aboutsummaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* Server side handling of session tickets, though currently with alloyd2012-03-227-33/+106
* Working client-side session tickets. Tested against gmail.com andlloyd2012-03-226-17/+37
* Correct ticket decoding/encodinglloyd2012-03-221-5/+6
* Add missing source file for New_Session_Ticket msglloyd2012-03-221-0/+39
* propagate from branch 'net.randombit.botan.tls-state-machine' (head f761c340d...lloyd2012-03-225-3/+313
|\
| * Reorder schema and make the session id a primary key since it shouldlloyd2012-03-221-7/+7
| * Oops, libsqlite is sqlite2, link to libsqlite3lloyd2012-03-221-1/+1
| * Expire old sessions and limit the cache size in the sqlite session manager.lloyd2012-03-222-16/+62
| * First rev at a SQLite TLS session manager. Should be encrypting thelloyd2012-03-223-0/+265
| * Remove extra BER_Decoder objectlloyd2012-03-221-2/+0
| * Off by one in decode_constrained_integer, broke Session DER decodinglloyd2012-03-221-1/+2
* | Basic protocol message flow for session ticketslloyd2012-03-2011-64/+120
* | Small fixes, cleanupslloyd2012-03-195-9/+22
* | Various merge fixups.lloyd2012-03-165-47/+58
* | propagate from branch 'net.randombit.botan.tls-state-machine' (head 9a12f2825...lloyd2012-03-167-4/+190
|\ \ | |/ |/|
| * propagate from branch 'net.randombit.botan.tls-state-machine' (head c24b5d6b0...lloyd2012-03-1683-2328/+4962
| |\
| * | Build fixeslloyd2012-01-114-11/+20
| * | Outline of RFC 5077 session ticketslloyd2012-01-115-3/+170
* | | Add missing source for DTLS hello verifylloyd2012-03-161-0/+61
| |/ |/|
* | Add SecureQueue::emptylloyd2012-03-079-27/+56
* | Add an abstraction for reading handshake messages (as DTLS handles itlloyd2012-03-0514-91/+215
* | Move the handshake serialization code to Record_Writerlloyd2012-03-0311-39/+44
* | Move min_version and pref_version to the source file so they can belloyd2012-03-022-4/+12
* | Bad conditionallloyd2012-02-281-1/+1
* | We would call the handshake callback twice on session resumption:lloyd2012-02-281-20/+19
* | Add makefile dependency on credentials.h. Use 1024 bit keys forlloyd2012-02-273-11/+19
* | Indentationlloyd2012-02-276-38/+38
* | Create and save certs on the fly for hostnames as they are asked forlloyd2012-02-031-17/+89
* | Actually check CA signatures in Credentials_Manager. This area needs alloyd2012-02-016-18/+55
* | Support getting ciphersuites by name as well as suite IDlloyd2012-01-286-10/+29
* | Add Camellia ciphersuites from RFC 4132.lloyd2012-01-283-5/+40
* | propagate from branch 'net.randombit.botan' (head 3f6b267bc00d2da1b5d36ca2215...lloyd2012-01-28104-4792/+9200
|\ \
| * | Add anon SRP ciphersuites to the list, add missing _CBC on thelloyd2012-01-282-12/+27
| * | Support alternate PRF hashes in TLS 1.2. Add support for the SHA-384lloyd2012-01-288-74/+90
| * | Fix inverted conditionallloyd2012-01-271-2/+2
| * | Change naming convention to match RFCslloyd2012-01-275-30/+26
| * | Remove debug outputlloyd2012-01-271-11/+0
| * | Server side PSKlloyd2012-01-274-101/+124
| * | Working though somewhat clumsy DHE_PSK and ECDHE_PSK. Tested against GnuTLSlloyd2012-01-275-24/+100
| * | Somewhat cleaner PSK handlinglloyd2012-01-273-27/+34
| * | Server side PSK kexlloyd2012-01-274-13/+37
| * | Split up the psk function as the server also wants to be able to looklloyd2012-01-274-22/+51
| * | Credentials hooks for PSKlloyd2012-01-272-2/+27
| * | Add client-side support for PSK kex. Tested against OpenSSL.lloyd2012-01-278-14/+97
| * | Use boost::asio instead of standalone asio as it's more commonlylloyd2012-01-273-44/+49
| * | First attempt to get certificates matching the name the client sent inlloyd2012-01-271-3/+27
| * | Remove Alert::Level enum, replace with boollloyd2012-01-265-14/+10
| * | Change callback interface to pass the Alert object itself insteadlloyd2012-01-2611-31/+100
| * | Make Alert a first class object ala Version. Move the alert codes intolloyd2012-01-2623-177/+224
| * | Need boost_thread for asio example nowlloyd2012-01-261-0/+3