Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Make this comment easier to read | Jack Lloyd | 2020-11-30 | 1 | -1/+2 | |
| | ||||||
* | Merge GH #2517 Allow custom RSA private keys during TLS | Jack Lloyd | 2020-11-28 | 1 | -1/+1 | |
|\ | ||||||
| * | Allow custom RSA Private_Key in Client_Key_Exchange message | Claudius Hauptmann | 2020-11-27 | 1 | -1/+1 | |
| | | ||||||
* | | Remove support for DHE_PSK | Jack Lloyd | 2020-11-24 | 8 | -38/+9 | |
|/ | | | | Retains PSK and ECDHE_PSK | |||||
* | Merge GH #2511 Remove support for AES-128 OCB ciphersuites | Jack Lloyd | 2020-11-24 | 3 | -11/+1 | |
|\ | ||||||
| * | Remove support for AES-128 OCB ciphersuites | Jack Lloyd | 2020-11-24 | 3 | -11/+1 | |
| | | ||||||
* | | Merge GH #2510 Fix some C++17 todos | Jack Lloyd | 2020-11-24 | 1 | -33/+30 | |
|\ \ | |/ |/| | ||||||
| * | try to calm gcc 9 | Hannes Rantzsch | 2020-11-24 | 1 | -0/+2 | |
| | | ||||||
| * | use if constexpr rather than sfinae | Hannes Rantzsch | 2020-11-24 | 1 | -33/+28 | |
| | | | | | | | | to disable asio_stream setup_native_handle setup in test code | |||||
* | | Remove Camellia CBC TLS ciphersuites | Jack Lloyd | 2020-11-23 | 3 | -39/+15 | |
| | | ||||||
* | | Remove support for SEED TLS ciphersuites | Jack Lloyd | 2020-11-23 | 3 | -5/+1 | |
| | | ||||||
* | | Remove outer shared_ptr from Certificate in certstore interface | Jack Lloyd | 2020-11-23 | 4 | -6/+6 | |
| | | | | | | | | | | | | Since 2.4.0 X509_Certificate and X509_CRL have been internally shared so an other shared_ptr is just overhead and API complexity. Use std::optional for APIs where the object was optional. | |||||
* | | Remove SRP support from TLS | Jack Lloyd | 2020-11-23 | 21 | -376/+26 | |
|/ | ||||||
* | Remove TLS support for DSA certificates/ciphersuites | Jack Lloyd | 2020-11-21 | 8 | -88/+2 | |
| | ||||||
* | Improvements to TLS suite generation script | Jack Lloyd | 2020-11-21 | 1 | -6/+2 | |
| | | | | | | | | Port to Python 3 Use SHA-256 instead of SHA-1 for the content hash Use C++17 nested namespace syntax | |||||
* | Remove support for TLS anonymous DH/ECDH suites | Jack Lloyd | 2020-11-21 | 7 | -30/+4 | |
| | ||||||
* | Remove some unused includes of rounding.h | Jack Lloyd | 2020-11-11 | 2 | -2/+0 | |
| | ||||||
* | Remove deprecated TLS interfaces | Jack Lloyd | 2020-11-08 | 7 | -371/+5 | |
| | ||||||
* | Remove deprecated headers, make more headers internal | Jack Lloyd | 2020-11-06 | 17 | -214/+21 | |
| | | | | | | | | | Now modules default to internal headers instead of defaulting to public; making a new public API should be a visible and intentional choice. Brings the public header count from over 300 to around 150. Also removes the deprecated tls_blocking interface | |||||
* | Merge X.509 header files | Jack Lloyd | 2020-10-31 | 2 | -1/+2 | |
| | ||||||
* | Merge some of the ASN.1 headers | Jack Lloyd | 2020-10-31 | 1 | -1/+1 | |
| | | | | | Deprecate asn1_str.h asn1_time.h asn1_oid.h and alg_id.h with all contents moved to existing asn1_obj.h | |||||
* | Resolve Doxygen warnings | Jack Lloyd | 2020-10-28 | 1 | -2/+2 | |
| | ||||||
* | Fix LGTM warning | Jack Lloyd | 2020-06-18 | 1 | -1/+1 | |
| | | | | Large object being passed by value instead of & | |||||
* | Enforce TLS server certificate key usage constraints | Jack Lloyd | 2020-06-09 | 1 | -0/+24 | |
| | ||||||
* | Prohibit a TLS peer from using a v1/v2 leaf certificate | Jack Lloyd | 2020-06-09 | 1 | -1/+16 | |
| | | | | | | This appears to be prohibited by all versions of TLS specification. Bug reported by Mario Korth of Ruhr-Universität Bochum. | |||||
* | Fix cppcheck findings | René Fischer | 2020-06-05 | 1 | -2/+4 | |
| | ||||||
* | Small refactorings of TLS record layer | Jack Lloyd | 2020-04-24 | 3 | -32/+67 | |
| | | | | Reduces some code duplication in #2320 | |||||
* | Fix an undefined shift operation when DTLS reconnection occurs | Jack Lloyd | 2020-04-05 | 1 | -1/+13 | |
| | ||||||
* | Fix for ASan | Jack Lloyd | 2020-04-01 | 1 | -1/+1 | |
| | ||||||
* | Make CBC padding constant time | Jack Lloyd | 2020-03-29 | 2 | -30/+49 | |
| | | | | | | | Maximilian Blochberger points out that while unpadding was constant time, padding operation leaked the length of the plaintext. This is probably not too serious in most circumstances but is not desirable behavior. | |||||
