Commit Graph

730 Commits

Author SHA1 Message Date
033f7e2453 [+] Aurora::Crypto::X509::CertRequest
[+] Aurora::Crypto::X509::GenerateCertificate
[*] Fix lazily copied gen1 RSA code
[+] Aurora::Crypto::ECC::EECCCurve::eCurveSECP256R1
[+] Aurora::Crypto::ECC::EECCCurve::eCurveSECP256K1
[+] Aurora::Crypto::ECC::EECCCurve::eCurveSECP384R1
[+] Aurora::Crypto::ECC::EECCCurve::eCurveSECP521R1
[*] Unfuck ECC interop
[*] Tls pinning: use mbedtls_ssl_conf_verify for tls1.3 (when mbedtls is in a better state)
2022-11-18 21:03:11 +00:00
d9dd1182b9 [+] TLS pinning
[*] ISocket::Shutdown(*bool bNow*), allowing for flush of the send channel when false
[*] Fix StartRead and StartWrite after shutdown (NT)
[*] Amended dead-lock
2022-11-18 04:44:47 +00:00
f86665fd36 [+] Net: TCP servers can now be multi-threaded
[+] Net: Added missing UDP send datagram
[*] IO bug fixes
2022-11-17 20:58:48 +00:00
898c0ced37 [*] Refactoring in progress... 2022-11-17 08:03:20 +00:00
673872f632 [*] Fix critical bug in rwlock (few commits ago. still havent updated submodules so its ok)
[*] IAsyncTransaction::uStartOffset should be u64
2022-11-09 00:33:14 +00:00
e145352920 [+] IProtocolStack::AppendSingleFrameProcessor
[+] IProtocolStack::AppendSingleFrameProcessorEx
[+] ICompressionInterceptor::FlushNextFrame
[+] ICompressionInterceptor::ConfigureAutoFlushPerFrame
2022-11-08 20:04:12 +00:00
745b9f974a [+] ByteBuffer::WriteFromEx
[+] ByteBuffer::WriteFrom
[*] Fix known path resolution quirks and missing compression staged change
[+] ICompressionInterceptor::LimitHasHit
[+] ICompressionInterceptor::LimitReset
[+] ICompressionInterceptor::LimitSet
[+] ICompressionInterceptor::LimitGetIndex
2022-11-07 22:46:35 +00:00
07fd9f19f8 [+] NewProtocolStackFromPipe([...], bool bAutoTick)
[+] IOPipeRequestAIO::uStartOffset
[*] Fix Zstd frames being finicky
[*] Fix compression interceptor invalid weak reference to pipe that
[*] Fix WinFileStream::GetOffset using wrong enumeration
[*] Null ByteBuffer flags on init bc not all operators and constructors account for them
[will prevent bugs in the future]
2022-11-07 13:34:28 +00:00
d63571e4b5 [+] AuCompression::CompressionInterceptor
[+] AuCrypto::CBC::CBCContext
[+] AuFS::ReadDirRecursive
[+] AuFS::DirDeleter
[+] AuCrypto::PBKDF2
[+] AuCrypto::AES::CBCEncrypt
[+] AuCrypto::AES::CBCDecrypt
[+] AuCrypto::TDES::CBCEncrypt
[+] AuCrypto::TDES::CBCDecrypt
[+] Optimize read write locks
[*] Added `ContextFlags = CONTEXT_ALL` to Win32 PlatformWalkCallStack
2022-11-06 13:23:22 +00:00
48a8e4ae5a [+] Catch around all async DispatchFrames. Will add optional forced panic later.
[*] Fix thread handle bug on non-au threads
2022-10-14 07:16:28 +01:00
278a128834 [*] the s member is a u64[] - dont apply 8x modifier to the read index (doesnt apply to write) 2022-10-04 13:25:56 +01:00
051db40a1c [+] STATUS_ACCESS_DENIED error enum in AuNetError.cpp (required for filtered connects given the overlappeds internal field that uses the nt status codes)
[*] fixed: TLS now properly sends the encrypted frame down to the next piece instead of directly to the drain
2022-10-01 01:07:26 +01:00
4671664396 [+] IProcessSectionView::AllocateEx
[+] IProcessSectionView::AllocateEx2
[+] IProcessSectionView::MapFileByPathEx
[+] IProcessSectionView::MapFileByObjectEx
[+] IProcessSectionView::MapIPCMemoryEx
[+] IProcessSectionView::GetAllocations
[+] ReserveAddressSpace(AuUInt uLength)
[*] Modified default value of: PageTable::NX
2022-09-30 23:47:18 +01:00
2db80bbefd [+] RngFillBuffer
[+] IRandomDevice::NextFillBuffer
[*] Regression in tests using rng blobs: FillRange is no longer the routine we need to call on buffers. (184fecb8)
2022-09-30 10:53:29 +01:00
83ee24014f [+] IProtocolPiece (public interface)
[+] IProtocolPiece::Remove
[+] IProtocolPiece::ToNextWriter
[+] IProtocolPiece::GetNextPieceBuffer
2022-09-29 11:45:08 +01:00
