aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls
Commit message (Expand)AuthorAgeFilesLines
* Fix parenslloyd2012-08-061-1/+1
* Add a Policy item for if a client will accept a server-initiatedlloyd2012-08-062-1/+7
* Expose Handshake_Message as an API type.lloyd2012-08-069-66/+117
* Don't need to make these privatelloyd2012-08-061-5/+3
* The client wasn't sending a next protocol message on a sessionlloyd2012-08-061-0/+11
* A heartbeat request send by the counterparty during a handshake wouldlloyd2012-08-061-5/+8
* Move server-specific parts of the handshake state to a server subclass.lloyd2012-08-064-21/+29
* Move things that are client specific in the handshake state to alloyd2012-08-062-16/+28
* Make the handshake hash privatelloyd2012-08-067-33/+36
* Make handshake session keys private with get/setlloyd2012-08-066-24/+33
* Make the handshake Ciphersuite only available by const reference.lloyd2012-08-068-36/+35
* Const Handshake_State args where possiblelloyd2012-08-063-5/+5
* Move Certificate message to it's own file.lloyd2012-08-064-68/+89
* Use unique_ptr in Server_Kex_Exchange and Extensionslloyd2012-08-064-37/+19
* Store record MAC objects in unique_ptrlloyd2012-08-063-21/+12
* Have all the TLS handshake messages stored in unique_ptrs with onlylloyd2012-08-0615-294/+436
* m_ namespace remaining TLS messageslloyd2012-08-065-78/+78
* In the in-memory session manager, choose a random key at startup andlloyd2012-08-053-10/+28
* Remove Channel::read_handshake. Have the server set expected next msglloyd2012-08-054-43/+15
* If we're negotiating a datagram protocol, allow a hello verifylloyd2012-08-031-2/+20
* Take the initial record version from the Handshake_IO instance insteadlloyd2012-08-035-3/+24
* Add Handshake_Hash::resetlloyd2012-08-033-3/+24
* Add preliminary IO handler for datagram handshakes. Does not fragmentlloyd2012-08-032-0/+184
* Rename all the message source files to msg_lloyd2012-08-0311-10/+10
* Combine Handshake_Writer and Handshake_Reader into Handshake_IO.lloyd2012-08-0320-245/+170
* Move the code that pretends a CCS message is a handshake message fromlloyd2012-08-023-40/+32
* Use TLS v1.0 PRF unless the version supports a ciphersuite specific PRFlloyd2012-08-021-4/+5
* Add TLS::Protocol_Version::supports_ciphersuite_specific_prflloyd2012-08-024-14/+16
* Fix DTLS HelloVerify message decodinglloyd2012-08-021-3/+12
* Rename activate to more descriptive change_cipher_speclloyd2012-07-295-28/+41
* Use unique_ptr for handshake state, avoid lots of delete+nullptr assignlloyd2012-07-294-48/+43
* If we're going to reject an insecure renegotiation, do it immediately,lloyd2012-07-293-41/+63
* Helper func for loading 24 bit valuelloyd2012-07-281-8/+15
* Pass protocol to initiate_handshakelloyd2012-07-282-5/+7
* Combine client initial handshake and renegotiation in initiate_handshake.lloyd2012-07-282-55/+39
* Fix DTLS version string.lloyd2012-07-285-15/+27
* Make Handshake_Writer non-copyablelloyd2012-07-281-0/+6
* Add format() hook to Handshake_Writer, so that Handshake_Hash does notlloyd2012-07-286-39/+34
* Add helper for writing 24-bit integerlloyd2012-07-161-2/+12
* Add a class that handles writing handshake messages instead of pushinglloyd2012-07-1624-166/+248
* Hook creating just the handshake reader vs the entire statelloyd2012-07-126-12/+12
* Add an optional parameter to TLS::Client specifying the port number.lloyd2012-07-126-35/+62
* Changes to version handling in support of DTLS work.lloyd2012-07-1216-78/+114
* Add deleted copy constructors/assignment operators where appropriate.lloyd2012-07-102-0/+7
* Add TLS::Channel::new_handshake_state which abstracts creating thelloyd2012-07-096-11/+27
* The messages for assertion checks were done both ways, both "assertionlloyd2012-07-093-5/+5
* Doxygen commentslloyd2012-07-065-6/+109
* Correct Doxygen commentslloyd2012-07-062-5/+5
* Record_Writer needs a PRNG for the IV generation. Share the referencelloyd2012-07-056-16/+22
* Pull the TLS padding checks out to an anon function.lloyd2012-07-051-32/+59