John Safranek
35bcc98948
Added a callback when receiving a NewSessionTicket handshake message.
2014-10-20 09:25:14 -07:00
John Safranek
60790ee4ae
Merge branch 'master' of github.com:cyassl/cyassl
2014-10-16 22:01:55 -07:00
John Safranek
b2f25cd91c
1. Added accessors for session tickets.
...
2. Fixed client case when server doesn't want to resume session with ticket.
2014-10-16 22:00:13 -07:00
Moisés Guimarães
c2ade678e1
Adds use of ssl->session.sessionIDSz during SendClientHello().
2014-10-13 23:16:11 -03:00
Moisés Guimarães
b10fdbf1f0
Adds storage of ssl->arrays->sessionIDSz in SessionCache at AddSession();
...
Adds storage of ssl->arrays->sessionIDSz in ssl->session at FreeArrays();
2014-10-13 23:16:11 -03:00
Moisés Guimarães
6956d146d1
Adds capture of ssl->arrays->sessionIDSz at DoServerHello.
2014-10-13 23:16:11 -03:00
Moisés Guimarães
e98eb1ba4d
Adds sessionIDSz to CYASSL_SESSION and Arrays.
2014-10-13 23:16:11 -03:00
toddouska
08cdf91761
bump version
2014-10-13 14:44:39 -07:00
toddouska
d457ff8d71
don't set GetLength input value to negative in error case, shouldn't matter if return value checked
2014-10-10 10:25:42 -07:00
toddouska
159abadd73
add NO_FORCE_SCR_SAME_SUITE flag for scr
2014-10-09 11:10:40 -07:00
toddouska
5019eab073
Merge branch 'master' of github.com:cyassl/cyassl
2014-10-07 15:51:38 -07:00
toddouska
54049c6000
allow dhe 4096bit for ssl key exchange
2014-10-07 15:50:33 -07:00
Moisés Guimarães
557f19db0b
Adds support to session IDs of size 1 to 31 bytes.
...
Only session IDs of size 0 or 32 bytes was allowed before, now the session ID size may be from 0 to 32 bytes.
A size of zero bytes means that is no session ID provided by the server.
2014-10-07 13:02:59 -03:00
toddouska
c65b14a891
add scr check against subject hash, only allow explicit session ticket resupmtion during scr
2014-10-06 16:12:45 -07:00
toddouska
214eba0325
fix session ticket get size
2014-10-06 14:52:05 -07:00
John Safranek
7c67a9261c
trimmed some unused code for session tickets
2014-10-06 12:44:52 -07:00
John Safranek
954740e2a8
Added check for expected session ticket
2014-10-04 12:41:51 -07:00
John Safranek
b95b2a8463
Merge branch 'master' of github.com:cyassl/cyassl
2014-10-03 13:27:22 -07:00
John Safranek
80a474ebad
1. Fixed encoding of session ticket hello extension.
...
2. Session tickets used as alternative resumption.
2014-10-03 13:19:59 -07:00
toddouska
24bfade874
catch user error with write() after WANT_WRITE with short size
2014-10-03 12:03:20 -07:00
toddouska
3f01f097e7
allow scr sessoin ticket
2014-10-02 10:43:06 -07:00
toddouska
668fed4796
don't allow scr and fake indication together
2014-10-02 10:18:11 -07:00
John Safranek
9dbc1d2d00
Parse the NewSessionTicket handshake message
2014-10-01 16:28:01 -07:00
toddouska
2f5520d14c
fix potential resource leaks with scr and normal math on key reuse
2014-10-01 11:15:36 -07:00
toddouska
8e96234513
Merge branch 'master' of github.com:cyassl/cyassl
2014-10-01 09:45:57 -07:00
toddouska
41647e441a
preview scr
2014-10-01 09:44:24 -07:00
Moisés Guimarães
ee68797cf1
Adds a flag to tell the handshake framework to expect a session ticket.
2014-09-30 18:50:19 -03:00
toddouska
eb42494ddd
check scr cipher suite for changes
2014-09-30 12:55:15 -07:00
toddouska
29d4148637
handle bunlded scr messages
2014-09-30 11:52:21 -07:00
Moisés Guimarães
a937040087
Adds Session Ticket TLS Extension handling.
