aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls/c_kex.cpp
Commit message (Expand)AuthorAgeFilesLines
* Add TLS::Policy::minimum_dh_group_size, default 1024. Send anlloyd2012-06-251-2/+18
* Profiling with valgrind shows that the 2**16 iteration for findinglloyd2012-06-141-1/+0
* A fix for bug 192. First, when renegotiating in the client, attempt tolloyd2012-06-091-1/+1
* Fix for DHE, strip_leading_zeros always took off the last bytelloyd2012-06-061-1/+1
* Add assert_done checks here to help avoid interesting substitutionlloyd2012-06-051-0/+2
* Fairly huge update that replaces the old secmem types with std::vectorlloyd2012-05-181-13/+13
* Huge pile of post merge fixups, mtn really fucked that mergelloyd2012-04-251-2/+2
* Finish up server side SRP support, a little ugly but it works.lloyd2012-04-061-1/+3
* Re-enable TLS (was disabled by trunk merge), and require the srp6 modulelloyd2012-04-051-0/+4
* Initial client-side support for SRP (finally!). Tested against OpenSSLlloyd2012-04-051-0/+29
* Add an abstraction for reading handshake messages (as DTLS handles itlloyd2012-03-051-2/+2
* Move the handshake serialization code to Record_Writerlloyd2012-03-031-1/+2
* Fix inverted conditionallloyd2012-01-271-2/+2
* Change naming convention to match RFCslloyd2012-01-271-7/+7
* Remove debug outputlloyd2012-01-271-11/+0
* Server side PSKlloyd2012-01-271-81/+98
* Working though somewhat clumsy DHE_PSK and ECDHE_PSK. Tested against GnuTLSlloyd2012-01-271-4/+37
* Somewhat cleaner PSK handlinglloyd2012-01-271-22/+28
* Server side PSK kexlloyd2012-01-271-7/+28
* Split up the psk function as the server also wants to be able to looklloyd2012-01-271-7/+10
* Add client-side support for PSK kex. Tested against OpenSSL.lloyd2012-01-271-6/+38
* Make Alert a first class object ala Version. Move the alert codes intolloyd2012-01-261-1/+1
* In earlier versions, key exchange == "RSA" meant export-stylelloyd2012-01-251-3/+3
* Move all key exchange mechanism code (eg DH/ECDH/SRP) out of thelloyd2012-01-251-19/+42
* For ECDH you don't strip leading zeros. Bikeshedding: 1 Consistency: 0lloyd2012-01-241-3/+5
* Read ECDH client key exchange messageslloyd2012-01-241-25/+26
* Working ECDH key exchange. Only tested on client side but seems goodlloyd2012-01-241-29/+47
* Don't assume the server key exchange consists of a series of BigInts.lloyd2012-01-241-4/+8
* Make the version number a proper class, makes many things much easierlloyd2012-01-231-10/+13
* Since this branch is hugely API breaking already, go ahead and putlloyd2012-01-231-2/+6
* Remove the key() method on server key exchange - instead leave it tolloyd2012-01-231-9/+16
* Have the client key exchange examine the server key exchange messagelloyd2012-01-231-22/+46
* TLS_Ciphersuite_Algos was just a strange level of indirection betweenlloyd2012-01-201-2/+2
* Remove Handshake_Message::deserialize which was an unnecessary hook.lloyd2012-01-191-15/+7
* The leading zeros of a DH pre master secret are supposed to belloyd2012-01-181-2/+23
* The server would incorrectly send a server key exchange message when alloyd2012-01-061-1/+1
* Add a function for getting the version number of an active connection.lloyd2011-12-301-1/+1
* Clean up the ordering of constructor args to the various message typeslloyd2011-12-291-15/+7
* Working though hacking client verify (server side only). Only supportslloyd2011-12-281-1/+1
* Initial hooks for session resumptionlloyd2011-12-231-2/+2
* Rename ssl module to tlslloyd2011-12-231-0/+165