aboutsummaryrefslogtreecommitdiffstats
path: root/doc
Commit message (Collapse)AuthorAgeFilesLines
* merge of '022cd3c92c37dee696d0c3c0c197f8df8981ccbb'lloyd2013-11-201-0/+5
|\ | | | | | | and '83151ac7a83013a2874f78978df5c4739b879775'
| * Direct people interested in TLS to 1.11lloyd2013-11-201-0/+5
| |
* | Add HKDFlloyd2013-11-171-0/+3
| |
* | Enable all the GCC warning flags, as we now require at least GCC 4.7 anywaylloyd2013-11-161-0/+2
| | | | | | | | Fix a few nullptr and cast warnings.
* | Forgot to relnote thislloyd2013-11-101-0/+4
|/
* Remove download link to 1.8lloyd2013-11-101-8/+0
|
* Release 1.11.51.11.5lloyd2013-11-102-7/+7
|
* Add 1.10.6 release noteslloyd2013-11-102-0/+49
|
* Remove obsolete documentation on thread_safe param to lib initializerlloyd2013-11-091-9/+0
|
* Previously, AutoRNG was just a reference to the global rng, which canlloyd2013-11-081-1/+6
| | | | | | | | | | | cause a huge amount of lock contention in heavily multithreaded code. Now each AutoRNG is its own uniquely seeded HMAC_RNG. The set of entropy sources is shared rather than being per-RNG (so there is only one open fd to /dev/random, etc). So reseeding is still a global lock, but sharing the resources (open file descriptors, etc) across RNGs seems worth the contention. Remove Randpool, which was only used if HMAC_RNG was disabled at build.
* Start updating release noteslloyd2013-11-081-7/+30
|
* Split TLS callbacks into a data callback and an alert callback.lloyd2013-11-054-88/+90
| | | | | In practice applications treated these two cases completely differently, so there was no reason to combine them into a single callback.
* Add Brainpool curves to TLS, and prefer them by default.lloyd2013-09-081-4/+5
| | | | Remove 224-bit NIST curve from default parameter list.
* Enable CCM ciphersuites in TLS. Disable SHA-1 for signatures in TLS v1.2lloyd2013-09-061-3/+5
|
* Add CCM modelloyd2013-09-052-1/+3
|
* Support 64 and 96 bit tags in OCB, using the nonce formatting rulelloyd2013-08-261-0/+2
| | | | added in the latest CFRG internet draft.
* Update build version to 1.11.5 prelloyd2013-08-191-0/+6
|
* Avoid undefined operation in rotation operationslloyd2013-07-311-0/+11
|
* merge of '2139fa117e35116a6d728cc58b050fd5fa20994f'lloyd2013-07-302-4/+4
|\ | | | | | | and 'a25b72d98eb3f88fcf577fabfcd430ef0758debc'
| * Update for 1.11.4 release1.11.4lloyd2013-07-252-4/+4
| |
* | Add build instructions for iOS, sent by Jeffery Walton.lloyd2013-07-261-1/+40
|/
* Change default policy to prohibit DTLS to minimize surprise.lloyd2013-07-103-10/+42
| | | | | | | | | | Allow applications to send arbirary alert messages. Add a new optional parameter to Channel which specifies how large to make the IO buffers by default. Add Channel::reset_state, and reset the IO buffers and cipher specs after a fatal alert.
* Fix ReST syntaxlloyd2013-07-101-3/+2
|
* Fix RST syntaxlloyd2013-05-011-1/+1
|
* Some small TLS doc updateslloyd2013-04-192-29/+37
|
* Rename ARC4 to RC4lloyd2013-04-192-1/+3
|
* Initial notes for 1.11.4lloyd2013-04-181-0/+17
|
* Always include modules requiring ISA extensions as long as thelloyd2013-04-172-1/+3
| | | | | | | | | | | compiler and target platform might support it. For instance the AES SSSE3 code is now always in any x86 build, with just that specific file being compiled with -mssse3. Since we'll only call that code if cpuid confirms it works at runtime, we don't have portability issues, and it can be safely included in generic builds (eg for distributions). Tweak how machine specific compiler flags are generated to be a bit easier to maintain.
* Update for 1.11.3 release1.11.3lloyd2013-04-112-4/+4
|
* Add support for AEAD modes in TLS. Add GCM ciphersuites.lloyd2013-04-111-0/+2
|
* Don't force download over TLS as some browsers cranklloyd2013-04-101-1/+1
|
* Revert part of 5be6e329324fc8263de56167091754e27305917b,lloyd2013-04-101-42/+43
| | | | | | | AEAD_Mode::start now returns a value again. While not useful for any current modes it allows future flexibility of presenting protoocol-level concepts (eg, OpenPGP encryption) using the AEAD interface.
* Fix RST syntax on superscriptlloyd2013-04-041-1/+1
|
* Change the default PKCS #8 PBKDF runtime from 200 to 300 milliseconds.lloyd2013-04-041-24/+34
| | | | | | | Round PBKDF1 and PBKDF2 time-based iterations to multiples of 10000 instead of 8192. Update the password hashing docs a bit.
* Remove return value of AEAD_Mode::start as it doesn't seem necessarylloyd2013-04-031-3/+1
| | | | | | | and is an extra complication for callers. Replace the get_aead in lookup.h returning a Filter with one in aead.h returning AEAD_Mode.
* Small clarifications in doc indexlloyd2013-03-281-9/+9
|
* More AEAD documentationlloyd2013-03-271-13/+22
|
* Clarify that get_cipher will return AEAD_Filterlloyd2013-03-271-1/+2
|
* Basic docs for AEAD_Modelloyd2013-03-273-3/+80
|
* merge of '767ce7b733ad25a056a4609645dbb0418fed5c91'lloyd2013-03-214-4/+12
|\ | | | | | | and '8795500927af6dc6c8a74d6868d002712f971a2f'
| * In examples makefile, trust that g++ is C++11 capablelloyd2013-03-201-1/+1
| |
| * Finish the note on removing Turing+WiderWAKElloyd2013-03-191-1/+2
| |
| * Remove the Turing and WiderWAKE4+1 stream cipher implementations.lloyd2013-03-193-3/+6
| | | | | | | | Both never saw much deployment or analysis.
| * merge of '507b3e6cace11c83363cfa3d9b9698930740311b'lloyd2013-03-192-9/+8
| |\ | | | | | | | | | and '5634ca1b4973ae922d693de7edd0f3f966ad72d5'
| * | Add an interface to Keyed_Filter returning a Key_Length_Specificationlloyd2013-03-171-0/+4
| | | | | | | | | | | | | | | so the full details of what keylength(s) the filter supports are now available.
* | | Move Monotone info to vcs.rstlloyd2013-03-217-47/+49
| | | | | | | | | | | | | | | | | | Fix some syntax errors in misc docs. Use mtn.randombit.net hostname
* | | Add TLS::Policy::server_uses_own_ciphersuite_preferences()lloyd2013-03-212-2/+21
| |/ |/| | | | | | | | | Previously the server always took its most-preferred cipher out of the client's list, but this policy allows telling a server to follow the client's preferences insetad.
* | Make more links httpslloyd2013-03-182-9/+8
|/
* Relnote GCM supportlloyd2013-03-162-4/+4
|
* Relnote adding OCBlloyd2013-03-162-5/+8
|