aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls/tls_server.cpp
Commit message (Expand)AuthorAgeFilesLines
* A fix for bug 191, that we were not preventing resumption of sessions in thelloyd2012-06-091-37/+39
* Avoid a spurious unrecognized_name alert when a server is running inlloyd2012-06-091-1/+10
* m_ namespace Channel, Client, and Server.lloyd2012-06-091-143/+143
* A fix for bug 192. First, when renegotiating in the client, attempt tolloyd2012-06-091-3/+35
* Invert the policy setting as I think it makes it more obvious thatlloyd2012-06-081-1/+1
* Cleanup, m_ namespace Secure_Renegotiation_Statelloyd2012-06-071-3/+2
* Clients sending a SSLv2 hello would cause an internal failure becauselloyd2012-06-071-0/+10
* Replace 0 and NULL pointer constants with nullptr. Also fix an oldlloyd2012-05-181-5/+5
* Fairly huge update that replaces the old secmem types with std::vectorlloyd2012-05-181-6/+6
* Huge pile of post merge fixups, mtn really fucked that mergelloyd2012-04-251-6/+6
* Add a bool param to renegotiate on if we should force a fulllloyd2012-04-181-7/+12
* The secure renegotiation state was not updated on a sessionlloyd2012-04-181-9/+7
* As best I can tell the client is allowed to send a certificate chainlloyd2012-04-161-5/+0
* Add support for TLS heartbeats (RFC 6520). Heartbeat initiations fromlloyd2012-04-161-0/+5
* Finish up server side SRP support, a little ugly but it works.lloyd2012-04-061-3/+22
* Remove Policy::choose_compression and move to tls_serverlloyd2012-04-041-2/+19
* Limit the lifetime of tickets to Policy::session_ticket_lifetime()lloyd2012-04-041-22/+60
* Revert the session_ticket callback in credentials manager. If a PSKlloyd2012-03-231-38/+29
* Add a special hook in credentials manager for the session ticket key,lloyd2012-03-231-17/+33
* Only claim we support session tickets if we actually have a key oflloyd2012-03-231-3/+10
* Call Credentials_Manager::psk for the session ticket key.lloyd2012-03-221-11/+24
* Server side handling of session tickets, though currently with alloyd2012-03-221-24/+68
* Basic protocol message flow for session ticketslloyd2012-03-201-0/+1
* Add an abstraction for reading handshake messages (as DTLS handles itlloyd2012-03-051-9/+9
* We would call the handshake callback twice on session resumption:lloyd2012-02-281-20/+19
* Actually check CA signatures in Credentials_Manager. This area needs alloyd2012-02-011-1/+1
* Support getting ciphersuites by name as well as suite IDlloyd2012-01-281-2/+2
* Server side PSKlloyd2012-01-271-7/+4
* Somewhat cleaner PSK handlinglloyd2012-01-271-2/+2
* Server side PSK kexlloyd2012-01-271-3/+2
* First attempt to get certificates matching the name the client sent inlloyd2012-01-271-3/+27
* Change callback interface to pass the Alert object itself insteadlloyd2012-01-261-3/+3
* Make Alert a first class object ala Version. Move the alert codes intolloyd2012-01-261-7/+7
* Deleting the return of private_key_for in the TLS server forces thelloyd2012-01-261-7/+9
* Move around the order of arguments to activate() and add thelloyd2012-01-251-3/+6
* In earlier versions, key exchange == "RSA" meant export-stylelloyd2012-01-251-2/+2
* Move all key exchange mechanism code (eg DH/ECDH/SRP) out of thelloyd2012-01-251-37/+16
* Fix printing PSK ciphersuites. Better assert msg.lloyd2012-01-251-1/+2
* Go back to choosing the ciphersuite based on the server's preferences.lloyd2012-01-251-0/+3
* We can now actually handle multiple certificate types in the serverlloyd2012-01-241-17/+31
* Send the supported elliptic curves extension. Instead of hardcodinglloyd2012-01-241-1/+12
* Forgot to check in server side ECDH key genlloyd2012-01-241-3/+11
* The credentials manager interface seems a much better place for certlloyd2012-01-231-2/+10
* Add Ciphersuite::to_stringlloyd2012-01-231-2/+2
* Make the version number a proper class, makes many things much easierlloyd2012-01-231-11/+11
* Since this branch is hugely API breaking already, go ahead and putlloyd2012-01-231-19/+23
* Instead of using a hardcoded value for signature_algothms, go withlloyd2012-01-201-0/+1
* New policy methods. User provides lists of ciphers, hashes, etc theylloyd2012-01-201-7/+4
* If the client sent something > TLS 1.2, we sould respond as TLS 1.1lloyd2012-01-201-16/+10
* Somewhat contorted, but fixes the issue with sending hash/sig ids withlloyd2012-01-201-2/+3