aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls/tls_handshake_hash.cpp
Commit message (Collapse)AuthorAgeFilesLines
* Shuffle things around. Add NIST X.509 test to build.lloyd2014-01-011-86/+0
|
* Move add_alias and deref_alias from Library_State to SCAN_Namelloyd2013-12-251-1/+1
|
* Have all the TLS handshake messages stored in unique_ptrs with onlylloyd2012-08-061-2/+2
| | | | const access after setting them. Fix some const issues.
* Add TLS::Protocol_Version::supports_ciphersuite_specific_prflloyd2012-08-021-8/+3
|
* Add format() hook to Handshake_Writer, so that Handshake_Hash does notlloyd2012-07-281-14/+2
| | | | | | | | need to know what the handshake format is. Remove unused functions from Handshake_Hash and store all handshake data as a plain std::vector, since as handshake information it is not sensitive.
* Fairly huge update that replaces the old secmem types with std::vectorlloyd2012-05-181-5/+5
| | | | | | using a custom allocator. Currently our allocator just does new/delete with a memset before deletion, and the mmap and mlock allocators have been removed.
* Huge pile of post merge fixups, mtn really fucked that mergelloyd2012-04-251-3/+3
|
* Use SHA-256 when MD5 is negotiated as the HMAC hash in TLS 1.2,lloyd2012-04-021-1/+1
| | | | | | previously negotiating any MD5-based ciphersuite in TLS 1.2 would cause MAC failures as the master secret would come out differently due to using the wrong PRF.
* Support alternate PRF hashes in TLS 1.2. Add support for the SHA-384lloyd2012-01-281-36/+36
| | | | ciphersuites.
* Make Alert a first class object ala Version. Move the alert codes intolloyd2012-01-261-1/+1
| | | | the Alert class for namespacing.
* Make the version number a proper class, makes many things much easierlloyd2012-01-231-3/+3
| | | | for such a minor change.
* Since this branch is hugely API breaking already, go ahead and putlloyd2012-01-231-3/+7
| | | | | everything into a new namespace (Botan::TLS), removing the TLS_ prefixes on everything.
* Kinda maybe working TLS 1.2 for clients. Not well tested at all, but alloyd2012-01-191-8/+25
| | | | | | | | basic connection with a GnuTLS server does work. Currently we don't respect the signature_algorithms extension at all, and using SHA-256 with a 12-byte finished value is hardcoded though the spec is that it can depend on the ciphersuite (likely relevant for GOST ciphersuites in particular).
* Working though hacking client verify (server side only). Only supportslloyd2011-12-281-3/+15
| | | | | TLS 1.0/1.1, SSLv3 uses a different hash format. Only RSA certs tested so far.
* Rename ssl module to tlslloyd2011-12-231-0/+70