aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls
Commit message (Expand)AuthorAgeFilesLines
* Store the maximum fragment value instead of the code, convert to thelloyd2012-11-072-37/+31
* Remove Channel::m_connection_closed, instead deriving it from other statelloyd2012-11-072-8/+11
* Pass read_record a callback mapping epoch to cipher state so it canlloyd2012-11-064-53/+38
* Add Channel::pending_state and Channel::active_state, use where possiblelloyd2012-11-062-73/+84
* Store cipher states in Channel instead of Handshake_State. Keep alllloyd2012-11-067-66/+145
* Split asn1_obj.h into asn1_alt_name.h, asn1_attribute.h, andlloyd2012-11-061-0/+6
* Move Channel::is_{active,closed} to source filelloyd2012-11-012-2/+12
* Add TLS::Policy::negotiate_heartbeat_support which controls if thelloyd2012-10-135-3/+20
* Remove TLS::Policy::pref_version. Instead pass the version to offer tolloyd2012-10-135-15/+19
* Add TLS::Server_Information to encapsulate the hostname/port pair.lloyd2012-10-1313-103/+179
* Generate the fake pre master needed if the RSA computation fails aheadlloyd2012-10-021-4/+16
* Missing return valuelloyd2012-09-191-0/+1
* Inline Channel::{read,write}_cipher_state, only one caller eachlloyd2012-09-142-24/+11
* Expose to public in TLS::Channel peer_supports_heartbeats,lloyd2012-09-131-6/+16
* Store the cipher states in the handshake state object as shared_ptrs.lloyd2012-09-134-43/+94
* Update creators of Session to new constructorlloyd2012-09-122-2/+0
* It seems other implementations define the secure renegotiation flag tolloyd2012-09-123-16/+3
* A quite different approach to extension handling, store both inboundlloyd2012-09-128-282/+233
* Spellinglloyd2012-09-126-18/+17
* Duplicated extension checks!lloyd2012-09-121-12/+0
* Remove Channel::m_secure_renegotiation, instead derive from current state.lloyd2012-09-122-46/+23
* CBC overwrote (encrypted) the following block in write_record. Illoyd2012-09-121-1/+4
* Formattinglloyd2012-09-111-2/+2
* Clean up the handling of close notify alerts a bit. Also returnlloyd2012-09-111-6/+7
* Typolloyd2012-09-111-1/+1
* Add helper functionlloyd2012-09-112-7/+8
* Set m_readbuf_pos == m_readbuf.size(), resizing the vector as neededlloyd2012-09-115-34/+21
* The write buffer is cleared and rewritten by write_record, so we don'tlloyd2012-09-112-6/+5
* Pass the record sequence # up to Channellloyd2012-09-113-12/+13
* Move the record type checks up to Channel as besides that the recordlloyd2012-09-113-41/+22
* No reason to pass a u16bit by referencelloyd2012-09-102-2/+2
* New logic for DTLS replay detection. Abstracts the sequence handlinglloyd2012-09-106-30/+168
* Consider DTLS v1.0 and v1.2 knownlloyd2012-09-091-2/+3
* Expect a cookie field in a DTLS client hellolloyd2012-09-091-0/+3
* Rename functionlloyd2012-09-092-16/+16
* Remove redundant Channel::m_current_versionlloyd2012-09-094-30/+30
* Create the IO in Channel and then pass it down to new_handshake_statelloyd2012-09-097-37/+39
* Store the is-SSLv3 flag in the cipher state as the difference is onlylloyd2012-09-092-22/+19
* Clean up includeslloyd2012-09-094-6/+5
* Also hide Channel::m_handshake_fnlloyd2012-09-093-5/+5
* Hide Channel::m_rng and Channel::m_session_manager, add getterslloyd2012-09-094-23/+28
* Small cleanuplloyd2012-09-081-1/+5
* Only accept a hello request if an active state currently exists.lloyd2012-09-071-4/+2
* Per Google's spec the client is not supposed to include a NPNlloyd2012-09-071-0/+4
* Add support for key material exportlloyd2012-09-072-0/+44
* Remove Channel::m_peer_certs, instead retrieve directly from the state.lloyd2012-09-076-12/+45
* Avoid another instance of pulling the key out of the certificatelloyd2012-09-073-9/+7
* Just dynamic_cast once at the start of process_handshake_msglloyd2012-09-072-21/+20
* Save the peer public key in the handshake state instead of pulling itlloyd2012-09-076-16/+29
* Take version from pending state for creating cipher speclloyd2012-09-071-3/+3