Age | Commit message (Collapse) | Author | |
---|---|---|---|
2019-02-13 | Small binary handling optimizations | Raimo Niskanen | |
2019-02-13 | Optimize read_application_data with Okasaki queue | Raimo Niskanen | |
To avoid degenerate case with quadratic complexity that shows up when sending large messages since the the fragment concatenation was done by binary append. An Okasaki queue is much more efficient. | |||
2019-02-13 | Try to optimize decode_cipher_text/3 | Raimo Niskanen | |
2019-02-13 | Optimize application data aggregation | Raimo Niskanen | |
2019-02-13 | Optimize TLS record parsing with Okasaki queue | Raimo Niskanen | |
2019-02-13 | Cache strong_random_bytes for IV | Raimo Niskanen | |
2019-02-13 | Optimize padding | Raimo Niskanen | |
2019-02-13 | Produce less garbage in encrypt loop | Raimo Niskanen | |
2019-02-13 | Reorganize #data{} | Raimo Niskanen | |
2019-02-13 | Tidy up state machine | Raimo Niskanen | |
2019-02-13 | ssl: Use gen_statem named timers to handle connection and recv timeouts | Ingela Anderton Andin | |
2019-02-08 | ssl: Move and rename diffie_hellman_keys and srp_keys to kex_keys | Ingela Anderton Andin | |
2019-02-08 | ssl: Move key_algorithm to handshake_env | Ingela Anderton Andin | |
2019-02-08 | ssl: srp | Ingela Anderton Andin | |
2019-02-08 | ssl: Rename | Ingela Anderton Andin | |
2019-02-08 | ssl: Move diffie_hellman_params to handshake_env | Ingela Anderton Andin | |
2019-02-08 | ssl: Move and rename psk_identity state record field | Ingela Anderton Andin | |
2019-02-08 | ssl: Move premaster_secret to handshake_env | Ingela Anderton Andin | |
2019-02-08 | ssl: Make flight_state DTLS specific | Ingela Anderton Andin | |
flight_state is used to handle retransmission timers for DTLS over udp | |||
2019-02-08 | ssl: Add private_key to connection_env | Ingela Anderton Andin | |
2019-02-08 | ssl: Remove unused record field | Ingela Anderton Andin | |
2019-02-08 | ssl: Add erl_dist_handle to connection_env | Ingela Anderton Andin | |
2019-02-08 | ssl: Add negotiated_version to connection_env | Ingela Anderton Andin | |
2019-02-08 | ssl: Add key exchange items to handshake_env | Ingela Anderton Andin | |
2019-02-08 | ssl: Add hashsign_algorithm and cert_hashsign_algorithm to handshake_env | Ingela Anderton Andin | |
2019-02-08 | ssl: Add downgrade handling to connection_env | Ingela Anderton Andin | |
Remove duplicate handsake history handling form ssl_config function. Later we might refactor to avoid duplication in TLS and DTLS code, but handshake history does not belong in ssl_config function. | |||
2019-02-08 | ssl: Create connection_env | Ingela Anderton Andin | |
2019-02-08 | ssl: Handle renegotiation and extensions in handshake_env | Ingela Anderton Andin | |
2019-02-05 | Merge branch 'ingela/ssl/alert-return/OTP-15423' into maint | Ingela Anderton Andin | |
* ingela/ssl/alert-return/OTP-15423: ssl: Use specs to generate type documentation ssl: Enhance error handling | |||
2019-02-05 | ssl: Use specs to generate type documentation | Ingela Anderton Andin | |
2019-02-04 | ssl: Enhance error handling | Ingela Anderton Andin | |
2019-02-01 | ssl: Remove unintended match | Ingela Anderton Andin | |
2019-01-24 | ssl: Correct check for delayed close due to undliverd data | Ingela Anderton Andin | |
Could cause connection processes not terminate when they should | |||
2019-01-23 | Merge branch 'ingela/ssl/continue-optimize/OTP-15445' into maint | Ingela Anderton Andin | |
* ingela/ssl/continue-optimize/OTP-15445: ssl: If possible assemble several received application data records | |||
2019-01-22 | ssl: If possible assemble several received application data records | Ingela Anderton Andin | |
2019-01-22 | ssl: Create hs_env | Ingela Anderton Andin | |
We want to decrease the size of the outer state tuple, and gain ease of understanding by better grouping. This is the first step of creating a hs_env (handshake environment) part of the state. This change will be performed gradually to reduce merge conflicts complexity and risk of introducing errors. | |||
2019-01-22 | ssl: Remove unnecessary iolist_to_binary | Ingela Anderton Andin | |
2019-01-17 | ssl: Correct 3des_ede_cbc check | Ingela Anderton Andin | |
Could cause ssl to claim to support 3des_ede_cbc when cryptolib does not | |||
2019-01-14 | ssl: Add value 'save' to reuse_sessions and reuse_session client option | Ingela Anderton Andin | |
We want to be able to save a specific session to reuse, and make sure it is reusable immediatly when the connection has been established. Add client option {reuse_session, SessionID::binary()} We also do not want clients to save sessions that it did not verify. Additionaly change behaviour of the client and server to not save sessions if reuse_session is set to false. | |||
2019-01-14 | ssl: Client shall only save verified sessions | Ingela Anderton Andin | |
Modernize test case option handling | |||
2019-01-14 | ssl: Modernize test suite | Ingela Anderton Andin | |
2019-01-08 | Merge branch 'peterdmv/ssl/fix-srp-encode-decode/ERL-790/OTP-15477' into maint | Péter Dimitrov | |
* peterdmv/ssl/fix-srp-encode-decode/ERL-790/OTP-15477: ssl: Fix encoding/decoding of the SRP extension Change-Id: Iee3276a60041a2c04c89385b2de2edb1cd81babd | |||
2019-01-08 | Merge pull request #2070 from essen/fix-ssl-shutdown-crash | Ingela Andin | |
ssl: Fix two invalid gen_statem returns OTP-15505 | |||
2019-01-08 | ssl: Fix encoding/decoding of the SRP extension | Péter Dimitrov | |
The encoded value of the SRP extension length was bigger than the actual length of the extension. This could cause interoperability problems with third party SSL implementations. This commit corrects the encoding and decoding of the SRP extension length. Change-Id: I78d118faab7f5d02b755a7d1e2e8561b86f5a15c | |||
2019-01-08 | Merge pull request #2076 from IngelaAndin/ingela/ssl/active-once/ERL-371 | Ingela Andin | |
ssl: Guarantee active once data delivery OTP-15504 | |||
2018-12-27 | ssl: Gurantee active once data delivery | Ingela Anderton Andin | |
New internal active N changed timing, and new check is needed. | |||
2018-12-22 | ssl: Fix two invalid gen_statem returns | Loïc Hoguin | |
2018-12-21 | ssl: Clean up extension handling | Ingela Anderton Andin | |
Use throw stratgy for erro handling in extension handling. Makes code consistent and easier to refactor. Also fixes bug that an incorrect return value for gen_statem could be created when alert was a result of handling renegotiation info extension. | |||
2018-12-20 | ssl: Fix renegotiation with new TLS sender | Ingela Anderton Andin | |
Wtite connection state was not synchronized when peer initiated renegotiation | |||
2018-12-20 | ssl: Remove no longer needed functions | Ingela Anderton Andin | |
As the stop wrapper functions are no longer needed after tls_sender that altered the behaviour of the TLS distribution code. |