aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls
Commit message (Expand)AuthorAgeFilesLines
* Remove Channel::m_peer_certs, instead retrieve directly from the state.lloyd2012-09-076-12/+45
* Avoid another instance of pulling the key out of the certificatelloyd2012-09-073-9/+7
* Just dynamic_cast once at the start of process_handshake_msglloyd2012-09-072-21/+20
* Save the peer public key in the handshake state instead of pulling itlloyd2012-09-076-16/+29
* Take version from pending state for creating cipher speclloyd2012-09-071-3/+3
* This check is boguslloyd2012-09-071-9/+0
* Use TLS v1.0 in the initial record version. Given that we're includinglloyd2012-09-071-1/+1
* Inline Secure_Renegotiation_State into Channel as so much of the datelloyd2012-09-074-68/+62
* Channel::heartbeat_support was removedlloyd2012-09-073-8/+0
* Pass the current active state as well as the pending state which islloyd2012-09-076-16/+22
* Single predecl of Handshake_State saves some noiselloyd2012-09-073-11/+13
* Keep two handshake states around, swap them whenlloyd2012-09-074-68/+69
* Use initializerslloyd2012-09-071-6/+2
* Reindentlloyd2012-09-071-10/+11
* Fixes for server record handling, where we don't know the versionlloyd2012-09-071-31/+43
* In Channel move some checks to after we've verified needed == 0 tolloyd2012-09-072-18/+16
* Remove bogus forced 64 byte mtu.lloyd2012-09-074-9/+22
* DTLS versions count backwardslloyd2012-09-061-0/+3
* Minimize header size dependencies in record readinglloyd2012-09-061-13/+18
* Reject a SSLv2 mapped DTLS client hello as serious bogosity.lloyd2012-09-061-0/+4
* Avoid secure_vector allocation per block on TLS CBC decryptlloyd2012-09-061-1/+3
* Have write_record resize the vector as it goes, thus the return valuelloyd2012-09-063-51/+41
* The checks in renegotiate would prevent initiate_handshake from beinglloyd2012-09-061-1/+1
* Inline current_protocol_version, fix fragment limit checklloyd2012-09-062-11/+13
* Make Channel::m_state privatelloyd2012-09-067-43/+62
* Pass process_handshake_msg a reference to the Handshake_Statelloyd2012-09-0611-307/+307
* Inline Record_Reader to Channel as welllloyd2012-09-067-194/+56
* Inline Record_Writer to Channellloyd2012-09-066-210/+101
* Add Channel::send_recordlloyd2012-09-064-8/+18
* Add more functions to Channel, hiding Record_Reader entirely and mostlloyd2012-09-064-47/+68
* Make a number of members of Channel private instead of protectedlloyd2012-09-066-48/+40
* Record_Reader::m_macbuf no longer usedlloyd2012-09-062-5/+0
* Hoist m_rng to Channellloyd2012-09-066-4/+2
* Move record reading also to a stand alone functionlloyd2012-09-063-268/+315
* Move the actual creation of new TLS records to TLS::write_record whichlloyd2012-09-063-116/+142
* Use it for the reader as welllloyd2012-09-062-97/+47
* Move record cipher state to its own class. Currently write side only.lloyd2012-09-064-102/+162
* Do record decryption in placelloyd2012-09-053-32/+55
* Avoid Pipe in Record_Writer, refactoring to move the record I/O up to Channellloyd2012-09-042-40/+59
* Distinguish read and write specific objectslloyd2012-09-043-65/+65
* Remove Record_Writer::send_alert. Move Alert serialization to Alert::serializelloyd2012-09-046-29/+31
* Rename m_writer to m_send_hslloyd2012-09-042-15/+15
* Use a std::function so handshake_io only has access Record_Writer'slloyd2012-09-047-23/+35
* Require servers to send us a session ticket message if they sent alloyd2012-08-141-3/+2
* Missing constantlloyd2012-08-131-0/+2
* Working fragmentation. Initial start at flight tracking.lloyd2012-08-102-14/+63
* Hooks for DTLS fragmentationlloyd2012-08-102-12/+32
* Make the CCS message a Handshake_Msg and send it through the handshakelloyd2012-08-105-12/+31
* Const arg of Handshake_IO::sendlloyd2012-08-102-5/+5
* Instead of using static salts in the KDF for generating the cipher andlloyd2012-08-091-7/+22