aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls/tls_reader.h
Commit message (Collapse)AuthorAgeFilesLines
* Fairly huge update that replaces the old secmem types with std::vectorlloyd2012-05-181-21/+14
| | | | | | using a custom allocator. Currently our allocator just does new/delete with a memset before deletion, and the mmap and mlock allocators have been removed.
* propagate from branch 'net.randombit.botan.tls-state-machine' (head ↵lloyd2012-03-301-0/+9
|\ | | | | | | | | | | 63b88a65b699c95ef839bc18336bceccfbfabd2e) to branch 'net.randombit.botan.cxx11' (head 1adcc46808b403b8f6bf1669f022e65f9c30e8ea)
| * Small fixes, cleanupslloyd2012-03-191-0/+9
| |
* | Merge fixups. Add locking to default session manager. Use chrono liblloyd2012-02-201-2/+2
|/ | | | and unique_ptr.
* Add client-side support for PSK kex. Tested against OpenSSL.lloyd2012-01-271-0/+12
|
* Since this branch is hugely API breaking already, go ahead and putlloyd2012-01-231-0/+4
| | | | | everything into a new namespace (Botan::TLS), removing the TLS_ prefixes on everything.
* Missing a spacelloyd2012-01-201-1/+1
|
* Kinda maybe working TLS 1.2 for clients. Not well tested at all, but alloyd2012-01-191-4/+3
| | | | | | | | basic connection with a GnuTLS server does work. Currently we don't respect the signature_algorithms extension at all, and using SHA-256 with a 12-byte finished value is hardcoded though the spec is that it can depend on the ciphersuite (likely relevant for GOST ciphersuites in particular).
* Remove Handshake_Message::deserialize which was an unnecessary hook.lloyd2012-01-191-4/+1
| | | | | | Instead deserialize directly in the constructors that are passed the raw message data. This makes it easier to pass contextual information needed for decoding (eg, version numbers) where necessary.
* Full support for renegotiation including RFC 5746 extensions forlloyd2011-12-301-0/+3
| | | | | | | | | | | | | client and server. Server side can handle SCSV values as well, client always sends the extension instead. Handle an empty SNI extension coming back from the server - this is used to indicate that it understood the name. Also add better checking for extensions by passing in what the supposed size of the extension is. Only send the secure negotiation extension in the server hello if the client indicated support for it.
* About half an implementation of RFC 5746lloyd2011-12-291-0/+3
|
* Add support for sending server name indicator in client hellolloyd2011-12-291-1/+15
| | | | | | | | Add support for sending and reading the SRP identifier extension. Add some helper classes for managing TLS extensions Add ciphersuite codes for SRP key exchange.
* Assert there is nothing left over at the end of packet parsing.lloyd2011-12-281-0/+6
|
* Rename ssl module to tlslloyd2011-12-231-0/+186