990d0b7b9c [*] Update hex decode to use stream apis. massive optimization over using .write for each byte. 2022-09-29 10:48:02 +01:00
85c29bb203 [*] base32 encode should take a view over pointer
[*] base64->16 typo
[-] redundant explicit static parsers
2022-09-29 08:58:20 +01:00
efc02d24f7 [*] Refactor RandomDef: bSecure, ::SetQuickRng()
[*] Default initialize net protocols to zero (tcp)
[*] Warning under AuUInt8 &ByteBuffer::operator[](AuUInt idx)
2022-09-27 17:30:26 +01:00
473e7d30dd [+] AuMemoryView::[begin,end]() of u8 pointers
[*] Prevent AuByteBuffer::begin from exploding user code by providing normalized begin positions
[*] Update AuByteBuffer string write
[*] Redefine AuByteBuffer::data() as the bytebuffers base
[*] Various pointer normalization improvements in ByteBuffer_Position.inl
[*] Update comments
2022-09-27 10:01:35 +01:00
8ec993f4c0 [*] oopsie of a regression. compression bytebuffers became linear after the hack for protocolstack interop 2022-09-25 18:04:41 +01:00
f61d5c3b7a [*] i don't believe yarrow_start is necessary, but just in case, register the yarrows cipher state ahead of rsa/ecc calls 2022-09-25 11:19:43 +01:00
cae8788bb6 [-] Redundant AuCrypto::EHashType (replaced with the complete AuHashing::EHashType)
[*] Minor RSA refactor
2022-09-25 10:56:03 +01:00
0ded2ec77c [*] potential bug in x25519 sign: was using the linear base ptr instead of write after alloc or validate
[*] old copy/pasted ecdh function clearly wasnt tested in its now form :(
[*] clean up
2022-09-25 09:28:48 +01:00
184fecb8ab [*] ByteBuffer::begin() and ::end() now guarantee a linear view of available bytes in either ring or linear bytebuffers. This means ::begin() is no longer guranteed to return the base. In almost all real world use cases, this does not matter. In fact, this is what we want to preserve legacy code with streamable buffers.
[*] Update KCryptoAES: use streamable buffers. deprecate legacy vec<8>::size() based logic - AuByteBuffer (replacing vec8)::begin, ::end still works.
[*] IO pipe buffers should no longer be marked as circular
2022-09-25 09:10:26 +01:00
1de0bdb4e7 [*] NT ReadFile: replace GENERIC_READ, FILE_SHARE_READ with GENERIC_READ, FILE_SHARE_READ | FILE_SHARE_WRITE
[*] ByteBuffer::IsValid() will now return true if there is no underlying buffer so long as the object is marked with the dynamic scaling flag (no contents isnt an invalid state; alloc failure on construct and ad-hoc failure is. latterly, specify the write flag on failure in the ByteBuffer::Write method.) the alloc error can be safely unwound by state raii helpers bc realloc and frens will not free or dirty the state. write-fail-aware may roll back the write head, like how readers can roll back the read head if the stream is incomplete.
2022-09-23 00:59:08 +01:00
6ac4fd61ab [*] Went over baseN and RSA again 2022-09-19 21:34:54 +01:00
c36f159f95 [+] Added asserts in Digests.cpp and HashStream.cpp for good measure
[*] Fix: eRMD320 was crossed with some other done function
2022-09-19 07:18:44 +01:00
50a3ee76f6 [*] transition parse apis that use the old bytebuffer write-into semantics 2022-09-19 07:08:32 +01:00
a7bb5507bb [*] remove dumb key sharing between private and public rsa keys 2022-09-19 07:01:30 +01:00
050e938f0c [*] transition some of the old vector based AuByteBuffer APIs to be stream aware
[*] fix: runnersRunning was uninitialized
[*] fix: unimplemented path in GetOrAllocateLinearWriteable
2022-09-19 06:42:39 +01:00
8a2947ffc5 [+] RMD128+BScFwd based HashCash (bcrypt DoS mitigation, acc creation, antibot, etc)
[*] Refactor bcrypt api: HashPW[Ex] -> HashPassword[Ex]
[+] ByteBuffer::GetOrAllocateLinearWriteable
[+] ByteBuffer::Can[Read/Write](n)
[+] ByteBuffer::GetLinear[Read/Writable]able(n)
[*] Split RNG.cpp into two files
[+] EHashType::eSHA2_48 (_32, _64 was already in place. missed 48/384 bit)
