Skip to content
forked from h2o/picotls

TLS 1.3 implementation in C (master supports RFC8446 as well as draft-26, -27, -28)

Notifications You must be signed in to change notification settings

BearPerson1/picotls

 
 

Repository files navigation

picotls

Build Status

Picotls is a TLS 1.3 (RFC 8446) protocol stack written in C, with the following features:

Primary goal of the project is to create a fast, tiny, low-latency TLS 1.3 implementation that can be used with the HTTP/2 protocol stack and the upcoming QUIC stack of the H2O HTTP/2 server.

The TLS protocol implementation of picotls is licensed under the MIT license.

License and the cryptographic algorithms supported by the crypto bindings are as follows:

Binding License Key Exchange Certificate AEAD cipher
minicrypto CC0 / 2-clause BSD secp256r1, x25519 ECDSA (secp256r1)1 AES-128-GCM, chacha20-poly1305
OpenSSL OpenSSL secp256r1, secp384r1, secp521r1, x25519 RSA, ECDSA (secp256r1, secp384r1, secp521r1), ed25519 AES-128-GCM, AES-256-GCM, chacha20-poly1305

Note 1: Minicrypto binding is capable of signing a handshake using the certificate's key, but cannot verify a signature sent by the peer.

Building picotls

If you have cloned picotls from git then ensure that you have initialised the submodules:

% git submodule init
% git submodule update

Build using cmake:

% cmake .
% make
% make check

A dedicated documentation for using picotls with Visual Studio can be found in WindowsPort.md.

Developer documentation

Developer documentation should be available on the wiki.

Using the cli command

Run the test server (at 127.0.0.1:8443):

% ./cli -c /path/to/certificate.pem -k /path/to/private-key.pem  127.0.0.1 8443

Connect to the test server:

% ./cli 127.0.0.1 8443

Using resumption:

% ./cli -s session-file 127.0.0.1 8443

The session-file is read-write. The cli server implements a single-entry session cache. The cli server sends NewSessionTicket when it first sends application data after receiving ClientFinished.

Using early-data:

% ./cli -s session-file -e 127.0.0.1 8443

When -e option is used, client first waits for user input, and then sends CLIENT_HELLO along with the early-data.

IoTell application

% ./iotell.sh

By default p-256 curve is sent. If TLS 1.2 is selected, only the random is changed.

However if option 1 is selected, x25519 curve is used instead the the p-256 keyshare will be changed.

By default it connects to www.google.com. Edit iotell.sh to change the destination.

% python3 generate.py

generate.py generates the keyshare into keyshare.txt and the random nonce into clientHello_random.txt.

Usage will depend on the option of ./iotell.sh.

License

The software is provided under the MIT license. Note that additional licences apply if you use the minicrypto binding (see above).

About

TLS 1.3 implementation in C (master supports RFC8446 as well as draft-26, -27, -28)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C 97.1%
  • CMake 1.2%
  • DTrace 0.7%
  • Perl 0.7%
  • Shell 0.1%
  • PowerShell 0.1%
  • Other 0.1%