Peter Wu
079992e500
tris: whitespace fix
Fixes: "tris: add picotls interop"
7 years ago
Kunpei Sakai
0648fb0f1c
all: fix article typos
a -> an
Change-Id: I7362bdc199e83073a712be657f5d9ba16df3077e
Reviewed-on: https://go-review.googlesource.com/63850
Reviewed-by: Rob Pike <r@golang.org>
7 years ago
EKR
2fda84b4f0
crypto/tls: fix clientHelloMsg fuzzer not to generate the RI SCSV
It was causing mysterious fuzzing failure because it affects the
unmarshaling of the secureNegotiationSupported field.
Change-Id: Id396b84eab90a3b22fb6e306b10bdd7e39707012
Reviewed-on: https://go-review.googlesource.com/60912
Run-TryBot: Filippo Valsorda <hi@filippo.io>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Adam Langley <agl@golang.org>
7 years ago
Filippo Valsorda
50729f1a6c
crypto/tls: fix and expand TestVerifyPeerCertificate and TestGetClientCertificate
TestGetClientCertificate had disabled verification, and was only passing
because it was mistakenly checking for empty verifiedChains.
Change-Id: Iea0ddbdbbdf8ac34b499569820a2e4ce543a69c7
Reviewed-on: https://go-review.googlesource.com/47430
Run-TryBot: Filippo Valsorda <hi@filippo.io>
Run-TryBot: Ian Lance Taylor <iant@golang.org>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Adam Langley <agl@golang.org>
7 years ago
Peter Wu
25f2efc996
tris: update Go to 1.9
Use Go 1.9 (go1.9) with a patch to enable users to access the 0RTT API:
net/http: attach TLSConnContextKey to the request Context
7 years ago
Henry de Valence
cd63e47f2c
tris: rename `pk` to `secretKey`
7 years ago
Henry de Valence
d4b8398461
tris: fix typos
7 years ago
Tomas Susanka
4b944d1428
tris: typos
7 years ago
Filippo Valsorda
44343a1e4d
tris: make the boring incremental build deterministic
HEAD is currently breaking the build.
7 years ago
Filippo Valsorda
7d575cd9ba
tris: add Dockerfile to run unit tests with -update
7 years ago
Tom Thorogood
bc76e35b75
tris-localserver: fix Content-Type header for /ch endpoint ( #21 )
7 years ago
Tom Thorogood
f4a6690edc
crypto/tls: generate unique ticket_age_add for each ticket
#23 -- CLA ok -- re-author to me+google@tomthorogood.co.uk
7 years ago
Filippo Valsorda
ba45c1a5ca
tris: add echo.filippo.io
7 years ago
Filippo Valsorda
7f449cbaa7
tris: add SessionTicketSealer
7 years ago
Filippo Valsorda
2ace09e9b4
tris: upgrade to Go 1.8
7 years ago
Filippo Valsorda
fc5cd7e2f9
crypto/tls: fix SCT extension wire format
7 years ago
Filippo Valsorda
80f82d89c7
crypto/tls: avoid sending empty OCSP or SCT cert extensions
7 years ago
Filippo Valsorda
815d56e5a7
tris: update README for public consumption
7 years ago
Filippo Valsorda
4f7b5988a3
crypto/tls: add ConnectionState.Unique0RTTToken
7 years ago
Filippo Valsorda
563bf91c28
tris: update to Go 1.8rc3+
7 years ago
Filippo Valsorda
0d97989e0d
tris: move Commit to just before key share generation
In particular move it to after cipher suite negotiation and after
HelloRetryRequest check.
7 years ago
Brendan Mc
ed105dc308
crypto/tls: add SignedCertificateTimestamps and OCSPStaple to 1.3
7 years ago
Filippo Valsorda
9b94b65b7b
crypto/tls: send two session tickets to TLS 1.3 clients
7 years ago
Filippo Valsorda
44df381ccb
crypto/tls: peek at unencrypted alerts to give better errors
7 years ago
Filippo Valsorda
740fc926aa
tris: add single line TLSDEBUG=short
7 years ago
Filippo Valsorda
7aa542753f
tris: update to Go 1.8rc2
7 years ago
Filippo Valsorda
6bff168a06
tris: add proper BoGo tests
7 years ago
Filippo Valsorda
c758567785
crypto/tls: detect unexpected leftover handshake data
There should be no data in the Handshake buffer on encryption state
changes (including implicit 1.3 transitions). Checking that also blocks
all Handshake messages fragmented across CCS.
