- 13 Jul, 2016 1 commit
-
-
David Benjamin authored
Tested by having client and server talk to each other. This adds the certificate_extensions field to CertificateRequest which I'd previously missed. (We completely ignore the field, with the expectation that the C code won't have anything useful to do with it either.) Change-Id: I74f96acd36747d4b6a6f533535e36ea8e94d2be8 Reviewed-on: https://boringssl-review.googlesource.com/8710 Reviewed-by:
David Benjamin <[email protected]>
-
- 08 Jul, 2016 3 commits
-
-
David Benjamin authored
While the random connection property extensions like ALPN and SRTP remain largely unchanged in TLS 1.3 (but for interaction with 0-RTT), authentication-related extensions change significantly and need dedicated logic. Change-Id: I2588935c2563a22e9879fb81478b8df5168b43de Reviewed-on: https://boringssl-review.googlesource.com/8602 Reviewed-by:
David Benjamin <[email protected]>
-
Nick Harper authored
[Originally written by nharper and then revised by davidben.] Most features are missing, but it works for a start. To avoid breaking the fake TLS 1.3 tests while the C code is still not landed, all the logic is gated on a global boolean. When the C code gets in, we'll set it to true and remove this boolean. Change-Id: I6b3a369890864c26203fc9cda37c8250024ce91b Reviewed-on: https://boringssl-review.googlesource.com/8601 Reviewed-by:
David Benjamin <[email protected]>
-
Nick Harper authored
[Originally written by nharper, tweaked by davidben.] For now, ignore them completely. Change-Id: I28602f219d210a857aa80d6e735557b8d2d1c590 Reviewed-on: https://boringssl-review.googlesource.com/8585 Reviewed-by:
Adam Langley <[email protected]>
-
- 07 Jul, 2016 6 commits
-
-
Nick Harper authored
[Originally written by nharper and then tweaked by davidben.] TLS 1.3 tweaks them slightly, so being able to write them in one pass rather than two will be somewhat more convenient. Change-Id: Ib7e2d63e28cbae025c840bbb34e9e9c295b44dc6 Reviewed-on: https://boringssl-review.googlesource.com/8588 Reviewed-by:
David Benjamin <[email protected]>
-
Nick Harper authored
[Originally written by nharper, tweaked by davidben.] In TLS 1.3, every extension the server previously sent gets moved to a separate EncryptedExtensions message. To be able to share code between the two, parse those extensions separately. For now, the handshake reads from serverHello.extensions.foo, though later much of the extensions logic will probably handle serverExtensions independent of whether it resides in ServerHello or EncryptedExtensions. Change-Id: I07aaae6df3ef6fbac49e64661d14078d0dbeafb0 Reviewed-on: https://boringssl-review.googlesource.com/8584 Reviewed-by:
David Benjamin <[email protected]>
-
Nick Harper authored
[Originally written by nharper and tweaked by davidben.] This will end up being split in two with most of the ServerHello extensions being serializable in both ServerHello and EncryptedExtensions depending on version. Change-Id: Ida5876d55fbafb982bc2e5fdaf82872e733d6536 Reviewed-on: https://boringssl-review.googlesource.com/8580 Reviewed-by:
David Benjamin <[email protected]>
-
Nick Harper authored
[Originally written by nharper and then slightly tweaked by davidben.] Between the new deeply nested extension (KeyShare) and most of ServerHello extensions moving to a separate message, this is probably long overdue. Change-Id: Ia86e30f56b597471bb7e27d726a9ec92687b4d10 Reviewed-on: https://boringssl-review.googlesource.com/8569 Reviewed-by:
David Benjamin <[email protected]>
-
David Benjamin authored
TLS 1.3 defines its own EncryptedExtensions message. The existing one is for Channel ID which probably should not have tried to generalize itself. Change-Id: I4f48bece98510eb54e64fbf3df6c2a7332bc0261 Reviewed-on: https://boringssl-review.googlesource.com/8566 Reviewed-by:
David Benjamin <[email protected]>
-
Nick Harper authored
