1. 02 Nov, 2013 2 commits
  2. 01 Nov, 2013 2 commits
  3. 30 Oct, 2013 2 commits
    • Robin Seggelmann's avatar
      DTLS/SCTP struct authchunks Bug · f596e3c4
      Robin Seggelmann authored
      PR: 2809
      
      DTLS/SCTP requires DATA and FORWARD-TSN chunks to be protected with
      SCTP-AUTH.  It is checked if this has been activated successfully for
      the local and remote peer. Due to a bug, however, the
      gauth_number_of_chunks field of the authchunks struct is missing on
      FreeBSD, and was therefore not considered in the OpenSSL implementation.
      This patch sets the corresponding pointer for the check correctly
      whether or not this bug is present.
      f596e3c4
    • Robin Seggelmann's avatar
      DTLS/SCTP Finished Auth Bug · 9fb523ad
      Robin Seggelmann authored
      PR: 2808
      
      With DTLS/SCTP the SCTP extension SCTP-AUTH is used to protect DATA and
      FORWARD-TSN chunks. The key for this extension is derived from the
      master secret and changed with the next ChangeCipherSpec, whenever a new
      key has been negotiated. The following Finished then already uses the
      new key.  Unfortunately, the ChangeCipherSpec and Finished are part of
      the same flight as the ClientKeyExchange, which is necessary for the
      computation of the new secret. Hence, these messages are sent
      immediately following each other, leaving the server very little time to
      compute the new secret and pass it to SCTP before the finished arrives.
      So the Finished is likely to be discarded by SCTP and a retransmission
      becomes necessary. To prevent this issue, the Finished of the client is
      still sent with the old key.
      9fb523ad
  4. 21 Oct, 2013 1 commit
  5. 20 Oct, 2013 6 commits
  6. 15 Oct, 2013 5 commits
  7. 14 Oct, 2013 2 commits
  8. 13 Oct, 2013 2 commits
  9. 12 Oct, 2013 1 commit
  10. 10 Oct, 2013 1 commit
  11. 07 Oct, 2013 1 commit
  12. 05 Oct, 2013 3 commits
  13. 04 Oct, 2013 3 commits
  14. 03 Oct, 2013 3 commits
  15. 01 Oct, 2013 6 commits
    • Adam Langley's avatar
      AEAD Tests. · a2eef419
      Adam Langley authored
      Add tests for AEAD functions: AES-128-GCM, AES-256-GCM and
      ChaCha20+Poly1305.
      a2eef419
    • Adam Langley's avatar
      chacha20poly1305 · 9a864651
      Adam Langley authored
      Add support for Chacha20 + Poly1305.
      9a864651
    • Adam Langley's avatar
      Use AEAD for AES-GCM. · fa03d011
      Adam Langley authored
      Switches AES-GCM ciphersuites to use AEAD interfaces.
      fa03d011
    • Adam Langley's avatar
      AEAD support in ssl/ · 03614034
      Adam Langley authored
      This change allows AEADs to be used in ssl/ to implement SSL/TLS
      ciphersuites.
      03614034
    • Adam Langley's avatar
      AEAD support. · 444b1d41
      Adam Langley authored
      This change adds an AEAD interface to EVP and an AES-GCM implementation
      suitable for use in TLS.
      444b1d41
    • Adam Langley's avatar
      Rework tls1_change_cipher_state. · 4055ca1f
      Adam Langley authored
      The previous version of the function made adding AEAD changes very
      difficult. This change should be a semantic no-op - it should be purely
      a cleanup.
      4055ca1f