aboutsummaryrefslogtreecommitdiffstats
path: root/src/ssl
Commit message (Expand)AuthorAgeFilesLines
* Split up src/cert/x509 into a set of modules, though mostly mutuallylloyd2010-09-171-1/+1
* Require a TLS_Policylloyd2010-09-179-64/+60
* Add a helper function for encoding TLS values with length tagginglloyd2010-09-156-47/+60
* Update/fix SSL depslloyd2010-09-151-6/+5
* Hide a number of the internal SSL headers from the user, you can stilllloyd2010-09-1518-28/+32
* Update all uses of MemoryRegion::append to use either push_back or operator+=lloyd2010-09-159-59/+61
* Remove more implicit vector to pointer conversionslloyd2010-09-141-1/+1
* More changes to avoid vector to pointer implicit conversionslloyd2010-09-144-9/+9
* Remove constructors of MemoryVector and SecureVector that took twolloyd2010-09-131-2/+8
* More vector->pointer conversion removals.lloyd2010-09-134-13/+14
* Anywhere where we use MemoryRegion::begin to get access to the raw pointerlloyd2010-09-134-4/+6
* Really fix RC4 suites - it was set to use a key of 128 bytes == 1024 bits!lloyd2010-09-081-1/+1
* Rename MemoryRegion::destroy to MemoryRegion::clear to match STLlloyd2010-09-081-2/+2
* Fix RC4 suiteslloyd2010-09-081-1/+1
* Big, invasive but mostly automated change, with a further attempt atlloyd2010-09-072-2/+4
* Prevent loop variable shadowinglloyd2010-09-071-12/+12
* Remove trailing comma from enum decllloyd2010-09-071-1/+1
* Add dependencies for SSL modulelloyd2010-09-031-0/+20
* More Doxygen commentslloyd2010-06-161-0/+8
* More Doxygen updates/fixeslloyd2010-06-151-0/+3
* Fix a few hundred Doxygen warningslloyd2010-06-151-4/+4
* Fix comparison to use IVs with a hypothetical negotiated TLS that useslloyd2010-06-092-2/+2
* Use "/*" instead of "/**" in starting comments at the begining of a file.lloyd2010-06-0730-42/+42
* OpenBSD doesn't have MSG_NOSIGNAL; you need to set up a signal handlerlloyd2010-06-011-1/+0
* Use memcpy to copy gethostbyname's result to the socket info structlloyd2010-05-101-0/+5
* Remove add_entropy_vec. Much cleaner way of doing this: add the entirelloyd2010-04-272-4/+4
* Add the other parties Random value to the local PRNG statelloyd2010-04-232-0/+4
* Return SecureVector vals by const reflloyd2010-04-231-4/+4
* Extension codes for ECC negotiationlloyd2010-04-211-0/+3
* If we couldn't agree on a suite, fail immediatelylloyd2010-04-201-0/+5
* Compile fixlloyd2010-04-201-1/+1
* Expose function breaking down ciphersuite to algo valueslloyd2010-04-192-3/+5
* Add codes for SHA-1 based ECC suites (RFC 4492).lloyd2010-04-192-25/+81
* Add support for SEED ciphersuites. Tested against OpenSSL 0.9.8nlloyd2010-04-173-0/+24
* Add support for reading SSLv2 client helloslloyd2010-04-175-8/+86
* Clean up ciphersuite handlinglloyd2010-04-177-91/+273
* If the CBC padding is incorrect, then assume the pad size is zero andlloyd2010-04-091-4/+10
* Present requested hostname (SNI extn) to TLS_Server userlloyd2010-03-302-0/+6
* Remove bad filenamelloyd2010-03-301-1/+0
* Instead of just discarding the extension size, confirm that thelloyd2010-03-301-1/+4
* Support TLS Extensions, specifically SNIlloyd2010-03-301-35/+29
* Constify assert_at_least. Add some helperslloyd2010-03-301-1/+17
* Add some magic numbers for TLS extension codeslloyd2010-03-301-0/+11
* Add a class that knows how to decode a (very small subset of) TLS datalloyd2010-03-306-61/+249
* Don't fail simply because the client sent a version code that we don'tlloyd2010-03-301-6/+0
* Fix server handshake.lloyd2010-03-302-15/+14
* Fix DSA TLS serverslloyd2010-03-301-1/+1
* Add support for TLS v1.1's per-record random IV. Tested against GnuTLS server.lloyd2010-03-307-12/+46
* Rename pad_amount to block_size, more accurate/descriptivelloyd2010-03-303-12/+20
* Also remove compression bits from record writerlloyd2010-03-251-14/+4