- Jan 19, 2018
-
-
Grigorii Demidov authored
-
- Jan 18, 2018
-
-
Petr Špaček authored
TLS polish See merge request !447
-
Petr Špaček authored
gnutls-3.3.26-9.el7.x86_64 and libgnutls30-3.5.8-5+deb9u3 do not support @SYSTEM keyword and CentOS 7 has problem with -VERS-DTLS-ALL. We do not configure DTLS sockets so it should be harmless to delete the DTLS keyword. @SYSTEM is replaced by NORMAL, oh well. fixup! TLS client: enforce minimal TLS version and no compression
-
Petr Špaček authored
Same change as in a625a0ea1ce03b0707fd421633f21c0aacb786da but for client.
-
Petr Špaček authored
Server side now enforces security requirements from draft-ietf-dprive-dtls-and-tls-profiles-11 section 9
-
Petr Špaček authored
GnuTLS manual for some functions do not declare that error return code must be negative, so we should use constants to avoid potential problems.
-
Petr Špaček authored
gnutls_certificate_set_x509_trust_file could theoretically return 0 to indicate nothing was read, so we need to check for this as well.
-
Vladimír Čunát authored
-
-
Tomas Krizek authored
tmpfiles: create cache and use proper tmpfiles name See merge request !440
-
Tomas Krizek authored
-
Petr Špaček authored
policy TLS_FORWARD: add checks and documentation See merge request !445
-
Petr Špaček authored
The pin parameter contains SHA-256 encoded using Base64, but this is not the only option. Explicit name allows us to add alternative formats later on, and is consistent with GnuTLS naming.
-
-
Petr Špaček authored
-
Petr Špaček authored
-
Petr Špaček authored
-
Petr Špaček authored
Policy handling was split into smaller functions to allow easier checking. The code needs further refactoring, it seems that net_tls_client is just a thin wrapper around tls_client_params_set in C, which is unnecessary and error prone.
-
Petr Špaček authored
-
Petr Špaček authored
Apparently some corner cases are not handled properly. We need to fix these in follow-up patches.
-
Petr Špaček authored
fix some errors found by static analyzer See merge request !446
-
Petr Špaček authored
Clang right now does not support cleanup attribute which is causing false positives, so the check is now disabled. https://bugs.llvm.org/show_bug.cgi?id=3888 At the same time I've enabled all other checkers to see what happens. We need to go though them and disable them one-by-one if necessary.
-
Marek Vavruša authored
this helps avoid false positive leaks caused by combination of cleanup functions and goto refs #291
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
attribute cleanup (auto_free) gets called when variable goes out of scope, not on longjmp (in lua_error), so the variable never gets freed
-
- Jan 17, 2018
-
-
Petr Špaček authored
Dockerfile: add static analysis tools See merge request !444
-
-
- Jan 12, 2018
-
-
Petr Špaček authored
daemon: TLS-handshake timeout timer was not properly activated; fix See merge request !441
-
Grigorii Demidov authored
-
Petr Špaček authored
ci: add -Werror to CFLAGS, added clang build target See merge request !432
-
Marek Vavruša authored
this checks things such as inconsistent declarations and definitions
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
This supports linting of C code using clang-tidy to fix common security and code quality issues early in the development workflow. The benefit is that less time has to be spent in code reviews to point out obvious problems, and ideally when the outstanding issues are fixed, clang-tidy (and clang-format) can also be used to to automatically fix basic problems and enforce common code style, similarly to `go vet && go fmt` workflow.
-