Commit graph

15 commits

Author SHA1 Message Date
mamoniot
f87aec2dc3
first commit 2023-03-09 11:39:44 -05:00
Sean OMeara
0c91b75bbd silence compiler warnings about _unused_variables (#1852)
Tetanus noise xk (#1881)

* Noise XK work in progress.

* A whole lot more Noise_XK work... exchange almost done.

* Delete a bunch of commented out old Noise_IK code.

* Add back in send() and a few other things to Noise_XK ZSSP.

* Some p384 experiment in attic

* A ton of ZSSP work, and put MPL on ZSSP.

* updated kbkdf512 to use the modern nist standard

* Parameterize KBKDF on resulting output key size the way NIST likes.

* updated variable comment

* Make the label a const parameter on kbkdf.

* updated variable comment

* Add MPL to utils and other stuff.

* layout tweak

* Some more ZSSP work and a VDF we may use.

* warning removal

* More ZSSP work, add benchmarks for mimcvdf.

* Almost ready to test...

* Build fix.

* Add automatic retransmission in the earliest stages of session init.

* Just about ready to test... wow.

* It opens a session.

* ZSSP basically works...

---------

Co-authored-by: mamoniot <mamoniot@protonmail.com>

Warning removal.

remove old docs

Remove old tests from ZSSP, new test in main() can also be made into a unit test in the future.

Add key_info() to get key information.

Rekeying is now tested and works.

Show key fingerprint.

Factor out memory:: stuff, does not appear to have any real performance benefit.

Rework defragmentation, and it now tolerates very poor link quality pretty well.

Circuit breaker for incoming defrag queue, and ZSSP now works very well even under very poor network conditions.

Format tweak.

ZSSP API updates.

Just a bit of final ZSSP cleanup before moving to another thing.
2023-03-03 13:47:22 -05:00
Adam Ierymenko
e3e4337d2f Merge, fix secure_eq conflict. 2022-12-21 14:46:53 -05:00
Adam Ierymenko
6517cc0cd1 secure_eq in AES for macOS 2022-12-19 15:49:44 -05:00
mamoniot
9c9510ef36 added secure_eq to a few places 2022-12-19 11:37:31 -05:00
mamoniot
d3e0de0ad8 fixed aes so it resets instead of reallocating 2022-12-14 18:14:44 -05:00
Adam Ierymenko
035d8203c4 A little cleanup and renaming. 2022-12-13 09:55:21 -05:00
Adam Ierymenko
57badb6e56 Also test AES-GCM decrypt and bad decrypt cases. 2022-12-06 17:54:43 -05:00
Adam Ierymenko
263900ae00 Add AES-GCM test vectors even though aes.rs is just glue... to make sure the glue holds. :) 2022-12-06 17:49:17 -05:00
Adam Ierymenko
52770ddaef Comment out set_tag_len which is not necessary and seems to crash some OpenSSL versions (are they missing it?) 2022-12-06 11:37:06 -05:00
Adam Ierymenko
7c2e0b8507 Windows fixes... not quite ported yet but almost there. 2022-12-05 16:58:33 -05:00
Adam Ierymenko
580496cbd7 Some docs, assert AES IV is 96 bits since anything else has security issues. 2022-11-30 09:43:31 -05:00
Brenton Bostick
f8351ca47e fix typos in header comment 2022-11-28 12:36:35 -05:00
Adam Ierymenko
07fc8b2d2b
rustfmt 2022-09-13 10:48:36 -04:00
Adam Ierymenko
32abd20c38
A bunch of reorg and simplification in the network hypervisor. 2022-09-13 10:35:52 -04:00
Renamed from core-crypto/src/aes.rs (Browse further)