...
New Session Ticket Handshake Message handling is still needed for Session Tickets to work.
2014-09-30 09:30:23 -03:00
Moisés Guimarães
6a75c8d144
fix TURN_ON mask
...
adds --enable-session-ticket configure option
2014-09-30 09:30:23 -03:00
toddouska
f81f22799a
separate allow scr and force client scr in example client
2014-09-29 15:32:41 -07:00
toddouska
dcde28db51
add server initiated scr
2014-09-29 14:48:49 -07:00
toddouska
d3db4546ec
allow client auth with scr
2014-09-29 13:38:56 -07:00
toddouska
369b7559c5
fix session ticket warnings
2014-09-26 16:16:11 -07:00
Moisés Guimarães
c340d78c93
adds SESSION_TICKET extension id.
...
adds HAVE_TLS_EXTENSIONS as a dependency to HAVE_SECURE_RENEGOTIATION
reduces tlsx semaphore from 16 to 8 bytes (128 flags to 64 flags).
refactors ConvertExtType() to TLSX_ToSemaphore() for a better name and behavior. Now the overflowing flags are set backwards from the end of the flags to avoid collisions.
2014-09-26 16:01:50 -03:00
toddouska
95585e93df
scr session resumption example
2014-09-26 10:47:57 -07:00
toddouska
a260171e23
add scr for ephemeral keys
2014-09-26 10:27:14 -07:00
Jacob Barthelmeh
f5a95a9f62
struct for one time authentication ciphers
2014-09-25 16:19:50 -06:00
toddouska
0c20584ed3
add client side initiated secure r, same specs
2014-09-24 18:48:23 -07:00
toddouska
74c6f35766
new handShakeDone flag to allow app data during scr
2014-09-24 13:10:01 -07:00
toddouska
21f46373f3
delay SetKeys() with SetKeysSide() until last possible moment, needed for scr
2014-09-24 11:27:13 -07:00
toddouska
ed1beafdfc
allow SetKeys() to be called with encrypt or decrypt, or both
2014-09-24 10:12:22 -07:00
Moisés Guimarães
596148840d
adds braces requested by commit_tests.sh on linux
2014-09-22 13:17:05 -03:00
Moisés Guimarães
613337cf89
ssl: refactoring PemToDer to reduce stack usage:
...
--- variable header moved to the heap (80 bytes saved)
--- variable footer moved to the heap (80 bytes saved)
--- variable password moved to the heap (80 bytes saved)
fixes memory leak in CyaSSL_RAND_bytes
2014-09-22 11:37:36 -03:00
Moisés Guimarães
d9472d65da
ssl: refactoring ProcessBuffer to reduce stack usage:
...
--- variable password moved to the heap (80 bytes saved)
--- variable key moved to the heap (32 bytes saved)
--- variable iv moved to the heap (16 bytes saved)
--- variable Des moved to the heap (sizeof(Des) saved)
--- variable Des3 moved to the heap (sizeof(Des3) saved)
--- variable Aes moved to the heap (sizeof(Aes) saved)
--- variable RsaKey moved to the heap (sizeof(RsaKey) saved)
Utility functions added to Des, Des3 and Aes for easier decryption.
2014-09-22 11:37:36 -03:00
Moisés Guimarães
df3ea53494
replaces tabs with spaces.
2014-09-22 11:37:35 -03:00
Moisés Guimarães
e9af29e3e3
ssl: refactoring CyaSSL_CTX_load_verify_locations to reduce stack usage:
...
--- variable name moved to the heap (256 bytes saved)
2014-09-22 11:37:35 -03:00
Moisés Guimarães
cb9dafca26
ssl: refactoring CyaSSL_SetTmpDH_buffer_wrapper to reduce stack usage:
...
--- variable p moved to the heap (513 bytes saved)
--- variable p moved to the heap (513 bytes saved)
2014-09-22 11:37:35 -03:00
Moisés Guimarães
3281e0dfcf
ssl: refactoring CyaSSL_RAND_bytes to reduce stack usage:
...
--- variable tmpRNG moved to the heap (sizeof(RNG) saved)
2014-09-22 11:37:35 -03:00