index
:
botan.git
master
Unnamed repository; edit this file 'description' to name the repository.
about
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
Commit message (
Expand
)
Author
Age
Files
Lines
*
Use multiple threads in asio example server
lloyd
2012-01-26
1
-13
/
+74
*
Deleting the return of private_key_for in the TLS server forces the
lloyd
2012-01-26
4
-11
/
+11
*
Clean up record writer a bit
lloyd
2012-01-25
1
-55
/
+60
*
Move around the order of arguments to activate() and add the
lloyd
2012-01-25
5
-14
/
+30
*
In earlier versions, key exchange == "RSA" meant export-style
lloyd
2012-01-25
5
-20
/
+22
*
Move all key exchange mechanism code (eg DH/ECDH/SRP) out of the
lloyd
2012-01-25
6
-95
/
+143
*
Fix printing PSK ciphersuites. Better assert msg.
lloyd
2012-01-25
2
-14
/
+17
*
Convenience method
lloyd
2012-01-25
1
-0
/
+2
*
Go back to choosing the ciphersuite based on the server's preferences.
lloyd
2012-01-25
5
-25
/
+57
*
Hiding SRP users or not is policy. Not sure what the default should be for this
lloyd
2012-01-25
1
-2
/
+10
*
Storing the version as a single u16bit makes compares simpler
lloyd
2012-01-24
1
-27
/
+14
*
Move extension type here, no need to make it visible to apps
lloyd
2012-01-24
2
-20
/
+20
*
s/tls_suites/tls_ciphersuite/
lloyd
2012-01-24
8
-13
/
+14
*
Require ECDH and ECDSA modules for TLS. This is slightly non-optimal
lloyd
2012-01-24
1
-0
/
+2
*
Add support for the IDEA ciphersuite, though don't require it to be
lloyd
2012-01-24
3
-1
/
+13
*
Fix ECC curve negotiation on the server side.
lloyd
2012-01-24
2
-35
/
+34
*
We can now actually handle multiple certificate types in the server
lloyd
2012-01-24
9
-62
/
+112
*
Remove Certificate_Type enum
lloyd
2012-01-24
3
-16
/
+52
*
ECDSA support. Only client side tested
lloyd
2012-01-24
2
-4
/
+4
*
Send the supported elliptic curves extension. Instead of hardcoding
lloyd
2012-01-24
8
-23
/
+66
*
Get the list of supported ECC curves out of the client hello, and
lloyd
2012-01-24
5
-4
/
+17
*
Forgot to check in server side ECDH key gen
lloyd
2012-01-24
1
-3
/
+11
*
Allow ECDH negotiation by default
lloyd
2012-01-24
1
-4
/
+1
*
For ECDH you don't strip leading zeros. Bikeshedding: 1 Consistency: 0
lloyd
2012-01-24
1
-3
/
+5
*
Read ECDH client key exchange messages
lloyd
2012-01-24
1
-25
/
+26
*
Working ECDH key exchange. Only tested on client side but seems good
lloyd
2012-01-24
3
-37
/
+95
*
Cleanup
lloyd
2012-01-24
1
-10
/
+10
*
Expose the named curve ID/string conversion functions, needed for server key ...
lloyd
2012-01-24
2
-9
/
+8
*
Convert Internal_Error exceptions into the cooresponding alert.
lloyd
2012-01-24
2
-4
/
+7
*
Formatting and comment fix
lloyd
2012-01-24
1
-5
/
+5
*
Don't assume the server key exchange consists of a series of BigInts.
lloyd
2012-01-24
3
-31
/
+25
*
Add comments for the Policy class. Make the allowed_* calls virtual so
lloyd
2012-01-24
1
-16
/
+42
*
PEM encoding. Fix BER decoding. Encode the entire cert chain in the
lloyd
2012-01-24
2
-23
/
+68
*
New helpers taking a string
lloyd
2012-01-24
2
-0
/
+28
*
This should always have reported what it saw and expected
lloyd
2012-01-24
1
-1
/
+5
*
Better documentation in this header
lloyd
2012-01-24
1
-11
/
+34
*
The credentials manager interface seems a much better place for cert
lloyd
2012-01-23
9
-173
/
+137
*
Avoid tls_tls_foo.o via ugly hack
lloyd
2012-01-23
1
-1
/
+6
*
Update examples with new ciphersuite string printer
lloyd
2012-01-23
2
-5
/
+4
*
Add Ciphersuite::to_string
lloyd
2012-01-23
7
-20
/
+110
*
Make the version number a proper class, makes many things much easier
lloyd
2012-01-23
26
-168
/
+304
*
Since this branch is hugely API breaking already, go ahead and put
lloyd
2012-01-23
41
-303
/
+456
*
Remove the key() method on server key exchange - instead leave it to
lloyd
2012-01-23
3
-21
/
+18
*
Have the client key exchange examine the server key exchange message
lloyd
2012-01-23
6
-52
/
+59
*
Basic outline of the supported curves extension from RFC 4492
lloyd
2012-01-22
2
-14
/
+167
*
Reorder for readability
lloyd
2012-01-22
1
-46
/
+48
*
When generating a signature in TLS 1.2, respect the request of the
lloyd
2012-01-20
8
-57
/
+73
*
Report the length of the pre master secret. Who knows if when this
lloyd
2012-01-20
1
-1
/
+2
*
Missing a space
lloyd
2012-01-20
1
-1
/
+1
*
Increase the max key length of HMAC to 512 bytes. Previously we would
lloyd
2012-01-20
2
-2
/
+9
[next]