aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls
Commit message (Expand)AuthorAgeFilesLines
* Add helper for writing 24-bit integerlloyd2012-07-161-2/+12
* Add a class that handles writing handshake messages instead of pushinglloyd2012-07-1624-166/+248
* Hook creating just the handshake reader vs the entire statelloyd2012-07-126-12/+12
* Add an optional parameter to TLS::Client specifying the port number.lloyd2012-07-126-35/+62
* Changes to version handling in support of DTLS work.lloyd2012-07-1216-78/+114
* Add deleted copy constructors/assignment operators where appropriate.lloyd2012-07-102-0/+7
* Add TLS::Channel::new_handshake_state which abstracts creating thelloyd2012-07-096-11/+27
* The messages for assertion checks were done both ways, both "assertionlloyd2012-07-093-5/+5
* Doxygen commentslloyd2012-07-065-6/+109
* Correct Doxygen commentslloyd2012-07-062-5/+5
* Record_Writer needs a PRNG for the IV generation. Share the referencelloyd2012-07-056-16/+22
* Pull the TLS padding checks out to an anon function.lloyd2012-07-051-32/+59
* Split TLS::Policy::allowed_hashes into allowed_signature_hashes andlloyd2012-06-298-29/+41
* Add TLS::Session_Manager_Noop which just ignores all save requests.lloyd2012-06-294-14/+39
* Add TLS::Policy::minimum_dh_group_size, default 1024. Send anlloyd2012-06-255-2/+30
* Make TLS::Channel::send non-virtual as neither Client nor Serverlloyd2012-06-189-21/+58
* Commented out entry for anon in default policy:lloyd2012-06-171-0/+1
* We would never negotiate anon DH/ECDH even if policy allowed it andlloyd2012-06-171-1/+1
* Profiling with valgrind shows that the 2**16 iteration for findinglloyd2012-06-145-116/+139
* We would fail in the case where we connected to a server that did notlloyd2012-06-131-1/+1
* Update what() signature on exception typeslloyd2012-06-121-1/+1
* Generate new session IDs in the same format as hello randoms, with thelloyd2012-06-102-3/+3
* Add Handshake_Type codes for RFC 6066 handshake types.lloyd2012-06-102-19/+27
* A fix for bug 191, that we were not preventing resumption of sessions in thelloyd2012-06-096-63/+85
* Avoid a spurious unrecognized_name alert when a server is running inlloyd2012-06-091-1/+10
* m_ namespace Channel, Client, and Server.lloyd2012-06-096-378/+378
* Use initialize lists here, much cleanerlloyd2012-06-091-53/+44
* A fix for bug 192. First, when renegotiating in the client, attempt tolloyd2012-06-0911-72/+99
* Make a proper wrapper in util for SQLite3, update the TLS sessionlloyd2012-06-083-167/+33
* Invert the policy setting as I think it makes it more obvious thatlloyd2012-06-083-7/+7
* Update cms, cvc, zlib, bzip2, openssl, and gnump modules for the newlloyd2012-06-071-2/+2
* Report what we have already received on an unexpected statelloyd2012-06-073-9/+11
* Cleanup, m_ namespace Secure_Renegotiation_Statelloyd2012-06-073-26/+28
* Clients sending a SSLv2 hello would cause an internal failure becauselloyd2012-06-072-2/+25
* Fix for DHE, strip_leading_zeros always took off the last bytelloyd2012-06-061-1/+1
* Add assert_done checks here to help avoid interesting substitutionlloyd2012-06-052-0/+4
* Use std::deque instead of SecureQueue in TLS::Stream_Handshake_Readerlloyd2012-05-263-16/+18
* propagate from branch 'net.randombit.botan.x509-path-validation' (head 63b5a2...lloyd2012-05-251-1/+1
* Replace 0 and NULL pointer constants with nullptr. Also fix an oldlloyd2012-05-1811-41/+41
* Fairly huge update that replaces the old secmem types with std::vectorlloyd2012-05-1841-302/+299
* Huge pile of post merge fixups, mtn really fucked that mergelloyd2012-04-2525-153/+112
* propagate from branch 'net.randombit.botan.tls-state-machine' (head a4741cd07...lloyd2012-04-2536-788/+1264
|\
| * Camellia is now split by key lengthlloyd2012-04-241-26/+26
| * Compile fixlloyd2012-04-201-1/+1
| * Put the implementation of Policy::dh_group in source so it's easier tolloyd2012-04-192-1/+6
| * Various dependency/amalgamation fixeslloyd2012-04-194-6/+8
| * Add a bool param to renegotiate on if we should force a fulllloyd2012-04-189-28/+71
| * Send almost all of the extensions on a renegotiation on an existinglloyd2012-04-181-14/+12
| * The secure renegotiation state was not updated on a sessionlloyd2012-04-181-9/+7
| * As best I can tell the client is allowed to send a certificate chainlloyd2012-04-161-5/+0