[+] AuCrypto::HMAC and IHMACContext
(AuHashing)
[+] EHashType::eSHA3_28
[+] EHashType::eSHA3_32
[+] EHashType::eSHA3_48
[+] EHashType::eSHA3_64
(AuCrypto)
[+] EHashType::eSHA2_48_384
[+] EHashType::eSHA2_64_512
[+] EHashType::eSHA3_28_224
[+] EHashType::eSHA3_32_256
[+] EHashType::eSHA3_48_384
[+] EHashType::eSHA3_64_512
[*] (IRandomDevice) class -> struct
[*] Bugfix: cast in Promise<SuccessValue_t, ErrorValue_t>::WriteIntoError
[+] Missing AuHashing namespace alias
[*] Time util: pad ms when fraction of a second to 3 digits
2022-09-19 02:34:57 +01:00
8844e8fe64 [+] AuCrypto::BCrypt
> GetForcedMinRounds
> GenSalt
> HashPW
> HashPWEx
> CheckPassword
> CheckPasswordEx
[*] Refactor AuCompression APIs
[*] Clean up AuTryConstructs
[+] Internal compression API for compression based interceptors
[+] Root-level input stream arg check for all compression apis (harden)
[*] Clean up AuCompression code
[+] Solar Designer / OpenWall blowfish crypt
[*] BlowCrypt: accept length input parameter
[*] Split locale into 2 source files
[-] Ugly comment from Open.Win32.cpp. TODO: Readd later. Might warn on empty string bc it makes sense given, "." and "/" normalizes to nothing, and memory pre-idc-if-drops are dropped siliently.
2022-09-15 20:48:50 +01:00
9c25b112a3 [+] Config: DebugConfig::bIsMemoryErrorFatal
[*] Refactor Aurora::DebugConfig
2022-09-12 23:38:44 +01:00
7c167c90f0 [*] Harden IOPipeProcessor for expansion 2022-09-09 22:54:24 +01:00
01871aee61 [*] Fix clipboard method to work with older noncan apps. still doesnt work under windows terminal 2022-09-09 21:47:53 +01:00
7bfa7911cf [*] Fix: win32 console - copy/paste scroll bug 2022-09-09 21:32:10 +01:00
96e7d5cbcc [*] Linux build error: AuProtocol::ProtocolStack 2022-09-04 16:58:54 +01:00
2a3bd735ac [+] AuProtocol: PrependInterceptor[Ex]/AppendInterceptor[Ex] over now removed AddInterceptor[Ex]
(prepend makes sense for outbound stacks, where you might register the compression/crypto stages first, then return an object to the caller who may wish to prepend the input processors. http might need it.)
2022-09-04 01:18:05 +01:00
af03c5cbf3 [+] IProtocolStack::AddEndInterceptor (optimizes away the output stage buffer, instead of preallocating a massive ring buffer, when the AddInterceptorEx variant is supplied with a uOutputBufferSize of zero)
[*] Typo iServerBadMacLimit
2022-09-02 20:58:56 +01:00
795e5f6569 [*] Net: Unmerged Linux changes 2022-08-31 19:49:35 +01:00
ad4b4aa4ae [*] TLS init for later 2022-08-31 18:46:50 +01:00
f1ac21a379 [+] TLSErrorToString
[*] Send break should always perserve writeptr
2022-08-31 16:09:45 +01:00
2b72228b9e [*] TLS Stack: use new AuByteBuffer apis 2022-08-31 00:06:50 +01:00
d68fc7fc91 [+] ByteBuffer::GetNextLinearRead()
[+] ByteBuffer::GetNextLinearWrite()
[-] ByteBuffer::WriterTryGetWriteHeadFor
[+] ITLSPrivateKeyPair
[+] ITLSContext::GetFatalErrorCodeAsString()
[+] Begin to add certificate chains
[*] Clean up TLS
2022-08-30 22:18:15 +01:00
afa7c8f5f8 [+] TLS::GetDefaultCipherSuites
[+] TLS::GetSupportedCipherSuites
[+] TLS::CipherSuiteFromString
[+] TLS::CipherSuiteToString
[+] internal logic for setting up the ciphersuite array
2022-08-29 19:57:24 +01:00
401cf09962 [*] Cleanup/refactor of AuIO 2022-08-29 16:46:46 +01:00
fa0d46d4c7 [+] Protocol::NewProtocolStackFromPipe 2022-08-29 12:09:53 +01:00
b729e92dd4 [*] Unmerged Linux Entrypoint.cpp 2022-08-29 11:07:27 +01:00
747988e85c [*] Protocol stacks werent allocating ring buffers
[*] Unmerged Linux async changes
2022-08-29 00:39:12 +01:00
67905a4192 [+] Network + Protocol + TLS - Initial Commit
=============================================================================
Network ]====================================================================
=============================================================================