TLS 1.3 defines a new SignatureScheme uint16 enum that is backwards compatible on the wire with TLS1.2's SignatureAndHashAlgorithm. This change updates the go testing code to use a single signatureAlgorithm enum (instead of 2 separate signature and hash enums) in preparation for TLS 1.3. It also unifies all the signing around this new scheme, effectively backporting the change to TLS 1.2. For now, it does not distinguish signature algorithms between 1.2 and 1.3 (RSA-PSS instead of RSA-PKCS1, ECDSA must match curve types). When the C code is ready make a similar change, the Go code will be updated to match. [Originally written by nharper, tweaked significantly by davidben.] Change-Id: If9a315c4670755089ac061e4ec254ef3457a00de Reviewed-on: https://boringssl-review.googlesource.com/8450 Reviewed-by:
David Benjamin <[email protected]>
-
- 03 Feb, 2016 1 commit
-
-
David Benjamin authored
It's now an RFC too. Change-Id: I2aa7a862bf51ff01215455e87b16f259fc468490 Reviewed-on: https://boringssl-review.googlesource.com/7028 Reviewed-by:
Adam Langley <[email protected]>
-
- 01 Oct, 2015 1 commit
-
-
Adam Langley authored
This change makes the runner tests (in ssl/test/runner) act like a normal Go test rather than being a Go binary. This better aligns with some internal tools. Thus, from this point onwards, one has to run the runner tests with `go test` rather than `go run` or `go build && ./runner`. This will break the bots. Change-Id: Idd72c31e8e0c2b7ed9939dacd3b801dbd31710dd Reviewed-on: https://boringssl-review.googlesource.com/6009 Reviewed-by:
Matt Braithwaite <[email protected]> Reviewed-by:
David Benjamin <[email protected]> Reviewed-by:
Adam Langley <[email protected]>
-
- 12 Sep, 2015 1 commit
-
-
Paul Lietar authored
Change-Id: Ifa44fef160fc9d67771eed165f8fc277f28a0222 Reviewed-on: https://boringssl-review.googlesource.com/5840 Reviewed-by:
David Benjamin <[email protected]> Reviewed-by:
Adam Langley <[email protected]>
-
- 02 Sep, 2015 1 commit
-
-
David Benjamin authored
If the two extensions select different next protocols (quite possible since one is server-selected and the other is client-selected), things will break. This matches the behavior of NSS (Firefox) and Go. Change-Id: Ie1da97bf062b91a370c85c12bc61423220a22f36 Reviewed-on: https://boringssl-review.googlesource.com/5780 Reviewed-by:
Adam Langley <[email protected]>
-
- 01 Aug, 2015 1 commit
-
-
David Benjamin authored
That got out of sync at some point. Change-Id: I5a45f50f330ceb65053181afc916053a80aa2c5d Reviewed-on: https://boringssl-review.googlesource.com/5541 Reviewed-by:
Adam Langley <[email protected]>
-
- 31 Jul, 2015 1 commit
-
-
Adam Langley authored
This change mirrors upstream's custom extension API because we have some internal users that depend on it. Change-Id: I408e442de0a55df7b05c872c953ff048cd406513 Reviewed-on: https://boringssl-review.googlesource.com/5471 Reviewed-by:
Adam Langley <[email protected]>
-
- 28 Jul, 2015 1 commit
-
-
Adam Langley authored
These were used in the upstream Go code to fuzz-test the handshake marshal/unmarshal functions. But we don't do that there so best to remove them. (The ClientHello equals function is still used, however, to test DTLS retransmission.) Change-Id: I950bdf4f7eefa2bca13c10f5328d2e6c586604e2 Reviewed-on: https://boringssl-review.googlesource.com/5470 Reviewed-by:
David Benjamin <[email protected]> Reviewed-by:
Adam Langley <[email protected]>
-
- 10 Jul, 2015 1 commit
-
-
Adam Langley authored
https://tools.ietf.org/html/rfc7301#section-3.1 specifies that a ProtocolName may not be empty. This change enforces this in ClientHello and ServerHello messages. Thanks to Doug Hogan for reporting this. Change-Id: Iab879c83145007799b94d2725201ede1a39e4596 Reviewed-on: https://boringssl-review.googlesource.com/5390 Reviewed-by:
Adam Langley <[email protected]>
-
