Commit Graph

24 Commits (435ad8d01ac0cc1a0c80c886bbe60b62c862703b)

Author SHA1 Message Date
Michael Zillgith 6dbdb1636c - TLS: fixed - certificate not validated when allow only allowed certificate is selected and certificate is matching (LIB61850-473)
- TLS: Added option to ignore validity times in certificates and CRLs (LIB61850-474)
9 months ago
Michael Zillgith d309018340 - TLS: fixed memory leak in TLSConiguration (I6PLLCV-99)
- TLS: configured default TLS 1.3 cipher suites as defined in IEC 62351-3:2023
1 year ago
Michael Zillgith fef8f94751 - some updates for mbedtls 3.6 integration (LIB61850-448) 1 year ago
Michael Zillgith 9f93d7d035 - integrated code to set TLS cipher suites in TLSConfiguration (LIB61850-444) 1 year ago
Federico Francescon 790e3e6714
fix: ssl renegotiation causing handshake failure (#494)
* feat: added semaphore around `TLSSocket_performHandshake`

* fix: improved error checking in TLS read and write

* removed useless semaphore for renegotiation lock

* added some tls debug and cleared the session renegotiation events

* using mbedtls API instead of using internals

* fixed deadlock situation with TLSSocket_read

* test fix sonarcloud minor notice

* still some sonarcloud minor things

---------

Co-authored-by: Federico Francescon <federico.francescon@higeco.com>
1 year ago
Michael Zillgith eba36fec65 - renamed TLSConfiguration_EventLevel to TLSEventLevel 3 years ago
Michael Zillgith 21903710ad - applied coding style 3 years ago
Federico Francescon 5a8d3effec Added check for changed CRL on socket read/write. Added reset of renegotiation ssl cache on CRL add 3 years ago
Federico Francescon e5c9f2e267 Fixing Security events messages to match IEC62351-100-3 3 years ago
Federico Pellegrin 9ddb10faea tls: add method to reset used CRL (certificate revocation list)
Add a method to be able to reset the CRL, otherwise any previously
added CRL will stay there until the object is totally destroyed.
This proves to be needed for cases when we need to delete the
CRL (ie. it expired) during the lifetime of the server.
3 years ago
Michael Zillgith f61c58dd35 - added TLSConnection object to provide more context in TLS event callback (LIB61850-366) 3 years ago
Federico Pellegrin 4b06fd3b6e tls: fix order of operations to copy peer certificate
The memcpy is done before assigning the length, so the length is not
set and is therefore either 0 (so no peer certificate will be available)
or a random number (that can lead to crashes) making the feature not work.

The MR simply copies first the length that will make the memcpy work.
3 years ago
Federico Pellegrin d427179250 TLS: update CRL load time also when loading from file
Similarly as done when loading a CRL directly, this allows to
have the CA chain recalculated for ongoing connections also when
using CRLs from files.
3 years ago
Michael Zillgith f778868fa0 - removed some VC++ warnings 3 years ago
Michael Zillgith 87b4ead369 - TLS: added TLS alert callbacks; support for session resumption with session IDs (LIB61850-339) 3 years ago
Michael Zillgith 9f09152d7c - fixed - TLS: CRL is ignored 3 years ago
Michael Zillgith 8aa988068c - MacOS thread layer: replaced semaphore by mutex 4 years ago
Michael Zillgith 6b9437b8c0 - unified HAL with lib60870 and libtase2 (LIB61850-261) 4 years ago
Michael Zillgith f259096e12 - fixed problem with double free of TLS configuration structure (LIB61850-254) 4 years ago
Michael Zillgith c71015f240 - TLS: fixed memory leak when TLS authentication fails 6 years ago
Michael Zillgith 1549367eed - updated code to use mbedtls-2.16 (LTS version) 6 years ago
Michael Zillgith 1c461009c2 - MMS client/server: fixed potential memory leaks in TLS handling code 7 years ago
Michael Zillgith 4157c9c5da - extended server_example_control to show how to change ctlModel with online service 7 years ago
Michael Zillgith 02cda48128 - moved TLS API to platform abstraction layer 7 years ago