aboutsummaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* Create and save certs on the fly for hostnames as they are asked forlloyd2012-02-031-17/+89
* Actually check CA signatures in Credentials_Manager. This area needs alloyd2012-02-016-18/+55
* Support getting ciphersuites by name as well as suite IDlloyd2012-01-286-10/+29
* Add Camellia ciphersuites from RFC 4132.lloyd2012-01-283-5/+40
* propagate from branch 'net.randombit.botan' (head 3f6b267bc00d2da1b5d36ca2215...lloyd2012-01-28104-4792/+9200
|\
| * Add anon SRP ciphersuites to the list, add missing _CBC on thelloyd2012-01-282-12/+27
| * Support alternate PRF hashes in TLS 1.2. Add support for the SHA-384lloyd2012-01-288-74/+90
| * Fix inverted conditionallloyd2012-01-271-2/+2
| * Change naming convention to match RFCslloyd2012-01-275-30/+26
| * Remove debug outputlloyd2012-01-271-11/+0
| * Server side PSKlloyd2012-01-274-101/+124
| * Working though somewhat clumsy DHE_PSK and ECDHE_PSK. Tested against GnuTLSlloyd2012-01-275-24/+100
| * Somewhat cleaner PSK handlinglloyd2012-01-273-27/+34
| * Server side PSK kexlloyd2012-01-274-13/+37
| * Split up the psk function as the server also wants to be able to looklloyd2012-01-274-22/+51
| * Credentials hooks for PSKlloyd2012-01-272-2/+27
| * Add client-side support for PSK kex. Tested against OpenSSL.lloyd2012-01-278-14/+97
| * Use boost::asio instead of standalone asio as it's more commonlylloyd2012-01-273-44/+49
| * First attempt to get certificates matching the name the client sent inlloyd2012-01-271-3/+27
| * Remove Alert::Level enum, replace with boollloyd2012-01-265-14/+10
| * Change callback interface to pass the Alert object itself insteadlloyd2012-01-2611-31/+100
| * Make Alert a first class object ala Version. Move the alert codes intolloyd2012-01-2623-177/+224
| * Need boost_thread for asio example nowlloyd2012-01-261-0/+3
| * Use multiple threads in asio example serverlloyd2012-01-261-13/+74
| * Deleting the return of private_key_for in the TLS server forces thelloyd2012-01-264-11/+11
| * Clean up record writer a bitlloyd2012-01-251-55/+60
| * Move around the order of arguments to activate() and add thelloyd2012-01-255-14/+30
| * In earlier versions, key exchange == "RSA" meant export-stylelloyd2012-01-255-20/+22
| * Move all key exchange mechanism code (eg DH/ECDH/SRP) out of thelloyd2012-01-256-95/+143
| * Fix printing PSK ciphersuites. Better assert msg.lloyd2012-01-252-14/+17
| * Convenience methodlloyd2012-01-251-0/+2
| * Go back to choosing the ciphersuite based on the server's preferences.lloyd2012-01-255-25/+57
| * Hiding SRP users or not is policy. Not sure what the default should be for thislloyd2012-01-251-2/+10
| * Storing the version as a single u16bit makes compares simplerlloyd2012-01-241-27/+14
| * Move extension type here, no need to make it visible to appslloyd2012-01-242-20/+20
| * s/tls_suites/tls_ciphersuite/lloyd2012-01-248-13/+14
| * Require ECDH and ECDSA modules for TLS. This is slightly non-optimallloyd2012-01-241-0/+2
| * Add support for the IDEA ciphersuite, though don't require it to belloyd2012-01-243-1/+13
| * Fix ECC curve negotiation on the server side.lloyd2012-01-242-35/+34
| * We can now actually handle multiple certificate types in the serverlloyd2012-01-249-62/+112
| * Remove Certificate_Type enumlloyd2012-01-243-16/+52
| * ECDSA support. Only client side testedlloyd2012-01-242-4/+4
| * Send the supported elliptic curves extension. Instead of hardcodinglloyd2012-01-248-23/+66
| * Get the list of supported ECC curves out of the client hello, andlloyd2012-01-245-4/+17
| * Forgot to check in server side ECDH key genlloyd2012-01-241-3/+11
| * Allow ECDH negotiation by defaultlloyd2012-01-241-4/+1
| * For ECDH you don't strip leading zeros. Bikeshedding: 1 Consistency: 0lloyd2012-01-241-3/+5
| * Read ECDH client key exchange messageslloyd2012-01-241-25/+26
| * Working ECDH key exchange. Only tested on client side but seems goodlloyd2012-01-243-37/+95
| * Cleanuplloyd2012-01-241-10/+10