| Commit message (Expand) | Author | Age | Files | Lines |
* | Hoist m_rng to Channel | lloyd | 2012-09-06 | 1 | -1/+0 |
* | Use a std::function so handshake_io only has access Record_Writer's | lloyd | 2012-09-04 | 1 | -1/+6 |
* | Make the CCS message a Handshake_Msg and send it through the handshake | lloyd | 2012-08-10 | 1 | -2/+2 |
* | Expose Handshake_Message as an API type. | lloyd | 2012-08-06 | 1 | -0/+2 |
* | Move server-specific parts of the handshake state to a server subclass. | lloyd | 2012-08-06 | 1 | -5/+23 |
* | Make the handshake hash private | lloyd | 2012-08-06 | 1 | -14/+14 |
* | Make handshake session keys private with get/set | lloyd | 2012-08-06 | 1 | -9/+6 |
* | Make the handshake Ciphersuite only available by const reference. | lloyd | 2012-08-06 | 1 | -10/+6 |
* | Have all the TLS handshake messages stored in unique_ptrs with only | lloyd | 2012-08-06 | 1 | -114/+132 |
* | Remove Channel::read_handshake. Have the server set expected next msg | lloyd | 2012-08-05 | 1 | -18/+4 |
* | Combine Handshake_Writer and Handshake_Reader into Handshake_IO. | lloyd | 2012-08-03 | 1 | -19/+18 |
* | Rename activate to more descriptive change_cipher_spec | lloyd | 2012-07-29 | 1 | -6/+12 |
* | Use unique_ptr for handshake state, avoid lots of delete+nullptr assign | lloyd | 2012-07-29 | 1 | -19/+22 |
* | If we're going to reject an insecure renegotiation, do it immediately, | lloyd | 2012-07-29 | 1 | -41/+45 |
* | Fix DTLS version string. | lloyd | 2012-07-28 | 1 | -4/+13 |
* | Add format() hook to Handshake_Writer, so that Handshake_Hash does not | lloyd | 2012-07-28 | 1 | -3/+3 |
* | Add a class that handles writing handshake messages instead of pushing | lloyd | 2012-07-16 | 1 | -24/+45 |
* | Hook creating just the handshake reader vs the entire state | lloyd | 2012-07-12 | 1 | -4/+4 |
* | Changes to version handling in support of DTLS work. | lloyd | 2012-07-12 | 1 | -8/+13 |
* | Add TLS::Channel::new_handshake_state which abstracts creating the | lloyd | 2012-07-09 | 1 | -2/+7 |
* | Record_Writer needs a PRNG for the IV generation. Share the reference | lloyd | 2012-07-05 | 1 | -1/+1 |
* | We would never negotiate anon DH/ECDH even if policy allowed it and | lloyd | 2012-06-17 | 1 | -1/+1 |
* | Generate new session IDs in the same format as hello randoms, with the | lloyd | 2012-06-10 | 1 | -1/+1 |
* | A fix for bug 191, that we were not preventing resumption of sessions in the | lloyd | 2012-06-09 | 1 | -37/+39 |
* | Avoid a spurious unrecognized_name alert when a server is running in | lloyd | 2012-06-09 | 1 | -1/+10 |
* | m_ namespace Channel, Client, and Server. | lloyd | 2012-06-09 | 1 | -143/+143 |
* | A fix for bug 192. First, when renegotiating in the client, attempt to | lloyd | 2012-06-09 | 1 | -3/+35 |
* | Invert the policy setting as I think it makes it more obvious that | lloyd | 2012-06-08 | 1 | -1/+1 |
* | Cleanup, m_ namespace Secure_Renegotiation_State | lloyd | 2012-06-07 | 1 | -3/+2 |
* | Clients sending a SSLv2 hello would cause an internal failure because | lloyd | 2012-06-07 | 1 | -0/+10 |
* | Replace 0 and NULL pointer constants with nullptr. Also fix an old | lloyd | 2012-05-18 | 1 | -5/+5 |
* | Fairly huge update that replaces the old secmem types with std::vector | lloyd | 2012-05-18 | 1 | -6/+6 |
* | Huge pile of post merge fixups, mtn really fucked that merge | lloyd | 2012-04-25 | 1 | -6/+6 |
* | Add a bool param to renegotiate on if we should force a full | lloyd | 2012-04-18 | 1 | -7/+12 |
* | The secure renegotiation state was not updated on a session | lloyd | 2012-04-18 | 1 | -9/+7 |
* | As best I can tell the client is allowed to send a certificate chain | lloyd | 2012-04-16 | 1 | -5/+0 |
* | Add support for TLS heartbeats (RFC 6520). Heartbeat initiations from | lloyd | 2012-04-16 | 1 | -0/+5 |
* | Finish up server side SRP support, a little ugly but it works. | lloyd | 2012-04-06 | 1 | -3/+22 |
* | Remove Policy::choose_compression and move to tls_server | lloyd | 2012-04-04 | 1 | -2/+19 |
* | Limit the lifetime of tickets to Policy::session_ticket_lifetime() | lloyd | 2012-04-04 | 1 | -22/+60 |
* | Revert the session_ticket callback in credentials manager. If a PSK | lloyd | 2012-03-23 | 1 | -38/+29 |
* | Add a special hook in credentials manager for the session ticket key, | lloyd | 2012-03-23 | 1 | -17/+33 |
* | Only claim we support session tickets if we actually have a key of | lloyd | 2012-03-23 | 1 | -3/+10 |
* | Call Credentials_Manager::psk for the session ticket key. | lloyd | 2012-03-22 | 1 | -11/+24 |
* | Server side handling of session tickets, though currently with a | lloyd | 2012-03-22 | 1 | -24/+68 |
* | Basic protocol message flow for session tickets | lloyd | 2012-03-20 | 1 | -0/+1 |
* | Add an abstraction for reading handshake messages (as DTLS handles it | lloyd | 2012-03-05 | 1 | -9/+9 |
* | We would call the handshake callback twice on session resumption: | lloyd | 2012-02-28 | 1 | -20/+19 |
* | Actually check CA signatures in Credentials_Manager. This area needs a | lloyd | 2012-02-01 | 1 | -1/+1 |
* | Support getting ciphersuites by name as well as suite ID | lloyd | 2012-01-28 | 1 | -2/+2 |