aboutsummaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* Move extension type here, no need to make it visible to appslloyd2012-01-242-20/+20
* s/tls_suites/tls_ciphersuite/lloyd2012-01-248-13/+14
* Require ECDH and ECDSA modules for TLS. This is slightly non-optimallloyd2012-01-241-0/+2
* Add support for the IDEA ciphersuite, though don't require it to belloyd2012-01-243-1/+13
* Fix ECC curve negotiation on the server side.lloyd2012-01-242-35/+34
* We can now actually handle multiple certificate types in the serverlloyd2012-01-249-62/+112
* Remove Certificate_Type enumlloyd2012-01-243-16/+52
* ECDSA support. Only client side testedlloyd2012-01-242-4/+4
* Send the supported elliptic curves extension. Instead of hardcodinglloyd2012-01-248-23/+66
* Get the list of supported ECC curves out of the client hello, andlloyd2012-01-245-4/+17
* Forgot to check in server side ECDH key genlloyd2012-01-241-3/+11
* Allow ECDH negotiation by defaultlloyd2012-01-241-4/+1
* For ECDH you don't strip leading zeros. Bikeshedding: 1 Consistency: 0lloyd2012-01-241-3/+5
* Read ECDH client key exchange messageslloyd2012-01-241-25/+26
* Working ECDH key exchange. Only tested on client side but seems goodlloyd2012-01-243-37/+95
* Cleanuplloyd2012-01-241-10/+10
* Expose the named curve ID/string conversion functions, needed for server key ...lloyd2012-01-242-9/+8
* Convert Internal_Error exceptions into the cooresponding alert.lloyd2012-01-242-4/+7
* Formatting and comment fixlloyd2012-01-241-5/+5
* Don't assume the server key exchange consists of a series of BigInts.lloyd2012-01-243-31/+25
* Add comments for the Policy class. Make the allowed_* calls virtual solloyd2012-01-241-16/+42
* PEM encoding. Fix BER decoding. Encode the entire cert chain in thelloyd2012-01-242-23/+68
* New helpers taking a stringlloyd2012-01-242-0/+28
* This should always have reported what it saw and expectedlloyd2012-01-241-1/+5
* Better documentation in this headerlloyd2012-01-241-11/+34
* The credentials manager interface seems a much better place for certlloyd2012-01-239-173/+137
* Avoid tls_tls_foo.o via ugly hacklloyd2012-01-231-1/+6
* Update examples with new ciphersuite string printerlloyd2012-01-232-5/+4
* Add Ciphersuite::to_stringlloyd2012-01-237-20/+110
* Make the version number a proper class, makes many things much easierlloyd2012-01-2326-168/+304
* Since this branch is hugely API breaking already, go ahead and putlloyd2012-01-2341-303/+456
* Remove the key() method on server key exchange - instead leave it tolloyd2012-01-233-21/+18
* Have the client key exchange examine the server key exchange messagelloyd2012-01-236-52/+59
* Basic outline of the supported curves extension from RFC 4492lloyd2012-01-222-14/+167
* Reorder for readabilitylloyd2012-01-221-46/+48
* When generating a signature in TLS 1.2, respect the request of thelloyd2012-01-208-57/+73
* Report the length of the pre master secret. Who knows if when thislloyd2012-01-201-1/+2
* Missing a spacelloyd2012-01-201-1/+1
* Increase the max key length of HMAC to 512 bytes. Previously we wouldlloyd2012-01-202-2/+9
* A change to Finished in 687c3c7dccdd2f5e4825bdb60155c7bfba22339f brokelloyd2012-01-201-3/+5
* Cast to int, cout gets confused by unsigned charlloyd2012-01-201-3/+3
* Helps if you return the right typelloyd2012-01-201-1/+1
* Support lookup of the SSLv3 PRFlloyd2012-01-201-0/+5
* Ignore ECDH suites in replyinglloyd2012-01-201-0/+3
* Fix decoding of signature_algorithms if we say something we don't recognizelloyd2012-01-201-4/+4
* Strangely you can negotiate using only MD5 in TLS 1.2. Just ignore itlloyd2012-01-201-5/+2
* Instead of using a hardcoded value for signature_algothms, go withlloyd2012-01-207-20/+32
* New policy methods. User provides lists of ciphers, hashes, etc theylloyd2012-01-205-144/+231
* Convert to using a switch statement here. It's faster, and offerslloyd2012-01-201-83/+88
* If the client sent something > TLS 1.2, we sould respond as TLS 1.1lloyd2012-01-201-16/+10