summaryrefslogtreecommitdiff
path: root/Userland/Libraries/LibTLS/CipherSuite.h
AgeCommit message (Collapse)Author
2023-04-14LibTLS: Move CipherSuite to Extensions.hstelar7
Also add missing values from the IANA registry
2023-04-14LibTLS: Move HashAlgorithm to Extensions.hstelar7
Also add missing values from the IANA registry
2023-04-14LibTLS: Move SignatureAlgorithm to Extensions.hstelar7
Also add missing values from the IANA registry
2023-04-14LibTLS: Move ECPointFormat to Extensions.hstelar7
Also add missing values from the IANA registry
2023-04-14LibTLS: Rename NamedCurve to SupportedGroupstelar7
This matches the wording used in the IANA registry and TLS 1.3 Also add missing values from the IANA registry
2022-03-20LibCrypto+LibTLS: Generalize the elliptic curve interfaceMichiel Visser
These changes generalize the interface with an elliptic curve implementation. This allows LibTLS to support elliptic curves generally without needing the specifics of elliptic curve implementations. This should allow for easier addition of other elliptic curves.
2022-02-18LibTLS: Add Elliptic Curve Diffie-Hellman Ephemeral (ECDHE) supportMichiel Visser
This adds support for the Elliptic Curve Diffie-Hellman Ephemeral key exchange, using the X25519 elliptic curve. This means that the ECDHE_RSA_WITH_AES_128_GCM_SHA256 and ECDHE_RSA_WITH_AES_256_GCM_SHA384 cipher suites are now supported. Currently, only the X25519 elliptic curve is supported in combination with the uncompressed elliptic curve point format. However, since the X25519 is the recommended curve, basically every server supports this. Furthermore, the uncompressed point format is required by the TLS specification, which means any server with EC support will support the uncompressed format. Like the implementation of the normal Diffie-Hellman Ephemeral key exchange, this implementation does not currently validate the signature of the public key sent by the server.
2021-10-06LibTLS: Add missing headers to CipherSuite.hBen Wiederhake
2021-08-16LibTLS: Add DHE_RSA AES GCM cipher suitesSamuel Bowman
This adds the following cipher suites: * DHE_RSA_WITH_AES_128_GCM_SHA256 * DHE_RSA_WITH_AES_256_GCM_SHA384
2021-05-29LibTLS: Use a more precise KeyExchangeAlgorithm enumDexesTTP
The old enumeration didn't allow discriminating the key exchange algorithms used, but only allowed the handshake with the server. With this new enumeration, we can know which key exchange algorithm we are actually supposed to use :^)
2021-05-29LibTLS: Add IANA Hex codes for all recommended cipher suitesDexesTTP
Also sort the existing cipher suites, and remove the unsupported ones. We don't support any of these recommended ciphers, but at least we now know which ones we should focus on :^)
2021-05-19LibTLS: Enable the RSA_WITH_AES_256_GCM_SHA384 cipherDexesTTP
This is more of an example commit of how to add new ciphers to TLS.
2021-05-19LibTLS: Generate cipher variants based on the cipherDexesTTP
This is better than using the AEAD flag :^)
2021-05-19LibTLS: Define cipher suite parameters and components in a macroDexesTTP
Instead of sprinkling the definition of the ciper suites all over the TLS implementation, let's regroup it all once and for all in a single place, and then add our new implementations there.
2021-05-19LibTLS: Move the cipher list to the CipherSuite.h headerDexesTTP