index
:
botan.git
master
Unnamed repository; edit this file 'description' to name the repository.
about
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
src
/
tls
Commit message (
Expand
)
Author
Age
Files
Lines
*
Make handshake session keys private with get/set
lloyd
2012-08-06
6
-24
/
+33
*
Make the handshake Ciphersuite only available by const reference.
lloyd
2012-08-06
8
-36
/
+35
*
Const Handshake_State args where possible
lloyd
2012-08-06
3
-5
/
+5
*
Move Certificate message to it's own file.
lloyd
2012-08-06
4
-68
/
+89
*
Use unique_ptr in Server_Kex_Exchange and Extensions
lloyd
2012-08-06
4
-37
/
+19
*
Store record MAC objects in unique_ptr
lloyd
2012-08-06
3
-21
/
+12
*
Have all the TLS handshake messages stored in unique_ptrs with only
lloyd
2012-08-06
15
-294
/
+436
*
m_ namespace remaining TLS messages
lloyd
2012-08-06
5
-78
/
+78
*
In the in-memory session manager, choose a random key at startup and
lloyd
2012-08-05
3
-10
/
+28
*
Remove Channel::read_handshake. Have the server set expected next msg
lloyd
2012-08-05
4
-43
/
+15
*
If we're negotiating a datagram protocol, allow a hello verify
lloyd
2012-08-03
1
-2
/
+20
*
Take the initial record version from the Handshake_IO instance instead
lloyd
2012-08-03
5
-3
/
+24
*
Add Handshake_Hash::reset
lloyd
2012-08-03
3
-3
/
+24
*
Add preliminary IO handler for datagram handshakes. Does not fragment
lloyd
2012-08-03
2
-0
/
+184
*
Rename all the message source files to msg_
lloyd
2012-08-03
11
-10
/
+10
*
Combine Handshake_Writer and Handshake_Reader into Handshake_IO.
lloyd
2012-08-03
20
-245
/
+170
*
Move the code that pretends a CCS message is a handshake message from
lloyd
2012-08-02
3
-40
/
+32
*
Use TLS v1.0 PRF unless the version supports a ciphersuite specific PRF
lloyd
2012-08-02
1
-4
/
+5
*
Add TLS::Protocol_Version::supports_ciphersuite_specific_prf
lloyd
2012-08-02
4
-14
/
+16
*
Fix DTLS HelloVerify message decoding
lloyd
2012-08-02
1
-3
/
+12
*
Rename activate to more descriptive change_cipher_spec
lloyd
2012-07-29
5
-28
/
+41
*
Use unique_ptr for handshake state, avoid lots of delete+nullptr assign
lloyd
2012-07-29
4
-48
/
+43
*
If we're going to reject an insecure renegotiation, do it immediately,
lloyd
2012-07-29
3
-41
/
+63
*
Helper func for loading 24 bit value
lloyd
2012-07-28
1
-8
/
+15
*
Pass protocol to initiate_handshake
lloyd
2012-07-28
2
-5
/
+7
*
Combine client initial handshake and renegotiation in initiate_handshake.
lloyd
2012-07-28
2
-55
/
+39
*
Fix DTLS version string.
lloyd
2012-07-28
5
-15
/
+27
*
Make Handshake_Writer non-copyable
lloyd
2012-07-28
1
-0
/
+6
*
Add format() hook to Handshake_Writer, so that Handshake_Hash does not
lloyd
2012-07-28
6
-39
/
+34
*
Add helper for writing 24-bit integer
lloyd
2012-07-16
1
-2
/
+12
*
Add a class that handles writing handshake messages instead of pushing
lloyd
2012-07-16
24
-166
/
+248
*
Hook creating just the handshake reader vs the entire state
lloyd
2012-07-12
6
-12
/
+12
*
Add an optional parameter to TLS::Client specifying the port number.
lloyd
2012-07-12
6
-35
/
+62
*
Changes to version handling in support of DTLS work.
lloyd
2012-07-12
16
-78
/
+114
*
Add deleted copy constructors/assignment operators where appropriate.
lloyd
2012-07-10
2
-0
/
+7
*
Add TLS::Channel::new_handshake_state which abstracts creating the
lloyd
2012-07-09
6
-11
/
+27
*
The messages for assertion checks were done both ways, both "assertion
lloyd
2012-07-09
3
-5
/
+5
*
Doxygen comments
lloyd
2012-07-06
5
-6
/
+109
*
Correct Doxygen comments
lloyd
2012-07-06
2
-5
/
+5
*
Record_Writer needs a PRNG for the IV generation. Share the reference
lloyd
2012-07-05
6
-16
/
+22
*
Pull the TLS padding checks out to an anon function.
lloyd
2012-07-05
1
-32
/
+59
*
Split TLS::Policy::allowed_hashes into allowed_signature_hashes and
lloyd
2012-06-29
8
-29
/
+41
*
Add TLS::Session_Manager_Noop which just ignores all save requests.
lloyd
2012-06-29
4
-14
/
+39
*
Add TLS::Policy::minimum_dh_group_size, default 1024. Send an
lloyd
2012-06-25
5
-2
/
+30
*
Make TLS::Channel::send non-virtual as neither Client nor Server
lloyd
2012-06-18
9
-21
/
+58
*
Commented out entry for anon in default policy:
lloyd
2012-06-17
1
-0
/
+1
*
We would never negotiate anon DH/ECDH even if policy allowed it and
lloyd
2012-06-17
1
-1
/
+1
*
Profiling with valgrind shows that the 2**16 iteration for finding
lloyd
2012-06-14
5
-116
/
+139
*
We would fail in the case where we connected to a server that did not
lloyd
2012-06-13
1
-1
/
+1
*
Update what() signature on exception types
lloyd
2012-06-12
1
-1
/
+1
[next]