BoGo: PartialClientFinishedWithClientHello
7 years ago
Filippo Valsorda
de613b152d
crypto/tls: disallow handshake messages fragmented across CCS
BoGo: FragmentAcrossChangeCipherSpec-Server-Packed
7 years ago
Filippo Valsorda
4191962f25
crypto/tls: use correct alerts
BoGo: Resume-Server-PSKBinderFirstExtension
BoGo: Resume-Server-ExtraPSKBinder
BoGo: Resume-Server-ExtraIdentityNoBinder
BoGo: Renegotiate-Server-Forbidden
BoGo: NoNullCompression
BoGo: TrailingMessageData-*
7 years ago
Filippo Valsorda
5406418371
crypto/tls: fix panic in PSK binders parsing
BoGo: Resume-Server-ExtraPSKBinder
7 years ago
Filippo Valsorda
bbb712bfd8
crypto/tls: simplify supported points handling to match BoringSSL
BoGo: PointFormat-Server-*
7 years ago
Filippo Valsorda
922b99e473
crypto/tls: make 1.3 version negotiation more robust
BoGo: IgnoreClientVersionOrder
BoGO: *VersionTolerance
BoGo: RejectFinalTLS13
7 years ago
Filippo Valsorda
58aab36b6e
crypto/tls: use negotiated version for fallback check
BoGo: FallbackSCSV-VersionMatch-TLS13
7 years ago
EKR
ed06c77b1d
crypto/tls: fix clientHelloMsg fuzzer not to generate the RI SCSV
It was causing mysterious fuzzing failure because it affects the
unmarshaling of the secureNegotiationSupported field.
7 years ago
Filippo Valsorda
147d78ad99
tris: switch to Go 1.8beta1
7 years ago
Filippo Valsorda
052978de5e
crypto/tls: expose extension versions in ClientHelloInfo.SupportedVersions
7 years ago
Filippo Valsorda
1bc19494f8
tris: tolerate NSS sending obfuscated_ticket_age as seconds
7 years ago
Filippo Valsorda
faefac5f1a
crypto/tls: stop ConfirmHandshake from locking on any Read
ConfirmHandshake should block on a Read until the handshakeConfirmed
state is reached, but past that it shouldn't.
7 years ago
Filippo Valsorda
1b03258899
crypto/tls: simplify the Handshake locking
See https://groups.google.com/forum/#!topic/golang-dev/Xxiai-R_jH0
Change-Id: I6052695ece9aff9e3112c2fb176596fde8aa9cb2
8 years ago
Filippo Valsorda
341de96a61
crypto/tls: fix Conn.phase data races
Phase should only be accessed under in.Mutex. Handshake and all Read
operations obtain that lock. However, many functions checking for
handshakeRunning only obtain handshakeMutex: reintroduce
handshakeCompleted for them. ConnectionState and Close check for
handshakeConfirmed, introduce an atomic flag for them.
7 years ago
Filippo Valsorda
f3fe024dc7
crypto/tls: do not drain 0-RTT data on Close
There is no reason a server can't just send a CloseNotify in its first
flight, and then close the connection without reading the 0-RTT data.
Also, it's not expected of Close to block on reading, and interlocking
with a Read can cause a deadlock.
Fixes NCC-2016-001
7 years ago
Filippo Valsorda
3e31621f57
crypto/tls: pick the first group the client sent a key share for
Fixes NCC-2016-002
7 years ago
Filippo Valsorda
831410a948
tris: fix cross-compilation and relocation
8 years ago
Filippo Valsorda
345fbe2a39
tris: fix http2 tls.Conn context
8 years ago
Filippo Valsorda
df557b2b05
tris: fix NSS 0-RTT interop
8 years ago
Filippo Valsorda
5c4af70647
tris: drop QuietError
8 years ago
Filippo Valsorda
2b667f2952
tris: fix mint interop
8 years ago
Filippo Valsorda
180bfdbd68
crypto/tls: finish the session ticket state checks
8 years ago
Filippo Valsorda
6ca044cede
tris: add picotls interop
8 years ago