Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | merge of '022cd3c92c37dee696d0c3c0c197f8df8981ccbb' | lloyd | 2013-11-20 | 1 | -0/+5 |
|\ | | | | | | | and '83151ac7a83013a2874f78978df5c4739b879775' | ||||
| * | Direct people interested in TLS to 1.11 | lloyd | 2013-11-20 | 1 | -0/+5 |
| | | |||||
* | | Add HKDF | lloyd | 2013-11-17 | 1 | -0/+3 |
| | | |||||
* | | Enable all the GCC warning flags, as we now require at least GCC 4.7 anyway | lloyd | 2013-11-16 | 1 | -0/+2 |
| | | | | | | | | Fix a few nullptr and cast warnings. | ||||
* | | Forgot to relnote this | lloyd | 2013-11-10 | 1 | -0/+4 |
|/ | |||||
* | Remove download link to 1.8 | lloyd | 2013-11-10 | 1 | -8/+0 |
| | |||||
* | Release 1.11.51.11.5 | lloyd | 2013-11-10 | 2 | -7/+7 |
| | |||||
* | Add 1.10.6 release notes | lloyd | 2013-11-10 | 2 | -0/+49 |
| | |||||
* | Remove obsolete documentation on thread_safe param to lib initializer | lloyd | 2013-11-09 | 1 | -9/+0 |
| | |||||
* | Previously, AutoRNG was just a reference to the global rng, which can | lloyd | 2013-11-08 | 1 | -1/+6 |
| | | | | | | | | | | | cause a huge amount of lock contention in heavily multithreaded code. Now each AutoRNG is its own uniquely seeded HMAC_RNG. The set of entropy sources is shared rather than being per-RNG (so there is only one open fd to /dev/random, etc). So reseeding is still a global lock, but sharing the resources (open file descriptors, etc) across RNGs seems worth the contention. Remove Randpool, which was only used if HMAC_RNG was disabled at build. | ||||
* | Start updating release notes | lloyd | 2013-11-08 | 1 | -7/+30 |
| | |||||
* | Split TLS callbacks into a data callback and an alert callback. | lloyd | 2013-11-05 | 4 | -88/+90 |
| | | | | | In practice applications treated these two cases completely differently, so there was no reason to combine them into a single callback. | ||||
* | Add Brainpool curves to TLS, and prefer them by default. | lloyd | 2013-09-08 | 1 | -4/+5 |
| | | | | Remove 224-bit NIST curve from default parameter list. | ||||
* | Enable CCM ciphersuites in TLS. Disable SHA-1 for signatures in TLS v1.2 | lloyd | 2013-09-06 | 1 | -3/+5 |
| | |||||
* | Add CCM mode | lloyd | 2013-09-05 | 2 | -1/+3 |
| | |||||
* | Support 64 and 96 bit tags in OCB, using the nonce formatting rule | lloyd | 2013-08-26 | 1 | -0/+2 |
| | | | | added in the latest CFRG internet draft. | ||||
* | Update build version to 1.11.5 pre | lloyd | 2013-08-19 | 1 | -0/+6 |
| | |||||
* | Avoid undefined operation in rotation operations | lloyd | 2013-07-31 | 1 | -0/+11 |
| | |||||
* | merge of '2139fa117e35116a6d728cc58b050fd5fa20994f' | lloyd | 2013-07-30 | 2 | -4/+4 |
|\ | | | | | | | and 'a25b72d98eb3f88fcf577fabfcd430ef0758debc' | ||||
| * | Update for 1.11.4 release1.11.4 | lloyd | 2013-07-25 | 2 | -4/+4 |
| | | |||||
* | | Add build instructions for iOS, sent by Jeffery Walton. | lloyd | 2013-07-26 | 1 | -1/+40 |
|/ | |||||
* | Change default policy to prohibit DTLS to minimize surprise. | lloyd | 2013-07-10 | 3 | -10/+42 |
| | | | | | | | | | | Allow applications to send arbirary alert messages. Add a new optional parameter to Channel which specifies how large to make the IO buffers by default. Add Channel::reset_state, and reset the IO buffers and cipher specs after a fatal alert. | ||||
* | Fix ReST syntax | lloyd | 2013-07-10 | 1 | -3/+2 |
| | |||||
* | Fix RST syntax | lloyd | 2013-05-01 | 1 | -1/+1 |
| | |||||
* | Some small TLS doc updates | lloyd | 2013-04-19 | 2 | -29/+37 |
| | |||||
* | Rename ARC4 to RC4 | lloyd | 2013-04-19 | 2 | -1/+3 |
| | |||||
* | Initial notes for 1.11.4 | lloyd | 2013-04-18 | 1 | -0/+17 |
| | |||||
