
Andres Amaya Garcia
9fb02057a5
Fix typo in asn1.h
2017-10-12 23:21:37 +01:00
Hanno Becker
f5dce36a24
Don't claim ECDH parameters are nothing-up-my-sleeve numbers
2017-10-12 13:45:10 +01:00
Ron Eldor
3226d36d61
Fix typo in configuration
...
Change duplicate of MBEDTLS_ECDH_GEN_PUBLIC_ALT to
MBEDTLS_ECDH_COMPUTE_SHARED_ALT
2017-10-12 14:17:48 +03:00
Hanno Becker
d22b78bf12
Switch to old model for alternative implementations
2017-10-12 11:42:17 +01:00
Hanno Becker
08f055eb4f
Don't remove CRT parameters from RSA context for ABI compatibility
...
Albeit possible without conflicts now, this has to wait for the next ABI
changing releaese.
2017-10-12 10:53:58 +01:00
Hanno Becker
a565f54c4c
Introduce new files rsa_internal.[ch] for RSA helper functions
...
This commit splits off the RSA helper functions into separate headers and
compilation units to have a clearer separation of the public RSA interface,
intended to be used by end-users, and the helper functions which are publicly
provided only for the benefit of designers of alternative RSA implementations.
2017-10-11 11:00:19 +01:00
Ron Eldor
a84c1cb355
Address PR cpomments reviews
...
1) move the change into Features from Changes, in the changLog
2) Change the feature alternative configuration MBEDTLS_ECDH_ALT
definition to function alternative defintions
MBEDTLS_ECDH_COMPUTE_SHARED_ALT and MBEDTLS_ECDH_GEN_PUBLIC_ALT
2017-10-10 19:04:27 +03:00
Hanno Becker
f9e184b9df
Remove PRNG argument from mbedtls_rsa_complete
2017-10-10 16:55:41 +01:00
Ron Eldor
314adb6baa
Address PR review comments
...
1) update ChangLog to have new feature in Features instead of Changes
2) Change MBEDTLS_ECDSA_ALT to function specific alternative definitions:
MBEDTLS_ECDSA_SIGN_ALT, MBEDTLS_ECDSA_VERIFY_ALT and MBEDTLS_ECDSA_GENKEY_ALT
2017-10-10 18:49:02 +03:00
Hanno Becker
1e801f5706
Clarify guarantees made by rsa_complete
and rsa_check_privkey
2017-10-10 16:44:47 +01:00
Hanno Becker
68b4d58bd8
Remove PRNG argument from mbedtls_rsa_deduce_moduli
...
It is not necessary to pass a CSPRNG to `mbedtls_rsa_deduce_moduli`, as there
exist well-working static strategies, and even if a PRNG is preferred, a
non-secure one would be sufficient.
Further, the implementation is changed to use a static strategy for the choice
of candidates which according to some benchmarks even performs better than the
previous one using random candidate choices.
2017-10-10 16:39:10 +01:00
Hanno Becker
1a9a51c7cf
Enhance documentation of ssl_write_hostname_ext, adapt ChangeLog.
...
Add a reference to the relevant RFC, adapt ChangeLog.
2017-10-06 11:58:50 +01:00
Hanno Becker
0446a39744
Enhance documentation of mbedtls_ssl_set_hostname
...
(1) Add missing error condition
(2) Specify allowance and effect of of NULL hostname parameter
(3) Describe effect of function on failure
2017-10-06 11:58:50 +01:00
Hanno Becker
bc389d1d3c
Extend scope of ERR_RSA_UNSUPPORTED_OPERATION error code
2017-10-05 11:49:53 +01:00
Hanno Becker
3cdc711972
Deprecate usage of RSA primitives with wrong key type
...
Further, state explicitly that wrong key types need not be supported by alternative RSA implementations, and that those
may instead return the newly introduced error code MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION.
2017-10-05 10:28:21 +01:00
Hanno Becker
e3481ab533
Improve top warning in dhm.h
2017-10-04 16:05:10 +01:00
Hanno Becker
a90658f248
Add ssl_conf_dh_param_bin superseding ssl_conf_dh_param
2017-10-04 15:29:08 +01:00
Hanno Becker
470a8c4d87
Deprecate mbedtls_ssl_conf_dh_param
2017-10-04 15:28:46 +01:00
Hanno Becker
d25d444134
Don't allocate space for DTLS header if DTLS is disabled
2017-10-04 13:58:03 +01:00
Hanno Becker
5e6b8d7d29
Add missing whitespace
2017-10-04 13:41:36 +01:00
Hanno Becker
0482fd597a
Remove reference to utility program for RFC 3526/7919 verification
2017-10-04 13:39:08 +01:00
Hanno Becker
5a7c35d1a8
Correct documentation of mbedtls_ssl_conf_dh_param
2017-10-04 13:32:12 +01:00
Hanno Becker
8880e75dcb
Add new function mbedtls_dhm_set_group to DHM Group
2017-10-04 13:17:52 +01:00
Hanno Becker
e2fcfa84ea
Stick to the use of constant-macros
...
This commit returns to using constant macros instead of global variables for the DHM group constants. Further, macros
providing the binary encoding of the primes from RFC 3526 and RFC 7919 are added. The hex-string macros are deprecated.
2017-10-04 13:12:15 +01:00
Hanno Becker
0f65e0ca03
Rename rsa_deduce_moduli
to rsa_deduce_primes
2017-10-03 14:40:44 +01:00
Hanno Becker
8ba6ce4f4f
Rename rsa_deduce_private
to rsa_deduce_private_exponent
2017-10-03 14:40:43 +01:00
Hanno Becker
5178dcab12
Clarify parameter ownership in mbedtls_rsa_import[_raw]
2017-10-03 14:29:37 +01:00
Hanno Becker
f9734b35b5
Change wording of warnings
2017-10-03 12:09:22 +01:00
Hanno Becker
4e1be398f6
Remove FORCE_VERIFICATION and FORCE_BLINDING
2017-10-02 16:02:55 +01:00
Hanno Becker
f240ea0b50
Expand documentation of mbedtls_dhm_read_params
2017-10-02 15:09:14 +01:00
Hanno Becker
f8258e7d5a
Adapt documentation of mbedtls_ssl_conf_dh_param
to new moduli
2017-10-02 15:04:40 +01:00