aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls/tls_client.cpp
Commit message (Expand)AuthorAgeFilesLines
* Add a bool param to renegotiate on if we should force a fulllloyd2012-04-181-17/+40
* Add support for TLS heartbeats (RFC 6520). Heartbeat initiations fromlloyd2012-04-161-0/+3
* Initial client-side support for SRP (finally!). Tested against OpenSSLlloyd2012-04-051-0/+1
* Limit the lifetime of tickets to Policy::session_ticket_lifetime()lloyd2012-04-041-2/+2
* Include the curves and sig algos list in a session resumption clientlloyd2012-03-231-0/+1
* Working client-side session tickets. Tested against gmail.com andlloyd2012-03-221-13/+19
* Basic protocol message flow for session ticketslloyd2012-03-201-3/+27
* Add an abstraction for reading handshake messages (as DTLS handles itlloyd2012-03-051-9/+9
* Indentationlloyd2012-02-271-8/+8
* Actually check CA signatures in Credentials_Manager. This area needs alloyd2012-02-011-2/+2
* Support getting ciphersuites by name as well as suite IDlloyd2012-01-281-1/+1
* Change naming convention to match RFCslloyd2012-01-271-1/+1
* Add client-side support for PSK kex. Tested against OpenSSL.lloyd2012-01-271-0/+14
* Remove Alert::Level enum, replace with boollloyd2012-01-261-1/+1
* Change callback interface to pass the Alert object itself insteadlloyd2012-01-261-3/+3
* Make Alert a first class object ala Version. Move the alert codes intolloyd2012-01-261-14/+14
* Move around the order of arguments to activate() and add thelloyd2012-01-251-3/+6
* In earlier versions, key exchange == "RSA" meant export-stylelloyd2012-01-251-2/+2
* We can now actually handle multiple certificate types in the serverlloyd2012-01-241-2/+3
* The credentials manager interface seems a much better place for certlloyd2012-01-231-3/+9
* Make the version number a proper class, makes many things much easierlloyd2012-01-231-2/+2
* Since this branch is hugely API breaking already, go ahead and putlloyd2012-01-231-17/+21
* Have the client key exchange examine the server key exchange messagelloyd2012-01-231-22/+8
* TLS_Ciphersuite_Algos was just a strange level of indirection betweenlloyd2012-01-201-20/+10
* Many fixes for TLS 1.2 though some things in particular client authlloyd2012-01-201-3/+2
* Kinda maybe working TLS 1.2 for clients. Not well tested at all, but alloyd2012-01-191-10/+13
* I'm not sure if I like this asthetically, but passing around thelloyd2012-01-191-28/+18
* Support SSLv3 client auth on the client side.lloyd2012-01-191-7/+11
* The server would incorrectly send a server key exchange message when alloyd2012-01-061-13/+5
* Add a hook in TLS_Channel that is called when an alert is received.lloyd2012-01-041-0/+12
* As someone pointed out on the TLS list, NPN isn't really a negotiationlloyd2012-01-041-3/+3
* Add support for next protocol negotiation. Client only currently;lloyd2012-01-041-4/+26
* If the handshake_fn returns false explicitly remove the session fromlloyd2012-01-031-0/+2
* Assume handshake_fn existslloyd2012-01-031-6/+1
* Make handshake completion function non-optional. Now returns a boollloyd2012-01-031-3/+6
* Add Credentials_Manager which is an interface to something that knowslloyd2012-01-031-26/+19
* Some basic infrastructure pieces for SRP (policy, etc)lloyd2011-12-311-5/+4
* Add support for client-side session resumptionlloyd2011-12-311-27/+116
* Rename the session type to 'TLS_Session'. Split the manager out intolloyd2011-12-301-2/+2
* Add a function for getting the version number of an active connection.lloyd2011-12-301-5/+6
* Prevent ping-ponging of close alerts by tracking both if a handshakelloyd2011-12-301-1/+1
* Full support for renegotiation including RFC 5746 extensions forlloyd2011-12-301-4/+0
* Many renegotiation fixes. Add support for the secure renegotiationlloyd2011-12-301-14/+56
* About half an implementation of RFC 5746lloyd2011-12-291-4/+7
* Add support for sending server name indicator in client hellolloyd2011-12-291-6/+14
* Clean up the ordering of constructor args to the various message typeslloyd2011-12-291-11/+11
* Don't buffer in the record writer at all - we immediately process andlloyd2011-12-281-1/+0
* Save peer certs in session info. Use helper function for handshakelloyd2011-12-281-7/+1
* Working though hacking client verify (server side only). Only supportslloyd2011-12-281-2/+0
* Partial bits of the server side of client auth. Incomplete.lloyd2011-12-281-1/+3