aboutsummaryrefslogtreecommitdiffstats
path: root/src/lib/tls/tls_messages.h
Commit message (Expand)AuthorAgeFilesLines
* Use enums for TLS key exchange group paramsJack Lloyd2018-02-131-2/+2
* Use enums to represent TLS signature and kex algorithms.Jack Lloyd2018-01-281-12/+11
* For TLS client auth add callback giving list of trusted CA namesJack Lloyd2018-01-271-1/+1
* Add an examine callback alsoJack Lloyd2018-01-271-0/+4
* Add ability for application to control which TLS extensions are usedJack Lloyd2018-01-271-1/+6
* Remove vestigial support for TLS compressionJack Lloyd2018-01-211-46/+40
* Add supported groups TLS extension (RFC 7919)René Korthaus2017-10-171-0/+2
* Additional final annotationsJack Lloyd2017-10-151-2/+2
* Fixes for MSVCJack Lloyd2017-09-281-2/+1
* Further header cleanupsJack Lloyd2017-09-281-0/+2
* Change header guard format to BOTAN_FOO_H_Jack Lloyd2017-09-201-2/+2
* More annotationsJack Lloyd2017-09-191-8/+8
* Add API stability annotations.Jack Lloyd2017-09-191-6/+6
* De-inline accessor functions in Client_Hello typeJack Lloyd2017-09-011-93/+19
* Content:Tomasz Frydrych2017-04-031-15/+15
* Add tests for certificate status messageJack Lloyd2017-01-041-8/+8
* Export tls_messages.h as a public headerRené Korthaus2016-12-231-2/+2
* Convert to using standard uintN_t integer typesJack Lloyd2016-12-181-86/+86
* Add OCSP stapling support to TLS clientJack Lloyd2016-11-261-0/+31
* Add CECPQ1 TLS ciphersuitesJack Lloyd2016-11-171-0/+18
* Fix doxygen warnings [ci skip]René Korthaus2016-10-191-0/+1
* Support encoding of supported point formats extensionRené Korthaus2016-10-031-0/+18
* New TLS positive and negative tests.Juraj Somorovsky2016-09-301-6/+6
* TLS Server should respect client signature_algorithms. Stricter TLS hello dec...Jack Lloyd2016-09-211-0/+14
* Merge master into this branch, resolving conflicts with #457/#576Jack Lloyd2016-08-311-10/+54
|\
| * Removed Handshake_Info class.Matthias Gierlings2016-06-191-6/+13
| * Reduction of code complexity in TLS classes.Matthias Gierlings2016-06-191-23/+60
* | Address some issues with PR 492Jack Lloyd2016-08-131-1/+0
* | Encrypt-then-MAC extension (RFC 7366)Juraj Somorovsky2016-05-111-0/+11
* | TLS Policy supportChristian Mainka2016-05-031-1/+1
|/
* Check that TLS signature type is accepted by the policy.Jack Lloyd2016-03-061-2/+4
* Remaining cppcheck fixes that are not covered by GH #444Daniel Neus2016-03-051-1/+1
* cppcheck fixes: Class 'X' has a constructor with 1 argument that is not expli...Daniel Neus2016-03-051-9/+9
* Make SRP6 support optional in TLSJack Lloyd2016-02-071-2/+15
* Remove support for the TLS min fragment length extension.Jack Lloyd2016-02-071-14/+0
* Remove TLS heartbeat support.Jack Lloyd2016-02-071-24/+0
* Add final attribute to many classesJack Lloyd2016-01-101-13/+13
* Add extended master secret extension (RFC 7627) to TLSJack Lloyd2016-01-031-0/+10
* Remove unused pkcs8 includesSimon Warta2015-08-031-1/+0
* Add ALPN (RFC 7301) and remove NPNlloyd2015-03-201-44/+25
* Remove SSLv3 and handling of SSLv2 client hellos.lloyd2015-01-111-4/+1
* Ensure all files have copyright and license info.lloyd2015-01-101-1/+1
* Add DTLS-SRTP key establishment from RFC 5764 (required for WebRTC).lloyd2015-01-041-10/+38
* Let TLS policy disable putting the timestamp in the hello random fieldslloyd2014-11-041-1/+2
* Various small fixes and cleanups, new is_prime utillloyd2014-11-031-4/+4
* Fix various warnings from VC++ 2014 and add missing includelloyd2014-10-311-4/+4
* Add TLS fallback signalling (draft-ietf-tls-downgrade-scsv-00)lloyd2014-10-311-0/+2
* Have TLS_Data_Reader decoding errors include the actual msg type namelloyd2014-04-121-1/+1
* Verify that the server did not send any extension that the client didn'tlloyd2014-04-111-0/+6
* Guess I won't be needing theselloyd2014-01-181-1/+0