aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls/tls_server.cpp
Commit message (Expand)AuthorAgeFilesLines
* Revert the session_ticket callback in credentials manager. If a PSKlloyd2012-03-231-38/+29
* Add a special hook in credentials manager for the session ticket key,lloyd2012-03-231-17/+33
* Only claim we support session tickets if we actually have a key oflloyd2012-03-231-3/+10
* Call Credentials_Manager::psk for the session ticket key.lloyd2012-03-221-11/+24
* Server side handling of session tickets, though currently with alloyd2012-03-221-24/+68
* Basic protocol message flow for session ticketslloyd2012-03-201-0/+1
* Add an abstraction for reading handshake messages (as DTLS handles itlloyd2012-03-051-9/+9
* We would call the handshake callback twice on session resumption:lloyd2012-02-281-20/+19
* Actually check CA signatures in Credentials_Manager. This area needs alloyd2012-02-011-1/+1
* Support getting ciphersuites by name as well as suite IDlloyd2012-01-281-2/+2
* Server side PSKlloyd2012-01-271-7/+4
* Somewhat cleaner PSK handlinglloyd2012-01-271-2/+2
* Server side PSK kexlloyd2012-01-271-3/+2
* First attempt to get certificates matching the name the client sent inlloyd2012-01-271-3/+27
* Change callback interface to pass the Alert object itself insteadlloyd2012-01-261-3/+3
* Make Alert a first class object ala Version. Move the alert codes intolloyd2012-01-261-7/+7
* Deleting the return of private_key_for in the TLS server forces thelloyd2012-01-261-7/+9
* Move around the order of arguments to activate() and add thelloyd2012-01-251-3/+6
* In earlier versions, key exchange == "RSA" meant export-stylelloyd2012-01-251-2/+2
* Move all key exchange mechanism code (eg DH/ECDH/SRP) out of thelloyd2012-01-251-37/+16
* Fix printing PSK ciphersuites. Better assert msg.lloyd2012-01-251-1/+2
* Go back to choosing the ciphersuite based on the server's preferences.lloyd2012-01-251-0/+3
* We can now actually handle multiple certificate types in the serverlloyd2012-01-241-17/+31
* Send the supported elliptic curves extension. Instead of hardcodinglloyd2012-01-241-1/+12
* Forgot to check in server side ECDH key genlloyd2012-01-241-3/+11
* The credentials manager interface seems a much better place for certlloyd2012-01-231-2/+10
* Add Ciphersuite::to_stringlloyd2012-01-231-2/+2
* Make the version number a proper class, makes many things much easierlloyd2012-01-231-11/+11
* Since this branch is hugely API breaking already, go ahead and putlloyd2012-01-231-19/+23
* Instead of using a hardcoded value for signature_algothms, go withlloyd2012-01-201-0/+1
* New policy methods. User provides lists of ciphers, hashes, etc theylloyd2012-01-201-7/+4
* If the client sent something > TLS 1.2, we sould respond as TLS 1.1lloyd2012-01-201-16/+10
* Somewhat contorted, but fixes the issue with sending hash/sig ids withlloyd2012-01-201-2/+3
* TLS_Ciphersuite_Algos was just a strange level of indirection betweenlloyd2012-01-201-5/+5
* Many fixes for TLS 1.2 though some things in particular client authlloyd2012-01-201-3/+7
* Various and sundry bug fixeslloyd2012-01-191-1/+1
* I'm not sure if I like this asthetically, but passing around thelloyd2012-01-191-27/+10
* The server would incorrectly send a server key exchange message when alloyd2012-01-061-19/+13
* If the maximum fragment extension was negotiated, enforce it. Alsolloyd2012-01-051-0/+6
* Add a hook in TLS_Channel that is called when an alert is received.lloyd2012-01-041-0/+12
* As someone pointed out on the TLS list, NPN isn't really a negotiationlloyd2012-01-041-3/+3
* Split hello.cpp into c_hello.cpp and s_hello.cpplloyd2012-01-041-17/+32
* If the handshake_fn returns false explicitly remove the session fromlloyd2012-01-031-0/+2
* Make handshake completion function non-optional. Now returns a boollloyd2012-01-031-9/+5
* Add Credentials_Manager which is an interface to something that knowslloyd2012-01-031-19/+17
* Add support for client-side session resumptionlloyd2011-12-311-19/+23
* Better names on the session manager. Plausible client lookup support,lloyd2011-12-301-1/+1
* Rename the session type to 'TLS_Session'. Split the manager out intolloyd2011-12-301-5/+5
* Add a function for getting the version number of an active connection.lloyd2011-12-301-9/+14
* Add support for the maximum fragment length extension. No hooks for itlloyd2011-12-301-0/+9