Andrew Kelley
|
7ed7bd247e
|
std.crypto.tls: verify the common name matches
|
2023-01-02 16:57:15 -07:00 |
|
Andrew Kelley
|
244a97e8ad
|
std.crypto.tls: certificate signature validation
|
2023-01-02 16:57:15 -07:00 |
|
Andrew Kelley
|
bbc074252c
|
introduce std.crypto.CertificateBundle
for reading root certificate authority bundles from standard
installation locations on the file system. So far only Linux logic is
added.
|
2023-01-02 16:57:15 -07:00 |
|
Andrew Kelley
|
3237000d95
|
std.crypto.tls: rudimentary certificate parsing
|
2023-01-02 16:57:15 -07:00 |
|
Andrew Kelley
|
5d7eca6669
|
std.crypto.tls.Client: fix verify_data for batched handshakes
|
2023-01-02 16:57:15 -07:00 |
|
Andrew Kelley
|
e2c16d03ab
|
std.crypto.tls.Client: support secp256r1 for handshake
|
2023-01-02 16:57:15 -07:00 |
|
Andrew Kelley
|
f460c21705
|
std.crypto.tls.Client: avoid hard-coded bytes in key_share
|
2023-01-02 16:57:15 -07:00 |
|
Andrew Kelley
|
7a23778384
|
std.crypto.tls: send a legacy session id
To support middlebox compatibility mode.
|
2023-01-02 16:57:15 -07:00 |
|
Andrew Kelley
|
e2efba76aa
|
std.crypto.tls: refactor to remove mutations
build up the hello message with array concatenation and helper functions
rather than hard-coded offsets and lengths.
|
2023-01-02 16:57:15 -07:00 |
|
Andrew Kelley
|
41f4461cda
|
std.crypto.tls.Client: verify the server's Finished message
|
2023-01-02 16:57:15 -07:00 |
|
Andrew Kelley
|
f6c3a86f0f
|
std.crypto.tls.Client: remove unnecessary coercion
|
2023-01-02 16:57:15 -07:00 |
|
Andrew Kelley
|
8ef4dcd39f
|
std.crypto.tls: add some benchmark data points
Looks like aegis-128l is the winner on baseline too.
|
2023-01-02 16:57:15 -07:00 |
|
Andrew Kelley
|
942b5b468f
|
std.crypto.tls: implement the rest of the cipher suites
Also:
* Use KeyPair.create() function
* Don't bother with CCM
|
2023-01-02 16:57:15 -07:00 |
|
Andrew Kelley
|
93ab8be8d8
|
extract std.crypto.tls.Client into separate namespace
|
2023-01-02 16:57:15 -07:00 |
|