aboutsummaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* Use 4.5.0 releaselloyd2010-04-281-1/+1
* propagate from branch 'net.randombit.botan' (head a5f25a3b954f24c5d07fa0dab6c...lloyd2010-04-2835-200/+857
|\
| * Update log, readme, configure for 1.9.7 release1.9.7lloyd2010-04-273-3/+3
| * HMAC_RNG handling changes - split up reseed() and add_entropy()lloyd2010-04-272-35/+31
| * Remove add_entropy_vec. Much cleaner way of doing this: add the entirelloyd2010-04-273-7/+4
| * mutex.h is internal - had been picking up system installed versionlloyd2010-04-231-1/+1
| * Add the other parties Random value to the local PRNG statelloyd2010-04-232-0/+4
| * Return SecureVector vals by const reflloyd2010-04-231-4/+4
| * Add add_entropy_vec which calls add_entropy on the passed vector. Haslloyd2010-04-231-0/+3
| * Add a couple of Comb4P tests, generated by the python implementationlloyd2010-04-231-0/+9
| * Check to make sure the user didn't provide two of the same has forlloyd2010-04-231-0/+3
| * Remove some C-style castslloyd2010-04-234-6/+6
| * Comb4P: hashes must be the same lengthlloyd2010-04-221-2/+0
| * Fix EMSA_Raw in the case where the original input had leading 0 bytes.lloyd2010-04-212-1/+20
| * Add a test for RSA verification with raw padding and an unusual keylloyd2010-04-211-0/+33
| * Extension codes for ECC negotiationlloyd2010-04-211-0/+3
| * If we couldn't agree on a suite, fail immediatelylloyd2010-04-201-0/+5
| * Expose public_value() in ECDH public keylloyd2010-04-201-3/+10
| * Compile fixlloyd2010-04-201-1/+1
| * Expose function breaking down ciphersuite to algo valueslloyd2010-04-192-3/+5
| * In the string constructor of EC_Domain_Params, check if the PEM decodinglloyd2010-04-192-6/+16
| * Dist script updateslloyd2010-04-191-4/+8
| * Cleanups. Name our cert for localhost. Used AutoSeeded_RNG.lloyd2010-04-191-12/+16
| * Just report total size output at the endlloyd2010-04-191-1/+7
| * Add codes for SHA-1 based ECC suites (RFC 4492).lloyd2010-04-192-25/+81
| * Add support for SEED ciphersuites. Tested against OpenSSL 0.9.8nlloyd2010-04-174-0/+25
| * Add support for reading SSLv2 client helloslloyd2010-04-176-8/+87
| * Clean up ciphersuite handlinglloyd2010-04-177-91/+273
| * Add support for TLS 1.2 PRFlloyd2010-04-172-22/+63
| * Add Comb4P hash combiner, as described in Anja Lehmann's thesis.lloyd2010-04-175-0/+168
| * Tick version to 1.9.7-devlloyd2010-04-163-4/+6
| * Tick for 1.9.6 release1.9.6lloyd2010-04-093-3/+4
* | Remove TR1 testing; C++0x had what we needlloyd2010-04-091-8/+0
* | propagate from branch 'net.randombit.botan' (head 75d272c759511a9a99a371ddc74...lloyd2010-04-0993-383/+676
|\|
| * If the CBC padding is incorrect, then assume the pad size is zero andlloyd2010-04-091-4/+10
| * Retrodocument some 1.9.5 changes. Document other TLS fixes in 1.9.6lloyd2010-04-071-2/+7
| * Present requested hostname (SNI extn) to TLS_Server userlloyd2010-03-302-0/+6
| * Remove bad filenamelloyd2010-03-301-1/+0
| * Document adding SNIlloyd2010-03-301-0/+1
| * Instead of just discarding the extension size, confirm that thelloyd2010-03-301-1/+4
| * Support TLS Extensions, specifically SNIlloyd2010-03-301-35/+29
| * Constify assert_at_least. Add some helperslloyd2010-03-301-1/+17
| * Add some magic numbers for TLS extension codeslloyd2010-03-301-0/+11
| * Add a class that knows how to decode a (very small subset of) TLS datalloyd2010-03-306-61/+249
| * Don't fail simply because the client sent a version code that we don'tlloyd2010-03-301-6/+0
| * Fix server handshake.lloyd2010-03-302-15/+14
| * Fix DSA TLS serverslloyd2010-03-301-1/+1
| * Add support for TLS v1.1's per-record random IV. Tested against GnuTLS server.lloyd2010-03-308-12/+47
| * Rename pad_amount to block_size, more accurate/descriptivelloyd2010-03-303-12/+20
| * Tick 1.9.6-devlloyd2010-03-303-4/+6