aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
* Inline Record_Writer to Channellloyd2012-09-066-210/+101
|
* Add Channel::send_recordlloyd2012-09-064-8/+18
|
* Add more functions to Channel, hiding Record_Reader entirely and mostlloyd2012-09-064-47/+68
| | | | of Record_Writer.
* Make a number of members of Channel private instead of protectedlloyd2012-09-066-48/+40
|
* Record_Reader::m_macbuf no longer usedlloyd2012-09-062-5/+0
|
* Hoist m_rng to Channellloyd2012-09-066-4/+2
|
* Move record reading also to a stand alone functionlloyd2012-09-063-268/+315
|
* Move the actual creation of new TLS records to TLS::write_record whichlloyd2012-09-063-116/+142
| | | | is side effect free (besides updating CBC state).
* Use it for the reader as welllloyd2012-09-062-97/+47
|
* Move record cipher state to its own class. Currently write side only.lloyd2012-09-064-102/+162
|
* Do record decryption in placelloyd2012-09-053-32/+55
|
* Avoid Pipe in Record_Writer, refactoring to move the record I/O up to Channellloyd2012-09-042-40/+59
|
* Distinguish read and write specific objectslloyd2012-09-043-65/+65
|
* Remove Record_Writer::send_alert. Move Alert serialization to Alert::serializelloyd2012-09-046-29/+31
|
* Rename m_writer to m_send_hslloyd2012-09-042-15/+15
|
* Use a std::function so handshake_io only has access Record_Writer'slloyd2012-09-047-23/+35
| | | | send function.
* Avoid putting dword typedef in global namespacelloyd2012-09-041-5/+5
|
* Avoid conditionals in the power mod opslloyd2012-09-042-22/+35
|
* Add a --chost option to configure that takes a GNU style triplet.lloyd2012-08-314-2/+9
| | | | | | Add a couple aliases so the GNU canonical names are understood by us. Add an Ivy Bridge entry, match it up with the new GCC -march flag
* Require servers to send us a session ticket message if they sent alloyd2012-08-141-3/+2
| | | | | | | | | session ticket extension in their hello. This avoids an ambiguity in the DTLS handshake, as there the change cipher spec is not ordered with respect to the other handshake messages. This was never legal per spec, but some versions of GnuTLS seem to offer a session ticket in their hello but then not send a ticket message in the case where they don't have a session ticket key configured.
* Fix various issues flagged by cppcheck. Nothing too interesting.lloyd2012-08-138-12/+11
|
* Missing constantlloyd2012-08-131-0/+2
|
* Reject SRP6 values which are negative or larger than p since these arelloyd2012-08-111-2/+2
| | | | likely totally bogus.
* Working fragmentation. Initial start at flight tracking.lloyd2012-08-102-14/+63
|
* Hooks for DTLS fragmentationlloyd2012-08-102-12/+32
|
* Make the CCS message a Handshake_Msg and send it through the handshakelloyd2012-08-105-12/+31
| | | | | IO layer. Needed for DTLS which needs to be able to track and retransmit the CCS if needed.
* Const arg of Handshake_IO::sendlloyd2012-08-102-5/+5
|
* Instead of using static salts in the KDF for generating the cipher andlloyd2012-08-091-7/+22
| | | | | | MAC keys for session encryption, randomly generate two 80-bit salt values which are included in the session blob and run the KDF over the master key and the random salts to create the keys.
* Remove stray newlinelloyd2012-08-091-1/+0
|
* Lame but usable DTLS defragmentationlloyd2012-08-092-7/+15
|
* We weren't handling DTLS handshake fragments at all. Now reject themlloyd2012-08-082-24/+35
| | | | | while continuing to work with unfragmented records and add the framework for defragmentation.
* Clean up DTLS handshake formattinglloyd2012-08-082-19/+21
|
* Make Handshake_IO::format constlloyd2012-08-082-5/+5
|
* Fix DTLS handshake encoding. Handle multiple messages in a packet.lloyd2012-08-082-31/+72
| | | | Handle DTLS CCS correctly.
* DTLS needs some help with ChangeCipherSpec because it is not includedlloyd2012-08-085-11/+51
| | | | | | | | in the message_seq count. When we are asking for the next handshake msg, tell the handshake IO layer if we are expecting a CCS or not. Then DTLS just needs to track which epoch(s) it has seen the CCS for, and which epoch it is currently in. This is all ignored by the stream IO layer.
* Move check of plaintext size to after MAC check. Use assign instead oflloyd2012-08-071-8/+8
| | | | resize+copy_mem.
* Remove Handshake_IO::have_full_record and Handshake_IO::emptylloyd2012-08-073-50/+14
| | | | | Have get_next_record return NONE+empty vector if no record availabe. IO::empty was completely unused.
* This was in an awkward placelloyd2012-08-071-2/+1
|
* Track the sequence number and return it from the record reader. Takelloyd2012-08-075-15/+33
| | | | | | | the sequence number into the handshake parser. This is ignored entirely by the stream handshake reader which does not need it, but is needed for DTLS. Track which epoch(s) we have seen a change cipher spec for.
* Wrap lineslloyd2012-08-062-2/+7
|
* Fix parenslloyd2012-08-061-1/+1
|
* Add a Policy item for if a client will accept a server-initiatedlloyd2012-08-062-1/+7
| | | | | renegotiation request. Defaults to true. If false, the client will send a non-fatal no_renegotiation alert.
* Expose Handshake_Message as an API type.lloyd2012-08-069-66/+117
| | | | | | | | | | | Use override as appropriate in tls_messages.h Add a callback to Handshake_State which, if set, is called for each Handshake_Message& as it is received or sent. Not yet exposed at the application level. Use default values in client and server hellos to minimize the need for explicit settings in constructors.
* Don't need to make these privatelloyd2012-08-061-5/+3
|
* The client wasn't sending a next protocol message on a sessionlloyd2012-08-061-0/+11
| | | | resumption.
* A heartbeat request send by the counterparty during a handshake wouldlloyd2012-08-061-5/+8
| | | | be passed to the application callback as a heartbeat response.
* Move server-specific parts of the handshake state to a server subclass.lloyd2012-08-064-21/+29
|
* Move things that are client specific in the handshake state to alloyd2012-08-062-16/+28
| | | | subclass created by Client::new_handshake_state
* Make the handshake hash privatelloyd2012-08-067-33/+36
|
* Make handshake session keys private with get/setlloyd2012-08-066-24/+33
|