index
:
botan.git
master
Unnamed repository; edit this file 'description' to name the repository.
about
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
src
/
tls
/
tls_messages.h
Commit message (
Expand
)
Author
Age
Files
Lines
*
Shuffle things around. Add NIST X.509 test to build.
lloyd
2014-01-01
1
-567
/
+0
*
Remove unused fields. Thanks Clang
lloyd
2013-07-30
1
-1
/
+0
*
Change Credentials_Manager::trusted_certificate_authorities to return
lloyd
2012-11-13
1
-1
/
+1
*
Split asn1_obj.h into asn1_alt_name.h, asn1_attribute.h, and
lloyd
2012-11-06
1
-0
/
+6
*
Add TLS::Policy::negotiate_heartbeat_support which controls if the
lloyd
2012-10-13
1
-0
/
+1
*
Missing return value
lloyd
2012-09-19
1
-0
/
+1
*
A quite different approach to extension handling, store both inbound
lloyd
2012-09-12
1
-79
/
+132
*
Avoid another instance of pulling the key out of the certificate
lloyd
2012-09-07
1
-1
/
+1
*
Save the peer public key in the handshake state instead of pulling it
lloyd
2012-09-07
1
-1
/
+1
*
Pass process_handshake_msg a reference to the Handshake_State
lloyd
2012-09-06
1
-8
/
+8
*
Make the CCS message a Handshake_Msg and send it through the handshake
lloyd
2012-08-10
1
-0
/
+9
*
Expose Handshake_Message as an API type.
lloyd
2012-08-06
1
-52
/
+41
*
Move server-specific parts of the handshake state to a server subclass.
lloyd
2012-08-06
1
-0
/
+1
*
Const Handshake_State args where possible
lloyd
2012-08-06
1
-2
/
+2
*
Use unique_ptr in Server_Kex_Exchange and Extensions
lloyd
2012-08-06
1
-2
/
+3
*
Have all the TLS handshake messages stored in unique_ptrs with only
lloyd
2012-08-06
1
-6
/
+6
*
m_ namespace remaining TLS messages
lloyd
2012-08-06
1
-14
/
+14
*
Add Handshake_Hash::reset
lloyd
2012-08-03
1
-3
/
+7
*
Combine Handshake_Writer and Handshake_Reader into Handshake_IO.
lloyd
2012-08-03
1
-15
/
+15
*
Add a class that handles writing handshake messages instead of pushing
lloyd
2012-07-16
1
-16
/
+15
*
Add TLS::Policy::minimum_dh_group_size, default 1024. Send an
lloyd
2012-06-25
1
-0
/
+1
*
Make TLS::Channel::send non-virtual as neither Client nor Server
lloyd
2012-06-18
1
-0
/
+1
*
A fix for bug 192. First, when renegotiating in the client, attempt to
lloyd
2012-06-09
1
-0
/
+1
*
Replace 0 and NULL pointer constants with nullptr. Also fix an old
lloyd
2012-05-18
1
-1
/
+1
*
Fairly huge update that replaces the old secmem types with std::vector
lloyd
2012-05-18
1
-60
/
+61
*
Add a bool param to renegotiate on if we should force a full
lloyd
2012-04-18
1
-0
/
+1
*
Add support for TLS heartbeats (RFC 6520). Heartbeat initiations from
lloyd
2012-04-16
1
-15
/
+22
*
Finish up server side SRP support, a little ugly but it works.
lloyd
2012-04-06
1
-1
/
+6
*
Initial client-side support for SRP (finally!). Tested against OpenSSL
lloyd
2012-04-05
1
-0
/
+1
*
Limit the lifetime of tickets to Policy::session_ticket_lifetime()
lloyd
2012-04-04
1
-23
/
+10
*
Revert the session_ticket callback in credentials manager. If a PSK
lloyd
2012-03-23
1
-0
/
+1
*
Include the curves and sig algos list in a session resumption client
lloyd
2012-03-23
1
-0
/
+1
*
Server side handling of session tickets, though currently with a
lloyd
2012-03-22
1
-3
/
+9
*
Basic protocol message flow for session tickets
lloyd
2012-03-20
1
-12
/
+10
*
Various merge fixups.
lloyd
2012-03-16
1
-4
/
+4
*
propagate from branch 'net.randombit.botan.tls-state-machine' (head c24b5d6b0...
lloyd
2012-03-16
1
-101
/
+126
|
\
|
*
Add SecureQueue::empty
lloyd
2012-03-07
1
-0
/
+20
|
*
Add an abstraction for reading handshake messages (as DTLS handles it
lloyd
2012-03-05
1
-4
/
+4
|
*
Move the handshake serialization code to Record_Writer
lloyd
2012-03-03
1
-3
/
+3
|
*
Server side PSK
lloyd
2012-01-27
1
-6
/
+5
|
*
Somewhat cleaner PSK handling
lloyd
2012-01-27
1
-3
/
+4
|
*
Server side PSK kex
lloyd
2012-01-27
1
-2
/
+3
|
*
Add client-side support for PSK kex. Tested against OpenSSL.
lloyd
2012-01-27
1
-0
/
+4
|
*
Move all key exchange mechanism code (eg DH/ECDH/SRP) out of the
lloyd
2012-01-25
1
-3
/
+9
|
*
s/tls_suites/tls_ciphersuite/
lloyd
2012-01-24
1
-1
/
+1
|
*
We can now actually handle multiple certificate types in the server
lloyd
2012-01-24
1
-2
/
+4
|
*
Remove Certificate_Type enum
lloyd
2012-01-24
1
-2
/
+2
|
*
Send the supported elliptic curves extension. Instead of hardcoding
lloyd
2012-01-24
1
-2
/
+3
|
*
Get the list of supported ECC curves out of the client hello, and
lloyd
2012-01-24
1
-0
/
+3
|
*
Working ECDH key exchange. Only tested on client side but seems good
lloyd
2012-01-24
1
-2
/
+1
[next]