770b56e2cfcredentials::get_name() now distinguish between empty credentials and blank identitySimon Rozman2016-08-28 20:06:54 +02:00
df680e74f6TLS credentials are considered empty regardless the state of custom identity setting nowSimon Rozman2016-08-28 20:05:41 +02:00
e66a7eb9badePAPization continues to pave the road for seamless MSCHAPv2 integrationSimon Rozman2016-08-28 20:04:45 +02:00
6c66862eedTTLS config and credentials are now expected to always have inner config and credentials object present; it can be blank, but it must not be nullptrSimon Rozman2016-08-28 17:43:06 +02:00
d20aafb3ffIdentity selection revised to support cases where TLS certificate is present but contains no usable usernameSimon Rozman2016-08-28 16:38:13 +02:00
8ce7154a77Loading credentials from XML allows <UserName> absence and assumes blank identity in this case nowSimon Rozman2016-08-28 15:46:30 +02:00
6077063599The credentials are marked "invalid" at transition from handshake to application data phase only to prevent initial handshake problems from popping-up credential prompt when credentials have nothing to do with the connection failure.Simon Rozman2016-08-25 13:08:11 +02:00
2857b2edd2First application data message is now appended piggyback to the last client handshake message (Hopefully resolving issue with Radiator)Simon Rozman2016-08-25 13:00:47 +02:00
6760287f0dDuplicate log record of EAP-TLS handshake removedSimon Rozman2016-08-25 12:58:56 +02:00
7973a8d59bHandshake log events are a bit more specific nowSimon Rozman2016-08-25 12:57:47 +02:00
2125679385Server certificate name check extended to search for the name in the subjectAltName(2) extension first; only when none present, compares against Common NameSimon Rozman2016-08-23 14:43:07 +02:00
fb5d969c2bSupport for the wild-char certificate names droppedSimon Rozman2016-08-23 14:42:43 +02:00
1f1b9b1084GUI boots with a predefined configuration on new profiles now (closes#10)Simon Rozman2016-08-18 06:31:16 +02:00
076c6b77d7GUI updated to show "<Your Provider>" when provider ID is blankSimon Rozman2016-08-18 06:30:02 +02:00
92460c571fInitial focus changed to the first non-mouse-wheel-capturing control to allow initial scrolling of the configuration dialog using mouse wheelSimon Rozman2016-08-17 16:42:19 +02:00
df1d431bd0- TLS revised (again) - TLS Session resumption issues resolved - Credential prompt has "Remember" checkbox initially selected when credentials originate from Windows Credential Manager - Last authentication attempt failure notice is more general and no longer insinuate user credentials are the likely cause of the failure - Additional log messages addedSimon Rozman2016-08-17 11:50:34 +02:00
16527c8124Client explicitly refuses to accept change cipher spec if no or NULL cipher was proposed nowSimon Rozman2016-08-17 09:32:43 +02:00
69e6b775f8Hello requests are no longer included in the handshake hashing (as per RFC)Simon Rozman2016-08-17 09:29:55 +02:00
a02d1e7094Explicit checks on server certificate chain added: - Certificate can not be self-signed: Cannot check trust against configured root CAs when server certificate is self-signed - Server can provide full certificate chain up-to and including root CA. Importing root CA to the store for certificate chain validation would implicitly trust this certificate chain. Thus, we skip all self-signed certificates on import.Simon Rozman2016-08-17 09:22:38 +02:00
078636eb14make_change_chiper_spec() removed as this message can simply be created using make_message()Simon Rozman2016-08-17 09:09:42 +02:00
cabae26e0bFlags describing handshake messages received assembled in a boolean table of flagsSimon Rozman2016-08-17 09:01:11 +02:00
00dd1277c5Switched to the new key import method, as the old one had issues with PROV_RSA_AES crystallographic providerSimon Rozman2016-08-16 16:55:18 +02:00