aboutsummaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* Use OS X specific linker flagslloyd2012-10-301-0/+2
* The GCC version check was previously used for -fpermissive but nowlloyd2012-10-301-39/+0
* Add missing includes, noticed by OS X's Clang 4.1lloyd2012-10-303-0/+3
* Copy *.rst from doc instead of *.txt if sphinx is notlloyd2012-10-301-1/+1
* merge of '415e0ca58c566cb2990758c1261d47d6b09fc76c'lloyd2012-10-1323-171/+302
|\
| * Add TLS::Policy::negotiate_heartbeat_support which controls if thelloyd2012-10-137-6/+31
| * Fix TLS doc formatting. Note removal of pref_versionlloyd2012-10-132-7/+11
| * Remove TLS::Policy::pref_version. Instead pass the version to offer tolloyd2012-10-136-22/+31
| * Add TLS::Server_Information to encapsulate the hostname/port pair.lloyd2012-10-1315-124/+202
| * Add parens to BOTAN_ASSERT_EQUALS, otherwise low precedence ops couldlloyd2012-10-131-3/+3
| * Use unaligned loads in AES-NI 192 key schedulelloyd2012-10-132-18/+33
| * Compile fix for std::vectorlloyd2012-10-091-1/+1
* | SHA-3 announced. Also mention the combiners.lloyd2012-10-031-1/+2
|/
* Generate the fake pre master needed if the RSA computation fails aheadlloyd2012-10-021-4/+16
* Missing return valuelloyd2012-09-191-0/+1
* Typoslloyd2012-09-191-3/+3
* No longer a part of session statelloyd2012-09-181-4/+0
* 1.10.3 builds OK with Intel C++ 11.1lloyd2012-09-171-0/+2
* Document the version checkinglloyd2012-09-172-0/+88
* Build the return value of version_string at compile time instead of atlloyd2012-09-141-16/+17
* Inline Channel::{read,write}_cipher_state, only one caller eachlloyd2012-09-142-24/+11
* secure_renegotiation isn't a session value anymorelloyd2012-09-142-8/+0
* Expose to public in TLS::Channel peer_supports_heartbeats,lloyd2012-09-131-6/+16
* Store the cipher states in the handshake state object as shared_ptrs.lloyd2012-09-134-43/+94
* Update creators of Session to new constructorlloyd2012-09-122-2/+0
* It seems other implementations define the secure renegotiation flag tolloyd2012-09-124-20/+11
* A quite different approach to extension handling, store both inboundlloyd2012-09-128-282/+233
* Spellinglloyd2012-09-126-18/+17
* Duplicated extension checks!lloyd2012-09-121-12/+0
* Remove Channel::m_secure_renegotiation, instead derive from current state.lloyd2012-09-122-46/+23
* Clarify that this is an incompatible changelloyd2012-09-121-1/+4
* CBC overwrote (encrypted) the following block in write_record. Illoyd2012-09-121-1/+4
* Formattinglloyd2012-09-111-2/+2
* Clean up the handling of close notify alerts a bit. Also returnlloyd2012-09-111-6/+7
* Typolloyd2012-09-111-1/+1
* Add helper functionlloyd2012-09-112-7/+8
* This buffer size does not need to match TLSlloyd2012-09-111-1/+1
* Set m_readbuf_pos == m_readbuf.size(), resizing the vector as neededlloyd2012-09-115-34/+21
* The write buffer is cleared and rewritten by write_record, so we don'tlloyd2012-09-112-6/+5
* Pass the record sequence # up to Channellloyd2012-09-113-12/+13
* Move the record type checks up to Channel as besides that the recordlloyd2012-09-113-41/+22
* No reason to pass a u16bit by referencelloyd2012-09-103-3/+3
* New logic for DTLS replay detection. Abstracts the sequence handlinglloyd2012-09-106-30/+168
* This note is accurate nowlloyd2012-09-091-4/+3
* Consider DTLS v1.0 and v1.2 knownlloyd2012-09-091-2/+3
* Remove debug outputlloyd2012-09-091-1/+1
* Support both TLS and DTLS in the tls_server example.lloyd2012-09-092-410/+159
* Expect a cookie field in a DTLS client hellolloyd2012-09-091-0/+3
* Support DTLS in tls_client. Support client-initiated close_notify (via 'Q')lloyd2012-09-091-98/+103
* Rename functionlloyd2012-09-092-16/+16