* | Always include modules requiring ISA extensions as long as the | lloyd | 2013-04-17 | 2 | -1/+3 |
| | | | | | | | | | | | compiler and target platform might support it. For instance the AES SSSE3 code is now always in any x86 build, with just that specific file being compiled with -mssse3. Since we'll only call that code if cpuid confirms it works at runtime, we don't have portability issues, and it can be safely included in generic builds (eg for distributions). Tweak how machine specific compiler flags are generated to be a bit easier to maintain. | ||||
* | Update for 1.11.3 release1.11.3 | lloyd | 2013-04-11 | 2 | -4/+4 |
| | |||||
* | Add support for AEAD modes in TLS. Add GCM ciphersuites. | lloyd | 2013-04-11 | 1 | -0/+2 |
| | |||||
* | Don't force download over TLS as some browsers crank | lloyd | 2013-04-10 | 1 | -1/+1 |
| | |||||
* | Revert part of 5be6e329324fc8263de56167091754e27305917b, | lloyd | 2013-04-10 | 1 | -42/+43 |
| | | | | | | | AEAD_Mode::start now returns a value again. While not useful for any current modes it allows future flexibility of presenting protoocol-level concepts (eg, OpenPGP encryption) using the AEAD interface. | ||||
* | Fix RST syntax on superscript | lloyd | 2013-04-04 | 1 | -1/+1 |
| | |||||
* | Change the default PKCS #8 PBKDF runtime from 200 to 300 milliseconds. | lloyd | 2013-04-04 | 1 | -24/+34 |
| | | | | | | | Round PBKDF1 and PBKDF2 time-based iterations to multiples of 10000 instead of 8192. Update the password hashing docs a bit. | ||||
* | Remove return value of AEAD_Mode::start as it doesn't seem necessary | lloyd | 2013-04-03 | 1 | -3/+1 |
| | | | | | | | and is an extra complication for callers. Replace the get_aead in lookup.h returning a Filter with one in aead.h returning AEAD_Mode. | ||||
* | Small clarifications in doc index | lloyd | 2013-03-28 | 1 | -9/+9 |
| | |||||
* | More AEAD documentation | lloyd | 2013-03-27 | 1 | -13/+22 |
| | |||||
* | Clarify that get_cipher will return AEAD_Filter | lloyd | 2013-03-27 | 1 | -1/+2 |
| | |||||
* | Basic docs for AEAD_Mode | lloyd | 2013-03-27 | 3 | -3/+80 |
| | |||||
* | merge of '767ce7b733ad25a056a4609645dbb0418fed5c91' | lloyd | 2013-03-21 | 4 | -4/+12 |
|\ | | | | | | | and '8795500927af6dc6c8a74d6868d002712f971a2f' | ||||
| * | In examples makefile, trust that g++ is C++11 capable | lloyd | 2013-03-20 | 1 | -1/+1 |
| | | |||||
| * | Finish the note on removing Turing+WiderWAKE | lloyd | 2013-03-19 | 1 | -1/+2 |
| | | |||||
| * | Remove the Turing and WiderWAKE4+1 stream cipher implementations. | lloyd | 2013-03-19 | 3 | -3/+6 |
| | | | | | | | | Both never saw much deployment or analysis. | ||||
| * | merge of '507b3e6cace11c83363cfa3d9b9698930740311b' | lloyd | 2013-03-19 | 2 | -9/+8 |
| |\ | | | | | | | | | | and '5634ca1b4973ae922d693de7edd0f3f966ad72d5' | ||||
| * | | Add an interface to Keyed_Filter returning a Key_Length_Specification | lloyd | 2013-03-17 | 1 | -0/+4 |
| | | | | | | | | | | | | | | | so the full details of what keylength(s) the filter supports are now available. | ||||
* | | | Move Monotone info to vcs.rst | lloyd | 2013-03-21 | 7 | -47/+49 |
| | | | | | | | | | | | | | | | | | | Fix some syntax errors in misc docs. Use mtn.randombit.net hostname | ||||
* | | | Add TLS::Policy::server_uses_own_ciphersuite_preferences() | lloyd | 2013-03-21 | 2 | -2/+21 |
| |/ |/| | | | | | | | | | Previously the server always took its most-preferred cipher out of the client's list, but this policy allows telling a server to follow the client's preferences insetad. | ||||
* | | Make more links https | lloyd | 2013-03-18 | 2 | -9/+8 |
|/ | |||||
* | Relnote GCM support | lloyd | 2013-03-16 | 2 | -4/+4 |
| | |||||
* | Relnote adding OCB | lloyd | 2013-03-16 | 2 | -5/+8 |
| |