[+] Added (very) early Aurora::IO::Net implementation
[+] AuNet::EHostnameType
[+] AuNet::EIPProtocol
[+] AuNet::ENetworkError
[+] AuNet::ETransportProtocol
[+] AuNet::INetInterface
[+] AuNet::INetSrvDatagram
[+] AuNet::INetSrvResolve
[+] AuNet::INetSrvSockets
[+] AuNet::INetSrvWorkers
[+] AuNet::INetWorker
[+] AuNet::IPAddress
[+] AuNet::IResolver
[+] AuNet::ISocket
[+] AuNet::IResolver
[+] AuNet::ISocketBase
[+] AuNet::ISocketChannel
[+] AuNet::ISocketDriver
[+] AuNet::ISocketDriverFactory
[+] AuNet::ISocketServer
[+] AuNet::ISocketServerDriver
[+] AuNet::NetEndpoint
[+] AuNet::NetError
[+] AuNet::NetHostname
(+implementation)

=============================================================================
Protocol ]===================================================================
=============================================================================

[+] IProtocolInterceptor
[+] IProtocolInterceptorEx
[+] IProtocolStack
(+implementation)

=============================================================================
TLS ]========================================================================
=============================================================================

[+] ITLSContext
[+] TLSProtocolRecv
[+] TLSProtocolSend
(+implementation)

=============================================================================
IO Bug Fixes ]===============================================================
=============================================================================

[*] IOProcessor::SubmitIOWorkItem should signal the CvEvent, forcing at least once future tick (wont optimize with if in tick & not yet dispatched work items)
[*] Split IOPipeWork in into IOPipeProcessor header
[+] IOPipeWork::GetBuffer (internal reallocation)
[*] Harden against IAsyncTransactions without a loop source
[*] Missing null `if (processor->listener)` in IOProcessor
[*] Solved some soft-lock conditions under Linux's LoopQueue (added deferred commits)
[*] Quick hack: IOProcessor::HasItems() should OR the early can-tick check function.

=============================================================================
Other ]======================================================================
=============================================================================

[+] Linux: LSSignalCatcher
[+] `static void AuResetMember(Aurora::Memory::ByteBuffer &ref)` for AuROXTL
[*] Attempt to enforce a normalization and don't overwrite-readptr-under-istreamwriters policy in ByteBuffer_ReadWrite (circular buffers)
[*] Bad ECC ctors

=============================================================================
Known issues ]===============================================================
=============================================================================

> Linux net is nowhere near done
> UDP socket emulation layer isn't implemented
> Ciphersuite API is a stub
> Private key API is a stub
> ...therefore no TLS servers
> Missing thread safety precautions under net
> Net implementation is still beri early
2022-08-28 20:02:06 +01:00