aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls
Commit message (Expand)AuthorAgeFilesLines
* In the in-memory session manager, choose a random key at startup andlloyd2012-08-053-10/+28
* Remove Channel::read_handshake. Have the server set expected next msglloyd2012-08-054-43/+15
* If we're negotiating a datagram protocol, allow a hello verifylloyd2012-08-031-2/+20
* Take the initial record version from the Handshake_IO instance insteadlloyd2012-08-035-3/+24
* Add Handshake_Hash::resetlloyd2012-08-033-3/+24
* Add preliminary IO handler for datagram handshakes. Does not fragmentlloyd2012-08-032-0/+184
* Rename all the message source files to msg_lloyd2012-08-0311-10/+10
* Combine Handshake_Writer and Handshake_Reader into Handshake_IO.lloyd2012-08-0320-245/+170
* Move the code that pretends a CCS message is a handshake message fromlloyd2012-08-023-40/+32
* Use TLS v1.0 PRF unless the version supports a ciphersuite specific PRFlloyd2012-08-021-4/+5
* Add TLS::Protocol_Version::supports_ciphersuite_specific_prflloyd2012-08-024-14/+16
* Fix DTLS HelloVerify message decodinglloyd2012-08-021-3/+12
* Rename activate to more descriptive change_cipher_speclloyd2012-07-295-28/+41
* Use unique_ptr for handshake state, avoid lots of delete+nullptr assignlloyd2012-07-294-48/+43
* If we're going to reject an insecure renegotiation, do it immediately,lloyd2012-07-293-41/+63
* Helper func for loading 24 bit valuelloyd2012-07-281-8/+15
* Pass protocol to initiate_handshakelloyd2012-07-282-5/+7
* Combine client initial handshake and renegotiation in initiate_handshake.lloyd2012-07-282-55/+39
* Fix DTLS version string.lloyd2012-07-285-15/+27
* Make Handshake_Writer non-copyablelloyd2012-07-281-0/+6
* Add format() hook to Handshake_Writer, so that Handshake_Hash does notlloyd2012-07-286-39/+34
* Add helper for writing 24-bit integerlloyd2012-07-161-2/+12
* Add a class that handles writing handshake messages instead of pushinglloyd2012-07-1624-166/+248
* Hook creating just the handshake reader vs the entire statelloyd2012-07-126-12/+12
* Add an optional parameter to TLS::Client specifying the port number.lloyd2012-07-126-35/+62
* Changes to version handling in support of DTLS work.lloyd2012-07-1216-78/+114
* Add deleted copy constructors/assignment operators where appropriate.lloyd2012-07-102-0/+7
* Add TLS::Channel::new_handshake_state which abstracts creating thelloyd2012-07-096-11/+27
* The messages for assertion checks were done both ways, both "assertionlloyd2012-07-093-5/+5
* Doxygen commentslloyd2012-07-065-6/+109
* Correct Doxygen commentslloyd2012-07-062-5/+5
* Record_Writer needs a PRNG for the IV generation. Share the referencelloyd2012-07-056-16/+22
* Pull the TLS padding checks out to an anon function.lloyd2012-07-051-32/+59
* Split TLS::Policy::allowed_hashes into allowed_signature_hashes andlloyd2012-06-298-29/+41
* Add TLS::Session_Manager_Noop which just ignores all save requests.lloyd2012-06-294-14/+39
* Add TLS::Policy::minimum_dh_group_size, default 1024. Send anlloyd2012-06-255-2/+30
* Make TLS::Channel::send non-virtual as neither Client nor Serverlloyd2012-06-189-21/+58
* Commented out entry for anon in default policy:lloyd2012-06-171-0/+1
* We would never negotiate anon DH/ECDH even if policy allowed it andlloyd2012-06-171-1/+1
* Profiling with valgrind shows that the 2**16 iteration for findinglloyd2012-06-145-116/+139
* We would fail in the case where we connected to a server that did notlloyd2012-06-131-1/+1
* Update what() signature on exception typeslloyd2012-06-121-1/+1
* Generate new session IDs in the same format as hello randoms, with thelloyd2012-06-102-3/+3
* Add Handshake_Type codes for RFC 6066 handshake types.lloyd2012-06-102-19/+27
* A fix for bug 191, that we were not preventing resumption of sessions in thelloyd2012-06-096-63/+85
* Avoid a spurious unrecognized_name alert when a server is running inlloyd2012-06-091-1/+10
* m_ namespace Channel, Client, and Server.lloyd2012-06-096-378/+378
* Use initialize lists here, much cleanerlloyd2012-06-091-53/+44
* A fix for bug 192. First, when renegotiating in the client, attempt tolloyd2012-06-0911-72/+99
* Make a proper wrapper in util for SQLite3, update the TLS sessionlloyd2012-06-083-167/+33