aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls
Commit message (Expand)AuthorAgeFilesLines
* Read ECDH client key exchange messageslloyd2012-01-241-25/+26
* Working ECDH key exchange. Only tested on client side but seems goodlloyd2012-01-243-37/+95
* Cleanuplloyd2012-01-241-10/+10
* Expose the named curve ID/string conversion functions, needed for server key ...lloyd2012-01-242-9/+8
* Convert Internal_Error exceptions into the cooresponding alert.lloyd2012-01-242-4/+7
* Don't assume the server key exchange consists of a series of BigInts.lloyd2012-01-243-31/+25
* Add comments for the Policy class. Make the allowed_* calls virtual solloyd2012-01-241-16/+42
* PEM encoding. Fix BER decoding. Encode the entire cert chain in thelloyd2012-01-242-23/+68
* The credentials manager interface seems a much better place for certlloyd2012-01-233-15/+20
* Add Ciphersuite::to_stringlloyd2012-01-235-20/+87
* Make the version number a proper class, makes many things much easierlloyd2012-01-2326-168/+304
* Since this branch is hugely API breaking already, go ahead and putlloyd2012-01-2338-277/+429
* Remove the key() method on server key exchange - instead leave it tolloyd2012-01-233-21/+18
* Have the client key exchange examine the server key exchange messagelloyd2012-01-236-52/+59
* Basic outline of the supported curves extension from RFC 4492lloyd2012-01-222-14/+167
* Reorder for readabilitylloyd2012-01-221-46/+48
* When generating a signature in TLS 1.2, respect the request of thelloyd2012-01-208-57/+73
* Missing a spacelloyd2012-01-201-1/+1
* A change to Finished in 687c3c7dccdd2f5e4825bdb60155c7bfba22339f brokelloyd2012-01-201-3/+5
* Ignore ECDH suites in replyinglloyd2012-01-201-0/+3
* Fix decoding of signature_algorithms if we say something we don't recognizelloyd2012-01-201-4/+4
* Strangely you can negotiate using only MD5 in TLS 1.2. Just ignore itlloyd2012-01-201-5/+2
* Instead of using a hardcoded value for signature_algothms, go withlloyd2012-01-207-20/+32
* New policy methods. User provides lists of ciphers, hashes, etc theylloyd2012-01-205-144/+231
* Convert to using a switch statement here. It's faster, and offerslloyd2012-01-201-83/+88
* If the client sent something > TLS 1.2, we sould respond as TLS 1.1lloyd2012-01-201-16/+10
* Somewhat contorted, but fixes the issue with sending hash/sig ids withlloyd2012-01-205-18/+40
* TLS_Ciphersuite_Algos was just a strange level of indirection betweenlloyd2012-01-2017-506/+250
* Basic processing for signature_algorithms extension in client hellolloyd2012-01-202-1/+35
* Initialize values once in constructor instead of in each branchlloyd2012-01-202-14/+13
* Many fixes for TLS 1.2 though some things in particular client authlloyd2012-01-2013-150/+251
* Various and sundry bug fixeslloyd2012-01-199-11/+31
* Add the AES/SHA-256 suites to the standard lists. Works under TLS 1.2lloyd2012-01-191-0/+13
* Kinda maybe working TLS 1.2 for clients. Not well tested at all, but alloyd2012-01-1919-85/+163
* Remove Handshake_Message::deserialize which was an unnecessary hook.lloyd2012-01-1910-153/+132
* I'm not sure if I like this asthetically, but passing around thelloyd2012-01-1915-311/+219
* Fix RSA client cert verification for SSLv3lloyd2012-01-191-3/+14
* Support SSLv3 client auth on the client side.lloyd2012-01-196-15/+53
* Also fix encodinglloyd2012-01-191-4/+5
* Fix decoding of certificate request messagelloyd2012-01-191-5/+14
* Read only support for signature_algorithms extension used in TLS 1.2lloyd2012-01-185-54/+239
* The leading zeros of a DH pre master secret are supposed to belloyd2012-01-181-2/+23
* Rename queue_for_sending just sendlloyd2012-01-162-4/+4
* Change TLS feature macro, major API changes. Start documentinglloyd2012-01-161-2/+2
* Kill stray charlloyd2012-01-101-1/+1
* If we send the close notify alert, don't reset the reader because thelloyd2012-01-084-20/+30
* In the reader preallocate the buffer that we'll store the computed MAClloyd2012-01-062-21/+22
* The server would incorrectly send a server key exchange message when alloyd2012-01-067-90/+85
* Remove the version getter in TLS_Channel - caller should use thelloyd2012-01-065-61/+31
* Cleanupslloyd2012-01-051-17/+10