- 03 Dec, 2014 1 commit
-
-
David Benjamin authored
We forgot to add those when we implemented the features. (Also relevant because they will provide test coverage later for configuring features when using the generic method tables rather than *_client_method.) Change-Id: Ie08b27de893095e01a05a7084775676616459807 Reviewed-on: https://boringssl-review.googlesource.com/2410 Reviewed-by:
Adam Langley <[email protected]>
-
- 19 Nov, 2014 1 commit
-
-
David Benjamin authored
Just the negotiation portion as everything else is external. This feature is used in WebRTC. Change-Id: Iccc3983ea99e7d054b59010182f9a56a8099e116 Reviewed-on: https://boringssl-review.googlesource.com/2310 Reviewed-by:
Adam Langley <[email protected]>
-
- 04 Nov, 2014 1 commit
-
-
Adam Langley authored
This change adds support to the Go code for renegotiation as a client, meaning that we can test BoringSSL's renegotiation as a server. Change-Id: Iaa9fb1a6022c51023bce36c47d4ef7abee74344b Reviewed-on: https://boringssl-review.googlesource.com/2082 Reviewed-by:
Adam Langley <[email protected]>
-
- 25 Oct, 2014 1 commit
-
-
Adam Langley authored
This change implements support for the extended master secret. See https://tools.ietf.org/html/draft-ietf-tls-session-hash-01 https://secure-resumption.com/ Change-Id: Ifc7327763149ab0894b4f1d48cdc35e0f1093b93 Reviewed-on: https://boringssl-review.googlesource.com/1930 Reviewed-by:
David Benjamin <[email protected]> Reviewed-by:
Adam Langley <[email protected]>
-
- 16 Sep, 2014 2 commits
-
-
David Benjamin authored
Change-Id: Ia9d10f672c8a83f507b46f75869b7c00fe1a4fda Reviewed-on: https://boringssl-review.googlesource.com/1755 Reviewed-by:
Adam Langley <[email protected]>
-
David Benjamin authored
Imported from upstream's https://codereview.appspot.com/108710046. Change-Id: I66c879dcc9fd09446ac1a8380f796b1d68c89e4e Reviewed-on: https://boringssl-review.googlesource.com/1751 Reviewed-by:
Adam Langley <[email protected]>
-
- 26 Aug, 2014 1 commit
-
-
David Benjamin authored
Change-Id: Ia349c7a7cdcfd49965cd0c4d6cf81a76fbffb696 Reviewed-on: https://boringssl-review.googlesource.com/1604 Reviewed-by:
Adam Langley <[email protected]>
-
- 14 Aug, 2014 1 commit
-
-
David Benjamin authored
Run against openssl s_client and openssl s_server. This seems to work for a start, although it may need to become cleverer to stress more of BoringSSL's implementation for test purposes. In particular, it assumes a reliable, in-order channel. And it requires that the peer send handshake fragments in order. Retransmit and whatnot are not implemented. The peer under test will be expected to handle a lossy channel, but all loss in the channel will be controlled. MAC errors, etc., are fatal. Change-Id: I329233cfb0994938fd012667ddf7c6a791ac7164 Reviewed-on: https://boringssl-review.googlesource.com/1390 Reviewed-by:
Adam Langley <[email protected]>
-
- 05 Aug, 2014 1 commit
-
-
David Benjamin authored
Should have test coverage there as long as we care about supporting it. Change-Id: Ic67539228b550f2ebd0b543d5a58640913b0474b Reviewed-on: https://boringssl-review.googlesource.com/1371 Reviewed-by:
Adam Langley <[email protected]>
-
- 09 Jul, 2014 1 commit
-
-
David Benjamin authored
ClientHello and ServerHello are not allowed to include duplicate extensions. Add a new helper function to check this and call as appropriate. Remove ad-hoc per-extension duplicate checks which are no unnecessary. Add runner.go tests to verify such message correctly rejected. Change-Id: I7babd5b642dfec941459512869e2dd6de26a831c Reviewed-on: https://boringssl-review.googlesource.com/1100 Reviewed-by:
Adam Langley <[email protected]>
-
- 21 Jun, 2014 1 commit
-
-
Adam Langley authored
Initial fork from f2d678e6e89b6508147086610e985d4e8416e867 (1.0.2 beta). (This change contains substantial changes from the original and effectively starts a new history.)
-