aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Reject SRP6 values which are negative or larger than p since these arelloyd2012-08-112-15/+25
| | | | likely totally bogus.
* Working fragmentation. Initial start at flight tracking.lloyd2012-08-102-14/+63
|
* Hooks for DTLS fragmentationlloyd2012-08-102-12/+32
|
* Make the CCS message a Handshake_Msg and send it through the handshakelloyd2012-08-105-12/+31
| | | | | IO layer. Needed for DTLS which needs to be able to track and retransmit the CCS if needed.
* Const arg of Handshake_IO::sendlloyd2012-08-102-5/+5
|
* TLS doc updateslloyd2012-08-091-7/+8
|
* Instead of using static salts in the KDF for generating the cipher andlloyd2012-08-092-17/+40
| | | | | | MAC keys for session encryption, randomly generate two 80-bit salt values which are included in the session blob and run the KDF over the master key and the random salts to create the keys.
* Remove stray newlinelloyd2012-08-091-1/+0
|
* Remove octal referenceslloyd2012-08-091-16/+8
|
* More 1.11.1 notes. Update TLS docslloyd2012-08-092-7/+53
|
* Lame but usable DTLS defragmentationlloyd2012-08-092-7/+15
|
* Add a field in credits for Bitcoin addresses.lloyd2012-08-091-2/+3
|
* We weren't handling DTLS handshake fragments at all. Now reject themlloyd2012-08-082-24/+35
| | | | | while continuing to work with unfragmented records and add the framework for defragmentation.
* Clean up DTLS handshake formattinglloyd2012-08-082-19/+21
|
* Make Handshake_IO::format constlloyd2012-08-082-5/+5
|
* Fix DTLS handshake encoding. Handle multiple messages in a packet.lloyd2012-08-082-31/+72
| | | | Handle DTLS CCS correctly.
* DTLS needs some help with ChangeCipherSpec because it is not includedlloyd2012-08-085-11/+51
| | | | | | | | in the message_seq count. When we are asking for the next handshake msg, tell the handshake IO layer if we are expecting a CCS or not. Then DTLS just needs to track which epoch(s) it has seen the CCS for, and which epoch it is currently in. This is all ignored by the stream IO layer.
* Move check of plaintext size to after MAC check. Use assign instead oflloyd2012-08-071-8/+8
| | | | resize+copy_mem.
* Remove Handshake_IO::have_full_record and Handshake_IO::emptylloyd2012-08-073-50/+14
| | | | | Have get_next_record return NONE+empty vector if no record availabe. IO::empty was completely unused.
* This was in an awkward placelloyd2012-08-071-2/+1
|
* Track the sequence number and return it from the record reader. Takelloyd2012-08-075-15/+33
| | | | | | | the sequence number into the handshake parser. This is ignored entirely by the stream handshake reader which does not need it, but is needed for DTLS. Track which epoch(s) we have seen a change cipher spec for.
* Wrap lineslloyd2012-08-062-2/+7
|
* Fix parenslloyd2012-08-061-1/+1
|
* Add a Policy item for if a client will accept a server-initiatedlloyd2012-08-062-1/+7
| | | | | renegotiation request. Defaults to true. If false, the client will send a non-fatal no_renegotiation alert.
* Expose Handshake_Message as an API type.lloyd2012-08-069-66/+117
| | | | | | | | | | | Use override as appropriate in tls_messages.h Add a callback to Handshake_State which, if set, is called for each Handshake_Message& as it is received or sent. Not yet exposed at the application level. Use default values in client and server hellos to minimize the need for explicit settings in constructors.
* Don't need to make these privatelloyd2012-08-061-5/+3
|
* Turn on NPNlloyd2012-08-061-1/+2
|
* The client wasn't sending a next protocol message on a sessionlloyd2012-08-061-0/+11
| | | | resumption.
* A heartbeat request send by the counterparty during a handshake wouldlloyd2012-08-061-5/+8
| | | | be passed to the application callback as a heartbeat response.
* Move server-specific parts of the handshake state to a server subclass.lloyd2012-08-064-21/+29
|
* Move things that are client specific in the handshake state to alloyd2012-08-062-16/+28
| | | | subclass created by Client::new_handshake_state
* Make the handshake hash privatelloyd2012-08-067-33/+36
|
* Make handshake session keys private with get/setlloyd2012-08-066-24/+33
|
* Make the handshake Ciphersuite only available by const reference.lloyd2012-08-068-36/+35
| | | | Derive it when the server hello is set.
* Const Handshake_State args where possiblelloyd2012-08-063-5/+5
|
* Move Certificate message to it's own file.lloyd2012-08-064-68/+89
| | | | Remove ~Extensions declaration, not used anymore.
* Use unique_ptr in Server_Kex_Exchange and Extensionslloyd2012-08-064-37/+19
|
* Store record MAC objects in unique_ptrlloyd2012-08-063-21/+12
|
* Have all the TLS handshake messages stored in unique_ptrs with onlylloyd2012-08-0615-294/+436
| | | | const access after setting them. Fix some const issues.
* m_ namespace remaining TLS messageslloyd2012-08-065-78/+78
|
* In the in-memory session manager, choose a random key at startup andlloyd2012-08-053-10/+28
| | | | | | | | encrypt all of the sessions, decrypting before return. This minimizes load on the locked memory (48 bytes master secret per session, vs 32 bytes for a single master key). It might also make recovering session data from memory dumps a little bit harder though this isn't worth counting on IMO
* Remove Channel::read_handshake. Have the server set expected next msglloyd2012-08-054-43/+15
| | | | in new_handshake_state.
* If we're negotiating a datagram protocol, allow a hello verifylloyd2012-08-031-2/+20
| | | | message. Add client-side hello verify handling.
* Take the initial record version from the Handshake_IO instance insteadlloyd2012-08-035-3/+24
| | | | of hardcoding it to SSLv3.
* Add Handshake_Hash::resetlloyd2012-08-033-3/+24
| | | | Add cookie support in Client_Hello.
* Add preliminary IO handler for datagram handshakes. Does not fragmentlloyd2012-08-032-0/+184
| | | | | outbound messages to MTU. Reassembly likely doesn't work, and is very vulnerable to DoS attacks.
* Rename all the message source files to msg_lloyd2012-08-0311-10/+10
|
* Combine Handshake_Writer and Handshake_Reader into Handshake_IO.lloyd2012-08-0320-245/+170
| | | | | | | | This is mostly just a minor code savings for TLS, but it actually seems important for DTLS because getting a handshake message can be a trigger for retransmitting previously sent handshake messages in some circumstances. Having the reading and writing all in one layer makes it a bit easier to accomplish that.
* Move the code that pretends a CCS message is a handshake message fromlloyd2012-08-023-40/+32
| | | | Channel to the handshake reader.
* Use TLS v1.0 PRF unless the version supports a ciphersuite specific PRFlloyd2012-08-021-4/+5
|