index
:
botan.git
master
Unnamed repository; edit this file 'description' to name the repository.
about
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
src
/
tls
Commit message (
Expand
)
Author
Age
Files
Lines
*
Remove Channel::m_peer_certs, instead retrieve directly from the state.
lloyd
2012-09-07
6
-12
/
+45
*
Avoid another instance of pulling the key out of the certificate
lloyd
2012-09-07
3
-9
/
+7
*
Just dynamic_cast once at the start of process_handshake_msg
lloyd
2012-09-07
2
-21
/
+20
*
Save the peer public key in the handshake state instead of pulling it
lloyd
2012-09-07
6
-16
/
+29
*
Take version from pending state for creating cipher spec
lloyd
2012-09-07
1
-3
/
+3
*
This check is bogus
lloyd
2012-09-07
1
-9
/
+0
*
Use TLS v1.0 in the initial record version. Given that we're including
lloyd
2012-09-07
1
-1
/
+1
*
Inline Secure_Renegotiation_State into Channel as so much of the date
lloyd
2012-09-07
4
-68
/
+62
*
Channel::heartbeat_support was removed
lloyd
2012-09-07
3
-8
/
+0
*
Pass the current active state as well as the pending state which is
lloyd
2012-09-07
6
-16
/
+22
*
Single predecl of Handshake_State saves some noise
lloyd
2012-09-07
3
-11
/
+13
*
Keep two handshake states around, swap them when
lloyd
2012-09-07
4
-68
/
+69
*
Use initializers
lloyd
2012-09-07
1
-6
/
+2
*
Reindent
lloyd
2012-09-07
1
-10
/
+11
*
Fixes for server record handling, where we don't know the version
lloyd
2012-09-07
1
-31
/
+43
*
In Channel move some checks to after we've verified needed == 0 to
lloyd
2012-09-07
2
-18
/
+16
*
Remove bogus forced 64 byte mtu.
lloyd
2012-09-07
4
-9
/
+22
*
DTLS versions count backwards
lloyd
2012-09-06
1
-0
/
+3
*
Minimize header size dependencies in record reading
lloyd
2012-09-06
1
-13
/
+18
*
Reject a SSLv2 mapped DTLS client hello as serious bogosity.
lloyd
2012-09-06
1
-0
/
+4
*
Avoid secure_vector allocation per block on TLS CBC decrypt
lloyd
2012-09-06
1
-1
/
+3
*
Have write_record resize the vector as it goes, thus the return value
lloyd
2012-09-06
3
-51
/
+41
*
The checks in renegotiate would prevent initiate_handshake from being
lloyd
2012-09-06
1
-1
/
+1
*
Inline current_protocol_version, fix fragment limit check
lloyd
2012-09-06
2
-11
/
+13
*
Make Channel::m_state private
lloyd
2012-09-06
7
-43
/
+62
*
Pass process_handshake_msg a reference to the Handshake_State
lloyd
2012-09-06
11
-307
/
+307
*
Inline Record_Reader to Channel as well
lloyd
2012-09-06
7
-194
/
+56
*
Inline Record_Writer to Channel
lloyd
2012-09-06
6
-210
/
+101
*
Add Channel::send_record
lloyd
2012-09-06
4
-8
/
+18
*
Add more functions to Channel, hiding Record_Reader entirely and most
lloyd
2012-09-06
4
-47
/
+68
*
Make a number of members of Channel private instead of protected
lloyd
2012-09-06
6
-48
/
+40
*
Record_Reader::m_macbuf no longer used
lloyd
2012-09-06
2
-5
/
+0
*
Hoist m_rng to Channel
lloyd
2012-09-06
6
-4
/
+2
*
Move record reading also to a stand alone function
lloyd
2012-09-06
3
-268
/
+315
*
Move the actual creation of new TLS records to TLS::write_record which
lloyd
2012-09-06
3
-116
/
+142
*
Use it for the reader as well
lloyd
2012-09-06
2
-97
/
+47
*
Move record cipher state to its own class. Currently write side only.
lloyd
2012-09-06
4
-102
/
+162
*
Do record decryption in place
lloyd
2012-09-05
3
-32
/
+55
*
Avoid Pipe in Record_Writer, refactoring to move the record I/O up to Channel
lloyd
2012-09-04
2
-40
/
+59
*
Distinguish read and write specific objects
lloyd
2012-09-04
3
-65
/
+65
*
Remove Record_Writer::send_alert. Move Alert serialization to Alert::serialize
lloyd
2012-09-04
6
-29
/
+31
*
Rename m_writer to m_send_hs
lloyd
2012-09-04
2
-15
/
+15
*
Use a std::function so handshake_io only has access Record_Writer's
lloyd
2012-09-04
7
-23
/
+35
*
Require servers to send us a session ticket message if they sent a
lloyd
2012-08-14
1
-3
/
+2
*
Missing constant
lloyd
2012-08-13
1
-0
/
+2
*
Working fragmentation. Initial start at flight tracking.
lloyd
2012-08-10
2
-14
/
+63
*
Hooks for DTLS fragmentation
lloyd
2012-08-10
2
-12
/
+32
*
Make the CCS message a Handshake_Msg and send it through the handshake
lloyd
2012-08-10
5
-12
/
+31
*
Const arg of Handshake_IO::send
lloyd
2012-08-10
2
-5
/
+5
*
Instead of using static salts in the KDF for generating the cipher and
lloyd
2012-08-09
1
-7
/
+22
[next]