Commit Graph

27 Commits (ae5e5fdf7385164b850bed3ce5237909b6d1f5fd)

Author SHA1 Message Date
Tatsuhiro Tsujikawa 52da4e40ea Drop SSLv3.0 and TLSv1.0 and add TLSv1.3
TLSv1.3 support is added for GNUTLS and OpenSSL.
2019-04-07 16:18:32 +09:00
Tatsuhiro Tsujikawa e0a827ff98 Enable IndentPPDirectives 2018-06-09 16:23:36 +09:00
Tatsuhiro Tsujikawa b8df7b0880 gnutls: Fix bug that commonName is always empty 2018-06-05 21:27:45 +09:00
Tatsuhiro Tsujikawa 795a0474df clang-format-5.0 2017-11-23 14:11:43 +09:00
Tatsuhiro Tsujikawa 9677586336 clang-format-4.0 2017-05-19 21:32:25 +09:00
Tatsuhiro Tsujikawa aab2472390 Remove trailing "." from SAN and CN 2016-04-21 23:02:58 +09:00
Athmane Madjoudj c275b6f297 Remove trailing spaces 2016-02-17 00:12:24 +01:00
Athmane Madjoudj 1849ccfbba Add support for using gnutls system wide crypto policy 2016-02-17 00:11:23 +01:00
Tatsuhiro Tsujikawa b1132d6b10 make clang-format using clang-format-3.6 2015-12-27 18:40:08 +09:00
Tatsuhiro Tsujikawa dd277b33af gnutls: Allow SIGN-RSA-SHA1 for compatibility reason 2015-06-21 15:16:15 +09:00
Dan Fandrich 0538aa40da Fixed some typos in code comments 2015-01-16 01:17:35 +01:00
Tatsuhiro Tsujikawa ff2a630efe GNUTLS: Remove ifdef for GNUTLS_TLS* since they are not macros
Since they are not macros, we get always TLS_PROTO_NONE (otherwise you
are using SSLv3 and you will get warning nonetheless) and get warning.
2014-12-26 18:08:41 +09:00
Nils Maier 3c8704178a Move warn logic into SocketCore
Also fiddle a bit with the WinTLS implementation, forcing "strong"
crypto only for > SSLv3.
2014-12-14 10:34:09 +01:00
Nils Maier c5c38bf3a4 Warn about insecure SSL connections.
Fixed GH-313
2014-12-12 18:24:19 +01:00
Tatsuhiro Tsujikawa 73d752fb1c Add --min-tls-version option
The --min-tls-version option specifies minimum SSL/TLS version to
enable. Possible Values: SSLv3, TLSv1, TLSv1.1, TLSv1.2 Default: TLSv1
2014-12-06 17:50:35 +09:00
Tatsuhiro Tsujikawa 6d3bd60905 LibgnuTLSSession: Disable SSLv3 2014-11-29 20:00:46 +09:00
Tatsuhiro Tsujikawa adeead6f03 Revert to existing "proper" coding style
The rule is simple: don't try to change the coding style of the
existing codebase.
2014-06-03 23:41:30 +09:00
Nils Maier b9fe4119c0 New round of clang-modernize 2014-05-29 19:38:34 +02:00
Nils Maier 13a202df07 Fix GnuTLS 2.x compatiblity
Closes GH-216
2014-04-12 02:55:31 +02:00
Tatsuhiro Tsujikawa 542064c69b gnutls: Use SECURE128 priority keyword 2014-01-13 23:11:27 +09:00
Tatsuhiro Tsujikawa e81dd84641 gnutls: Don't fail handshake if returned error is not fatal 2014-01-08 23:11:56 +09:00
Tatsuhiro Tsujikawa 3c789294b7 gnutls: Handle GNUTLS_E_INTERRUPTED as well as GNUTLS_E_AGAIN 2014-01-08 23:01:36 +09:00
Tatsuhiro Tsujikawa 2f02946b70 Add workaround GnuTLS bug with OCSP status extension and non-blocking socket
GnuTLS version 3.1.3 - 3.1.18 and 3.2.0 - 3.2.8, inclusive, has this
bug. For these versions, we disable OCSP status extension.
2014-01-08 22:53:56 +09:00
Tatsuhiro Tsujikawa 05d85e2965 Remove auto_delete in favor of std::unique_ptr 2013-06-22 18:51:29 +09:00
Tatsuhiro Tsujikawa 233501f768 Enable TLS1.1 with gnutls build 2013-05-10 00:49:06 +09:00
Nils Maier 0bcbd947b4 AppleTLS: Implement AppleTLS and Apple Message Digest 2013-04-05 23:10:47 +02:00
Tatsuhiro Tsujikawa 8580c98bce Abstract TLS session implementation
Now TLS session object is abstracted as TLSSession class. Currently,
we have GNUTLS and OpenSSL implementations.
2013-04-03 02:24:41 +09:00