aboutsummaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* Use multiple threads in asio example serverlloyd2012-01-261-13/+74
* Deleting the return of private_key_for in the TLS server forces thelloyd2012-01-264-11/+11
* Clean up record writer a bitlloyd2012-01-251-55/+60
* Move around the order of arguments to activate() and add thelloyd2012-01-255-14/+30
* In earlier versions, key exchange == "RSA" meant export-stylelloyd2012-01-255-20/+22
* Move all key exchange mechanism code (eg DH/ECDH/SRP) out of thelloyd2012-01-256-95/+143
* Fix printing PSK ciphersuites. Better assert msg.lloyd2012-01-252-14/+17
* Convenience methodlloyd2012-01-251-0/+2
* Go back to choosing the ciphersuite based on the server's preferences.lloyd2012-01-255-25/+57
* Hiding SRP users or not is policy. Not sure what the default should be for thislloyd2012-01-251-2/+10
* Storing the version as a single u16bit makes compares simplerlloyd2012-01-241-27/+14
* Move extension type here, no need to make it visible to appslloyd2012-01-242-20/+20
* s/tls_suites/tls_ciphersuite/lloyd2012-01-248-13/+14
* Require ECDH and ECDSA modules for TLS. This is slightly non-optimallloyd2012-01-241-0/+2
* Add support for the IDEA ciphersuite, though don't require it to belloyd2012-01-243-1/+13
* Fix ECC curve negotiation on the server side.lloyd2012-01-242-35/+34
* We can now actually handle multiple certificate types in the serverlloyd2012-01-249-62/+112
* Remove Certificate_Type enumlloyd2012-01-243-16/+52
* ECDSA support. Only client side testedlloyd2012-01-242-4/+4
* Send the supported elliptic curves extension. Instead of hardcodinglloyd2012-01-248-23/+66
* Get the list of supported ECC curves out of the client hello, andlloyd2012-01-245-4/+17
* Forgot to check in server side ECDH key genlloyd2012-01-241-3/+11
* Allow ECDH negotiation by defaultlloyd2012-01-241-4/+1
* For ECDH you don't strip leading zeros. Bikeshedding: 1 Consistency: 0lloyd2012-01-241-3/+5
* Read ECDH client key exchange messageslloyd2012-01-241-25/+26
* Working ECDH key exchange. Only tested on client side but seems goodlloyd2012-01-243-37/+95
* Cleanuplloyd2012-01-241-10/+10
* Expose the named curve ID/string conversion functions, needed for server key ...lloyd2012-01-242-9/+8
* Convert Internal_Error exceptions into the cooresponding alert.lloyd2012-01-242-4/+7
* Formatting and comment fixlloyd2012-01-241-5/+5
* Don't assume the server key exchange consists of a series of BigInts.lloyd2012-01-243-31/+25
* Add comments for the Policy class. Make the allowed_* calls virtual solloyd2012-01-241-16/+42
* PEM encoding. Fix BER decoding. Encode the entire cert chain in thelloyd2012-01-242-23/+68
* New helpers taking a stringlloyd2012-01-242-0/+28
* This should always have reported what it saw and expectedlloyd2012-01-241-1/+5
* Better documentation in this headerlloyd2012-01-241-11/+34
* The credentials manager interface seems a much better place for certlloyd2012-01-239-173/+137
* Avoid tls_tls_foo.o via ugly hacklloyd2012-01-231-1/+6
* Update examples with new ciphersuite string printerlloyd2012-01-232-5/+4
* Add Ciphersuite::to_stringlloyd2012-01-237-20/+110
* Make the version number a proper class, makes many things much easierlloyd2012-01-2326-168/+304
* Since this branch is hugely API breaking already, go ahead and putlloyd2012-01-2341-303/+456
* Remove the key() method on server key exchange - instead leave it tolloyd2012-01-233-21/+18
* Have the client key exchange examine the server key exchange messagelloyd2012-01-236-52/+59
* Basic outline of the supported curves extension from RFC 4492lloyd2012-01-222-14/+167
* Reorder for readabilitylloyd2012-01-221-46/+48
* When generating a signature in TLS 1.2, respect the request of thelloyd2012-01-208-57/+73
* Report the length of the pre master secret. Who knows if when thislloyd2012-01-201-1/+2
* Missing a spacelloyd2012-01-201-1/+1
* Increase the max key length of HMAC to 512 bytes. Previously we wouldlloyd2012-01-202-2/+9