aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls
Commit message (Expand)AuthorAgeFilesLines
* Hoist m_rng to Channellloyd2012-09-066-4/+2
* Move record reading also to a stand alone functionlloyd2012-09-063-268/+315
* Move the actual creation of new TLS records to TLS::write_record whichlloyd2012-09-063-116/+142
* Use it for the reader as welllloyd2012-09-062-97/+47
* Move record cipher state to its own class. Currently write side only.lloyd2012-09-064-102/+162
* Do record decryption in placelloyd2012-09-053-32/+55
* Avoid Pipe in Record_Writer, refactoring to move the record I/O up to Channellloyd2012-09-042-40/+59
* Distinguish read and write specific objectslloyd2012-09-043-65/+65
* Remove Record_Writer::send_alert. Move Alert serialization to Alert::serializelloyd2012-09-046-29/+31
* Rename m_writer to m_send_hslloyd2012-09-042-15/+15
* Use a std::function so handshake_io only has access Record_Writer'slloyd2012-09-047-23/+35
* Require servers to send us a session ticket message if they sent alloyd2012-08-141-3/+2
* Missing constantlloyd2012-08-131-0/+2
* Working fragmentation. Initial start at flight tracking.lloyd2012-08-102-14/+63
* Hooks for DTLS fragmentationlloyd2012-08-102-12/+32
* Make the CCS message a Handshake_Msg and send it through the handshakelloyd2012-08-105-12/+31
* Const arg of Handshake_IO::sendlloyd2012-08-102-5/+5
* Instead of using static salts in the KDF for generating the cipher andlloyd2012-08-091-7/+22
* Lame but usable DTLS defragmentationlloyd2012-08-092-7/+15
* We weren't handling DTLS handshake fragments at all. Now reject themlloyd2012-08-082-24/+35
* Clean up DTLS handshake formattinglloyd2012-08-082-19/+21
* Make Handshake_IO::format constlloyd2012-08-082-5/+5
* Fix DTLS handshake encoding. Handle multiple messages in a packet.lloyd2012-08-082-31/+72
* DTLS needs some help with ChangeCipherSpec because it is not includedlloyd2012-08-085-11/+51
* Move check of plaintext size to after MAC check. Use assign instead oflloyd2012-08-071-8/+8
* Remove Handshake_IO::have_full_record and Handshake_IO::emptylloyd2012-08-073-50/+14
* This was in an awkward placelloyd2012-08-071-2/+1
* Track the sequence number and return it from the record reader. Takelloyd2012-08-075-15/+33
* Wrap lineslloyd2012-08-062-2/+7
* Fix parenslloyd2012-08-061-1/+1
* Add a Policy item for if a client will accept a server-initiatedlloyd2012-08-062-1/+7
* Expose Handshake_Message as an API type.lloyd2012-08-069-66/+117
* Don't need to make these privatelloyd2012-08-061-5/+3
* The client wasn't sending a next protocol message on a sessionlloyd2012-08-061-0/+11
* A heartbeat request send by the counterparty during a handshake wouldlloyd2012-08-061-5/+8
* Move server-specific parts of the handshake state to a server subclass.lloyd2012-08-064-21/+29
* Move things that are client specific in the handshake state to alloyd2012-08-062-16/+28
* Make the handshake hash privatelloyd2012-08-067-33/+36
* Make handshake session keys private with get/setlloyd2012-08-066-24/+33
* Make the handshake Ciphersuite only available by const reference.lloyd2012-08-068-36/+35
* Const Handshake_State args where possiblelloyd2012-08-063-5/+5
* Move Certificate message to it's own file.lloyd2012-08-064-68/+89
* Use unique_ptr in Server_Kex_Exchange and Extensionslloyd2012-08-064-37/+19
* Store record MAC objects in unique_ptrlloyd2012-08-063-21/+12
* Have all the TLS handshake messages stored in unique_ptrs with onlylloyd2012-08-0615-294/+436
* m_ namespace remaining TLS messageslloyd2012-08-065-78/+78
* In the in-memory session manager, choose a random key at startup andlloyd2012-08-053-10/+28
* Remove Channel::read_handshake. Have the server set expected next msglloyd2012-08-054-43/+15
* If we're negotiating a datagram protocol, allow a hello verifylloyd2012-08-031-2/+20
* Take the initial record version from the Handshake_IO instance insteadlloyd2012-08-035-3/+24