aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls/tls_server.cpp
Commit message (Expand)AuthorAgeFilesLines
* Hoist m_rng to Channellloyd2012-09-061-1/+0
* Use a std::function so handshake_io only has access Record_Writer'slloyd2012-09-041-1/+6
* Make the CCS message a Handshake_Msg and send it through the handshakelloyd2012-08-101-2/+2
* Expose Handshake_Message as an API type.lloyd2012-08-061-0/+2
* Move server-specific parts of the handshake state to a server subclass.lloyd2012-08-061-5/+23
* Make the handshake hash privatelloyd2012-08-061-14/+14
* Make handshake session keys private with get/setlloyd2012-08-061-9/+6
* Make the handshake Ciphersuite only available by const reference.lloyd2012-08-061-10/+6
* Have all the TLS handshake messages stored in unique_ptrs with onlylloyd2012-08-061-114/+132
* Remove Channel::read_handshake. Have the server set expected next msglloyd2012-08-051-18/+4
* Combine Handshake_Writer and Handshake_Reader into Handshake_IO.lloyd2012-08-031-19/+18
* Rename activate to more descriptive change_cipher_speclloyd2012-07-291-6/+12
* Use unique_ptr for handshake state, avoid lots of delete+nullptr assignlloyd2012-07-291-19/+22
* If we're going to reject an insecure renegotiation, do it immediately,lloyd2012-07-291-41/+45
* Fix DTLS version string.lloyd2012-07-281-4/+13
* Add format() hook to Handshake_Writer, so that Handshake_Hash does notlloyd2012-07-281-3/+3
* Add a class that handles writing handshake messages instead of pushinglloyd2012-07-161-24/+45
* Hook creating just the handshake reader vs the entire statelloyd2012-07-121-4/+4
* Changes to version handling in support of DTLS work.lloyd2012-07-121-8/+13
* Add TLS::Channel::new_handshake_state which abstracts creating thelloyd2012-07-091-2/+7
* Record_Writer needs a PRNG for the IV generation. Share the referencelloyd2012-07-051-1/+1
* We would never negotiate anon DH/ECDH even if policy allowed it andlloyd2012-06-171-1/+1
* Generate new session IDs in the same format as hello randoms, with thelloyd2012-06-101-1/+1
* A fix for bug 191, that we were not preventing resumption of sessions in thelloyd2012-06-091-37/+39
* Avoid a spurious unrecognized_name alert when a server is running inlloyd2012-06-091-1/+10
* m_ namespace Channel, Client, and Server.lloyd2012-06-091-143/+143
* A fix for bug 192. First, when renegotiating in the client, attempt tolloyd2012-06-091-3/+35
* Invert the policy setting as I think it makes it more obvious thatlloyd2012-06-081-1/+1
* Cleanup, m_ namespace Secure_Renegotiation_Statelloyd2012-06-071-3/+2
* Clients sending a SSLv2 hello would cause an internal failure becauselloyd2012-06-071-0/+10
* Replace 0 and NULL pointer constants with nullptr. Also fix an oldlloyd2012-05-181-5/+5
* Fairly huge update that replaces the old secmem types with std::vectorlloyd2012-05-181-6/+6
* Huge pile of post merge fixups, mtn really fucked that mergelloyd2012-04-251-6/+6
* Add a bool param to renegotiate on if we should force a fulllloyd2012-04-181-7/+12
* The secure renegotiation state was not updated on a sessionlloyd2012-04-181-9/+7
* As best I can tell the client is allowed to send a certificate chainlloyd2012-04-161-5/+0
* Add support for TLS heartbeats (RFC 6520). Heartbeat initiations fromlloyd2012-04-161-0/+5
* Finish up server side SRP support, a little ugly but it works.lloyd2012-04-061-3/+22
* Remove Policy::choose_compression and move to tls_serverlloyd2012-04-041-2/+19
* Limit the lifetime of tickets to Policy::session_ticket_lifetime()lloyd2012-04-041-22/+60
* Revert the session_ticket callback in credentials manager. If a PSKlloyd2012-03-231-38/+29
* Add a special hook in credentials manager for the session ticket key,lloyd2012-03-231-17/+33
* Only claim we support session tickets if we actually have a key oflloyd2012-03-231-3/+10
* Call Credentials_Manager::psk for the session ticket key.lloyd2012-03-221-11/+24
* Server side handling of session tickets, though currently with alloyd2012-03-221-24/+68
* Basic protocol message flow for session ticketslloyd2012-03-201-0/+1
* Add an abstraction for reading handshake messages (as DTLS handles itlloyd2012-03-051-9/+9
* We would call the handshake callback twice on session resumption:lloyd2012-02-281-20/+19
* Actually check CA signatures in Credentials_Manager. This area needs alloyd2012-02-011-1/+1
* Support getting ciphersuites by name as well as suite IDlloyd2012-01-281-2/+2