[TLS 1.3] Client Authentication in the main Handshake#2957
Conversation
5ae0d87 to
20b48d3
Compare
20b48d3 to
9f25710
Compare
a02081c to
348a5bb
Compare
|
This pull request introduces 1 alert when merging 348a5bb into 8976bf2 - view on LGTM.com new alerts:
|
348a5bb to
c22912f
Compare
|
This pull request introduces 1 alert when merging c22912f into 8976bf2 - view on LGTM.com new alerts:
|
00b35a6 to
2e01455
Compare
f98334d to
3abfc13
Compare
|
This pull request introduces 1 alert when merging 3abfc13 into 45b74cc - view on LGTM.com new alerts:
|
|
This pull request introduces 1 alert when merging 9549e06 into bae64de - view on LGTM.com new alerts:
|
|
This pull request introduces 1 alert when merging 3ed31d4 into bae64de - view on LGTM.com new alerts:
|
|
This pull request introduces 1 alert when merging 86bacc1 into bae64de - view on LGTM.com new alerts:
|
|
Rebased and retargeted to master. |
Co-Authored-By: Hannes Rantzsch <hannes.rantzsch@nexenio.com>
After handshake messages are created they are dropped into this method for book keeping and compile-time message type checking. Afterwards messages are further processed and eventually sent. Hence, the old method name was fairly misleading. Co-Authored-By: Hannes Rantzsch <hannes.rantzsch@nexenio.com>
This allows for client authentication using certificates in the main handshake. Post-handshake authentication is out of scope of this commit Co-authored-by: René Meusel <rene.meusel@nexenio.com>
Codecov ReportBase: 92.57% // Head: 92.55% // Decreases project coverage by
Additional details and impacted files@@ Coverage Diff @@
## master #2957 +/- ##
==========================================
- Coverage 92.57% 92.55% -0.02%
==========================================
Files 596 600 +4
Lines 69729 70073 +344
Branches 6613 6625 +12
==========================================
+ Hits 64552 64858 +306
- Misses 5144 5182 +38
Partials 33 33
Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here. ☔ View full report at Codecov. |
Pull Request Dependencies
Before merging this, we should first review merge:
Description
This implements:
Post-handshake authentication is left for future work. Rationale: A server may always ask for client authentication during the handshake. Post-handshake auth can be disabled by the client, by not negotiating the "post_handshake_auth" extension in the Client Hello.
TODO
We should explicitly support the "signature_algorithm_cert" extensionThe client can choose to not use this extension. Hence its support becomes crucial when implementing the server only.