1. 11 Aug, 2015 1 commit
  2. 04 Aug, 2015 1 commit
    • Manuel Pégourié-Gonnard's avatar
      DTLS: treat bad MAC on Finished as an error · 0a885743
      Manuel Pégourié-Gonnard authored
      This is not required nor recommended by the protocol, and it's a layering
      violation, but it's a know flaw in the protocol that you can't detect a PSK
      auth error in any other way, so it is probably the right thing to do.
      
      closes #227
      0a885743
  3. 28 Jul, 2015 1 commit
  4. 22 Jul, 2015 1 commit
  5. 06 Jul, 2015 3 commits
  6. 01 Jul, 2015 1 commit
  7. 25 Jun, 2015 1 commit
    • Manuel Pégourié-Gonnard's avatar
      Fix potential NULL dereference · 0761733c
      Manuel Pégourié-Gonnard authored
      We document that either of recv or recv_timeout may be NULL, but for TLS we
      always used recv... Thanks Coverity for catching that.
      (Not remotely trigerrable: local configuration.)
      
      Also made me notice net_recv_timeout didn't do its job properly.
      0761733c
  8. 23 Jun, 2015 3 commits
  9. 22 Jun, 2015 1 commit
    • Manuel Pégourié-Gonnard's avatar
      Add mbedtls_ssl_set_hs_authmode · cdc26ae0
      Manuel Pégourié-Gonnard authored
      While at it, fix the following:
      - on server with RSA_PSK, we don't want to set flags (client auth happens via
        the PSK, no cert is expected).
      - use safer tests (eg == OPTIONAL vs != REQUIRED)
      cdc26ae0
  10. 18 Jun, 2015 2 commits
  11. 17 Jun, 2015 7 commits
  12. 02 Jun, 2015 1 commit
  13. 29 May, 2015 1 commit
  14. 28 May, 2015 1 commit
  15. 27 May, 2015 2 commits
  16. 26 May, 2015 2 commits
  17. 20 May, 2015 5 commits
  18. 14 May, 2015 5 commits
  19. 13 May, 2015 1 commit