aboutsummaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* About half an implementation of RFC 5746lloyd2011-12-2910-68/+158
* Add support for sending server name indicator in client hellolloyd2011-12-2913-75/+387
* Clean up the ordering of constructor args to the various message typeslloyd2011-12-299-99/+108
* SSLv3 clients will send this as a warning if the server requests alloyd2011-12-291-0/+1
* Ref mozilla bug alsolloyd2011-12-291-2/+2
* Only insert small fragments for application records. Handshakes wouldlloyd2011-12-291-1/+1
* Don't buffer in the record writer at all - we immediately process andlloyd2011-12-287-64/+42
* Fix for RC4 suiteslloyd2011-12-281-1/+2
* Optimization/work on future optimization for the record writer;lloyd2011-12-282-50/+67
* Rounding to nearest 0 should be a no-oplloyd2011-12-281-0/+6
* Add support for raw deflate in the zlib filterlloyd2011-12-282-12/+35
* Just print printablelloyd2011-12-281-2/+0
* Comment grammarlloyd2011-12-281-2/+2
* Fixlloyd2011-12-281-0/+1
* Cleanerlloyd2011-12-282-3/+2
* Fixes for DSA authlloyd2011-12-282-8/+11
* Don't stall on errorlloyd2011-12-281-3/+6
* Add non-null assertion, don't print msg if empty stringlloyd2011-12-282-1/+11
* Assert there is nothing left over at the end of packet parsing.lloyd2011-12-281-0/+6
* Additional bits for SSLv3 client authlloyd2011-12-285-10/+41
* Save peer certs in session info. Use helper function for handshakelloyd2011-12-285-42/+30
* Working though hacking client verify (server side only). Only supportslloyd2011-12-2819-65/+131
* Remove debug print, include info in the exception msg insteadlloyd2011-12-281-8/+3
* Slightly better alert option for this caselloyd2011-12-281-1/+1
* We wouldn't send an alert before handshaking was complete becauselloyd2011-12-281-7/+4
* Make TLS_Session_Params a real class. Various cleanups.lloyd2011-12-286-124/+193
* Partial bits of the server side of client auth. Incomplete.lloyd2011-12-286-39/+87
* Make tls_session_key.h an internal headerlloyd2011-12-279-8/+18
* Actually send the right info in a resumed session server hellolloyd2011-12-271-7/+4
* Force resumed session to use previous ciphersuite, etclloyd2011-12-274-26/+73
* BER decoder extras needed by previous commitlloyd2011-12-272-17/+68
* Session deserializationlloyd2011-12-273-6/+27
* Half of session serializationlloyd2011-12-275-77/+181
* Clean up SessionKeys implementationlloyd2011-12-272-108/+49
* First rev of working session resumption (server side only). Only workslloyd2011-12-277-65/+202
* Avoid a memory leak if we were using DHE - kex_priv would get a copylloyd2011-12-272-23/+22
* Much smarter state transition checking: at each point in thelloyd2011-12-275-159/+170
* Make the server example less fragile, write a class that emulates thelloyd2011-12-271-30/+118
* Compile fixlloyd2011-12-271-1/+1
* Add the code for DHE/DSS with RC4, not 'official' but the codepointlloyd2011-12-272-0/+7
* Compile fix, also save version #lloyd2011-12-231-1/+2
* Fix crashlloyd2011-12-231-1/+6
* Initial hooks for session resumptionlloyd2011-12-2316-163/+280
* Centralize a lot of the handshaking and message parsing in TLS_Channellloyd2011-12-2312-679/+344
* propagate from branch 'net.randombit.botan' (head 6c2809f0c11ba10a137601a2e7e...lloyd2011-12-2332-265/+211
|\
| * Rename ssl module to tlslloyd2011-12-2329-0/+0
| * First stab at an event driven TLS client.lloyd2011-12-239-265/+211
* | Dirty hack to support multiple 'define' options in a module info file.lloyd2011-12-231-8/+16
|/
* Add code point for the SRP identifier extension and add a check for itlloyd2011-12-173-0/+13
* Initial run at an SRP-6a implementation. Not entirely sure about thelloyd2011-12-175-0/+291