index
:
botan.git
master
Unnamed repository; edit this file 'description' to name the repository.
about
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
src
/
tls
Commit message (
Expand
)
Author
Age
Files
Lines
*
Hoist m_rng to Channel
lloyd
2012-09-06
6
-4
/
+2
*
Move record reading also to a stand alone function
lloyd
2012-09-06
3
-268
/
+315
*
Move the actual creation of new TLS records to TLS::write_record which
lloyd
2012-09-06
3
-116
/
+142
*
Use it for the reader as well
lloyd
2012-09-06
2
-97
/
+47
*
Move record cipher state to its own class. Currently write side only.
lloyd
2012-09-06
4
-102
/
+162
*
Do record decryption in place
lloyd
2012-09-05
3
-32
/
+55
*
Avoid Pipe in Record_Writer, refactoring to move the record I/O up to Channel
lloyd
2012-09-04
2
-40
/
+59
*
Distinguish read and write specific objects
lloyd
2012-09-04
3
-65
/
+65
*
Remove Record_Writer::send_alert. Move Alert serialization to Alert::serialize
lloyd
2012-09-04
6
-29
/
+31
*
Rename m_writer to m_send_hs
lloyd
2012-09-04
2
-15
/
+15
*
Use a std::function so handshake_io only has access Record_Writer's
lloyd
2012-09-04
7
-23
/
+35
*
Require servers to send us a session ticket message if they sent a
lloyd
2012-08-14
1
-3
/
+2
*
Missing constant
lloyd
2012-08-13
1
-0
/
+2
*
Working fragmentation. Initial start at flight tracking.
lloyd
2012-08-10
2
-14
/
+63
*
Hooks for DTLS fragmentation
lloyd
2012-08-10
2
-12
/
+32
*
Make the CCS message a Handshake_Msg and send it through the handshake
lloyd
2012-08-10
5
-12
/
+31
*
Const arg of Handshake_IO::send
lloyd
2012-08-10
2
-5
/
+5
*
Instead of using static salts in the KDF for generating the cipher and
lloyd
2012-08-09
1
-7
/
+22
*
Lame but usable DTLS defragmentation
lloyd
2012-08-09
2
-7
/
+15
*
We weren't handling DTLS handshake fragments at all. Now reject them
lloyd
2012-08-08
2
-24
/
+35
*
Clean up DTLS handshake formatting
lloyd
2012-08-08
2
-19
/
+21
*
Make Handshake_IO::format const
lloyd
2012-08-08
2
-5
/
+5
*
Fix DTLS handshake encoding. Handle multiple messages in a packet.
lloyd
2012-08-08
2
-31
/
+72
*
DTLS needs some help with ChangeCipherSpec because it is not included
lloyd
2012-08-08
5
-11
/
+51
*
Move check of plaintext size to after MAC check. Use assign instead of
lloyd
2012-08-07
1
-8
/
+8
*
Remove Handshake_IO::have_full_record and Handshake_IO::empty
lloyd
2012-08-07
3
-50
/
+14
*
This was in an awkward place
lloyd
2012-08-07
1
-2
/
+1
*
Track the sequence number and return it from the record reader. Take
lloyd
2012-08-07
5
-15
/
+33
*
Wrap lines
lloyd
2012-08-06
2
-2
/
+7
*
Fix parens
lloyd
2012-08-06
1
-1
/
+1
*
Add a Policy item for if a client will accept a server-initiated
lloyd
2012-08-06
2
-1
/
+7
*
Expose Handshake_Message as an API type.
lloyd
2012-08-06
9
-66
/
+117
*
Don't need to make these private
lloyd
2012-08-06
1
-5
/
+3
*
The client wasn't sending a next protocol message on a session
lloyd
2012-08-06
1
-0
/
+11
*
A heartbeat request send by the counterparty during a handshake would
lloyd
2012-08-06
1
-5
/
+8
*
Move server-specific parts of the handshake state to a server subclass.
lloyd
2012-08-06
4
-21
/
+29
*
Move things that are client specific in the handshake state to a
lloyd
2012-08-06
2
-16
/
+28
*
Make the handshake hash private
lloyd
2012-08-06
7
-33
/
+36
*
Make handshake session keys private with get/set
lloyd
2012-08-06
6
-24
/
+33
*
Make the handshake Ciphersuite only available by const reference.
lloyd
2012-08-06
8
-36
/
+35
*
Const Handshake_State args where possible
lloyd
2012-08-06
3
-5
/
+5
*
Move Certificate message to it's own file.
lloyd
2012-08-06
4
-68
/
+89
*
Use unique_ptr in Server_Kex_Exchange and Extensions
lloyd
2012-08-06
4
-37
/
+19
*
Store record MAC objects in unique_ptr
lloyd
2012-08-06
3
-21
/
+12
*
Have all the TLS handshake messages stored in unique_ptrs with only
lloyd
2012-08-06
15
-294
/
+436
*
m_ namespace remaining TLS messages
lloyd
2012-08-06
5
-78
/
+78
*
In the in-memory session manager, choose a random key at startup and
lloyd
2012-08-05
3
-10
/
+28
*
Remove Channel::read_handshake. Have the server set expected next msg
lloyd
2012-08-05
4
-43
/
+15
*
If we're negotiating a datagram protocol, allow a hello verify
lloyd
2012-08-03
1
-2
/
+20
*
Take the initial record version from the Handshake_IO instance instead
lloyd
2012-08-03
5
-3
/
+24
[next]