aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls/tls_handshake_state.cpp
Commit message (Expand)AuthorAgeFilesLines
* Shuffle things around. Add NIST X.509 test to build.lloyd2014-01-011-442/+0
* Move add_alias and deref_alias from Library_State to SCAN_Namelloyd2013-12-251-2/+2
* Make the IV length and MAC keylength explicit in the ciphersuitelloyd2013-04-101-3/+3
* Move assert.h from internal to very public (included in types.h)lloyd2013-03-131-1/+0
* Store cipher states in Channel instead of Handshake_State. Keep alllloyd2012-11-061-20/+0
* Store the cipher states in the handshake state object as shared_ptrs.lloyd2012-09-131-1/+22
* A quite different approach to extension handling, store both inboundlloyd2012-09-121-1/+11
* Save the peer public key in the handshake state instead of pulling itlloyd2012-09-071-4/+4
* DTLS needs some help with ChangeCipherSpec because it is not includedlloyd2012-08-081-0/+9
* Expose Handshake_Message as an API type.lloyd2012-08-061-1/+16
* Make handshake session keys private with get/setlloyd2012-08-061-0/+10
* Make the handshake Ciphersuite only available by const reference.lloyd2012-08-061-3/+6
* Have all the TLS handshake messages stored in unique_ptrs with onlylloyd2012-08-061-35/+79
* Take the initial record version from the Handshake_IO instance insteadlloyd2012-08-031-1/+1
* Combine Handshake_Writer and Handshake_Reader into Handshake_IO.lloyd2012-08-031-6/+3
* Use TLS v1.0 PRF unless the version supports a ciphersuite specific PRFlloyd2012-08-021-4/+5
* Add TLS::Protocol_Version::supports_ciphersuite_specific_prflloyd2012-08-021-6/+2
* Add a class that handles writing handshake messages instead of pushinglloyd2012-07-161-33/+13
* Changes to version handling in support of DTLS work.lloyd2012-07-121-10/+10
* Split TLS::Policy::allowed_hashes into allowed_signature_hashes andlloyd2012-06-291-1/+1
* Make TLS::Channel::send non-virtual as neither Client nor Serverlloyd2012-06-181-4/+19
* Add Handshake_Type codes for RFC 6066 handshake types.lloyd2012-06-101-19/+24
* A fix for bug 192. First, when renegotiating in the client, attempt tolloyd2012-06-091-20/+46
* Report what we have already received on an unexpected statelloyd2012-06-071-2/+3
* Replace 0 and NULL pointer constants with nullptr. Also fix an oldlloyd2012-05-181-15/+15
* Fairly huge update that replaces the old secmem types with std::vectorlloyd2012-05-181-1/+1
* Huge pile of post merge fixups, mtn really fucked that mergelloyd2012-04-251-3/+4
* Add a bool param to renegotiate on if we should force a fulllloyd2012-04-181-0/+2
* Finish up server side SRP support, a little ugly but it works.lloyd2012-04-061-0/+8
* Use SHA-256 when MD5 is negotiated as the HMAC hash in TLS 1.2,lloyd2012-04-021-1/+5
* Working client-side session tickets. Tested against gmail.com andlloyd2012-03-221-0/+8
* Basic protocol message flow for session ticketslloyd2012-03-201-2/+7
* Add SecureQueue::emptylloyd2012-03-071-2/+2
* Add an abstraction for reading handshake messages (as DTLS handles itlloyd2012-03-051-14/+23
* Support alternate PRF hashes in TLS 1.2. Add support for the SHA-384lloyd2012-01-281-0/+22
* Deleting the return of private_key_for in the TLS server forces thelloyd2012-01-261-2/+0
* Move all key exchange mechanism code (eg DH/ECDH/SRP) out of thelloyd2012-01-251-2/+2
* ECDSA support. Only client side testedlloyd2012-01-241-3/+3
* Make the version number a proper class, makes many things much easierlloyd2012-01-231-15/+15
* Since this branch is hugely API breaking already, go ahead and putlloyd2012-01-231-7/+11
* Have the client key exchange examine the server key exchange messagelloyd2012-01-231-2/+0
* When generating a signature in TLS 1.2, respect the request of thelloyd2012-01-201-37/+27
* Somewhat contorted, but fixes the issue with sending hash/sig ids withlloyd2012-01-201-10/+31
* TLS_Ciphersuite_Algos was just a strange level of indirection betweenlloyd2012-01-201-58/+51
* Many fixes for TLS 1.2 though some things in particular client authlloyd2012-01-201-0/+69
* Kinda maybe working TLS 1.2 for clients. Not well tested at all, but alloyd2012-01-191-3/+15
* I'm not sure if I like this asthetically, but passing around thelloyd2012-01-191-5/+37
* Add support for next protocol negotiation. Client only currently;lloyd2012-01-041-1/+6
* Rename the session type to 'TLS_Session'. Split the manager out intolloyd2011-12-301-0/+149