Marten Seemann
82db032a05
implement the TLS key derivation
2017-09-08 12:04:45 +03:00
Marten Seemann
8df2cb3b1d
rename the current key derivation function
...
TLS will use a completely different key derivation function.
2017-09-07 20:08:24 +03:00
Marten Seemann
f1ada87dcf
make the protocol package internal
2017-08-30 00:19:44 +07:00
Marten Seemann
2330ac0497
introduce an utils.LittleEndian
2017-08-23 15:57:35 +07:00
Marten Seemann
987905149b
run gofmt to fix ordering of imports
2017-06-13 18:07:22 +02:00
Marten Seemann
c0b09c8646
make utils an internal package
2017-06-09 22:28:40 +02:00
Marten Seemann
731dd87872
also keys for the client in AESGCM key derivation
2017-01-14 18:52:15 +07:00
Lucas Clemente
5dda3b8e69
remove support for version 32 from crypto
2016-09-01 12:20:19 +02:00
Lucas Clemente
125842d80d
simplify key derivation
2016-08-06 17:54:11 +02:00
Lucas Clemente
ed15c18387
disable chacha20 build until we have solved the dependency situation
2016-08-01 16:28:22 +02:00
Lucas Clemente
705da8fd00
switch to AES-GCM as symmetric cipher
...
fixes #200
2016-07-05 12:13:41 +02:00
Lucas Clemente
240946dfde
replace version number literals with constants to make grepping easier
2016-06-03 11:09:48 +02:00
Lucas Clemente
241c9f3a3c
add support for diversification to key derivation
...
ref #51
2016-05-21 00:04:28 +02:00
Lucas Clemente
aa5d2be491
implement forward secure encryption
2016-04-16 22:08:57 +02:00
Lucas Clemente
86b4ffdaaf
use chacha20poly1305 instead of AES and include cert in key derivation
...
Unfortunately QUIC uses non-standard tag sizes with both AES-GCM and
Poly1305. Adopting AES-GCM seems much harder, so I changed it to
Chacha20Poly1305 and only made some slight changes to an existing algo.
This should probably be double-checked at some point.
2016-04-14 23:44:31 +02:00
Lucas Clemente
1760bc3227
add key derivation and change AEAD in session, not working right now :(
2016-04-14 20:39:51 +02:00