* | Improve error category names | Hannes Rantzsch | 2020-03-17 | 1 | -5/+17 | |
| | ||||||
* | use boost::beast provided lowest_layer utilities | Hannes Rantzsch | 2020-03-17 | 1 | -6/+19 | |
| | | | | | This allows using the TLS::Stream with a boost::beast::tcp_stream as its next layer. | |||||
* | implement server-side of TLS::Stream | Hannes Rantzsch | 2020-03-17 | 2 | -29/+38 | |
| | | | | | Allows the TLS::Stream to perform the handshake as the server-side. Also adds a client-server integration test for the stream. | |||||
* | implement async_shutdown | Hannes Rantzsch | 2020-03-17 | 1 | -5/+47 | |
| | ||||||
* | FIX: Detect stream truncation errors | Hannes Rantzsch | 2020-03-17 | 3 | -121/+191 | |
| | | | | | | TLS::Stream now detects connections that have been improperly closed by the peer without sending a close_notify alert first. This is indicated by a StreamTruncated error code. | |||||
* | fail gracefully when using Stream w/o handshake | Hannes Rantzsch | 2020-03-16 | 1 | -1/+6 | |
| | ||||||
* | Remove support for splitting the amalgamation by ABI | Jack Lloyd | 2020-01-22 | 1 | -5/+3 | |
| | | | | | | | | | | This is as if --single-file-amalgamation was always used, except also now botan_all_internal.h is not created. This effectively drops support for very old GCC/Clang in the amalgamation (only). GCC 5+ and Clang 3.8+ support the target attribute and work fine. MSVC not affected since it doesn't need such attributes in the first place. | |||||
* | New TLS session encryption format | Jack Lloyd | 2019-12-15 | 2 | -27/+94 | |
| | | | | | | | | | | | | | | | | | | | | | | | Changes: - Adds magic number/versioning to make future extensions possible - Adds key identifier to avoid needless decryption attempts, makes supporting ticket key rotation easier in the future - Avoids key collision; in current format if the seed is duplicated the same key + nonce are generated. This does not leak the master ticket key but is still bad. Now nonce is random, and key is generated via a distinct 128-bit long input. Chances of a duplicated key/nonce are now about 2^-112. - Include the whole header incl nonce as associated data - Use SHA-512-256 instead of SHA-256 This breaks all saved encrypted sessions as well as saved session tickets. But the cost then is just a full renegotiation. The session ticket format is not guaranteed to be stable even across minor releases. | |||||
* | Prefer CCM over CBC ciphersuites | René Korthaus | 2019-11-15 | 1 | -1/+1 | |
| | ||||||
* | Remove non-ephemeral PSK ciphersuites from BSI TLS policy | René Korthaus | 2019-11-14 | 1 | -1/+1 | |
| | ||||||
* | Add SHA-512 to BSI TLS policy's allowed sigatures hashes | René Korthaus | 2019-11-14 | 1 | -1/+1 | |
| | ||||||
* | Add AES-128/CCM and AES-256/CCM ciphersuites to BSI TLS policy | René Korthaus | 2019-11-14 | 1 | -1/+1 | |
| | | | | | BSI TR-02102-1 version 2019-01 added CCM ciphersuites as recommended, so we add them to the BSI TLS policy. | |||||
* | Remove some FFDHE groups from BSI TLS policy | René Korthaus | 2019-11-14 | 1 | -2/+0 | |
| | | | | | | | BSI TR-02102-2 version 2019-01 explicitly lists the FFDHE groups recommended now. ffdhe6144 and ffdhe8192 are not listed, so we remove them from the BSI TLS policy. | |||||
* | Allow disabling TLS 1.0/1.1 and DTLS 1.0 at build time | Jack Lloyd | 2019-11-10 | 5 | -14/+40 | |
| | ||||||
* | Try to appease MSVC | Jack Lloyd | 2019-10-25 | 1 | -4/+3 | |
| | ||||||
* | Fix various Doxygen warnings | Jack Lloyd | 2019-10-25 | 2 | -17/+16 | |
| | | | | Some due to missing comments, others due to various misparsing of the code. | |||||
* | Avoid situation where is_active and is_closed could both return true | Jack Lloyd | 2019-10-22 | 1 | -0/+2 | |
| | | | | GH #2171 | |||||
* | silence trivial warnings | Nuno Goncalves | 2019-10-20 | 3 | -0/+3 | |
| | | | | Signed-off-by: Nuno Goncalves <[email protected]> | |||||
* | Fix some MSVC warnings | Jack Lloyd | 2019-10-18 | 1 | -1/+3 | |
| | ||||||
* | Add a variant of RandomNumberGenerator::random_vec | Jack Lloyd | 2019-09-13 | 3 | -9/+10 | |
| | | | | | This avoids the unlock(rng.random_vec(...)) pattern which is pretty wasteful in terms of heap overhead. |