| Commit message (Expand) | Author | Age | Files | Lines |
... | |
* | Split TLS::Policy::allowed_hashes into allowed_signature_hashes and | lloyd | 2012-06-29 | 8 | -29/+41 |
* | Add TLS::Session_Manager_Noop which just ignores all save requests. | lloyd | 2012-06-29 | 4 | -14/+39 |
* | Add TLS::Policy::minimum_dh_group_size, default 1024. Send an | lloyd | 2012-06-25 | 5 | -2/+30 |
* | Make TLS::Channel::send non-virtual as neither Client nor Server | lloyd | 2012-06-18 | 9 | -21/+58 |
* | Commented out entry for anon in default policy: | lloyd | 2012-06-17 | 1 | -0/+1 |
* | We would never negotiate anon DH/ECDH even if policy allowed it and | lloyd | 2012-06-17 | 1 | -1/+1 |
* | Profiling with valgrind shows that the 2**16 iteration for finding | lloyd | 2012-06-14 | 5 | -116/+139 |
* | We would fail in the case where we connected to a server that did not | lloyd | 2012-06-13 | 1 | -1/+1 |
* | Update what() signature on exception types | lloyd | 2012-06-12 | 1 | -1/+1 |
* | Generate new session IDs in the same format as hello randoms, with the | lloyd | 2012-06-10 | 2 | -3/+3 |
* | Add Handshake_Type codes for RFC 6066 handshake types. | lloyd | 2012-06-10 | 2 | -19/+27 |
* | A fix for bug 191, that we were not preventing resumption of sessions in the | lloyd | 2012-06-09 | 6 | -63/+85 |
* | Avoid a spurious unrecognized_name alert when a server is running in | lloyd | 2012-06-09 | 1 | -1/+10 |
* | m_ namespace Channel, Client, and Server. | lloyd | 2012-06-09 | 6 | -378/+378 |
* | Use initialize lists here, much cleaner | lloyd | 2012-06-09 | 1 | -53/+44 |
* | A fix for bug 192. First, when renegotiating in the client, attempt to | lloyd | 2012-06-09 | 11 | -72/+99 |
* | Make a proper wrapper in util for SQLite3, update the TLS session | lloyd | 2012-06-08 | 3 | -167/+33 |
* | Invert the policy setting as I think it makes it more obvious that | lloyd | 2012-06-08 | 3 | -7/+7 |
* | Update cms, cvc, zlib, bzip2, openssl, and gnump modules for the new | lloyd | 2012-06-07 | 1 | -2/+2 |
* | Report what we have already received on an unexpected state | lloyd | 2012-06-07 | 3 | -9/+11 |
* | Cleanup, m_ namespace Secure_Renegotiation_State | lloyd | 2012-06-07 | 3 | -26/+28 |
* | Clients sending a SSLv2 hello would cause an internal failure because | lloyd | 2012-06-07 | 2 | -2/+25 |
* | Fix for DHE, strip_leading_zeros always took off the last byte | lloyd | 2012-06-06 | 1 | -1/+1 |
* | Add assert_done checks here to help avoid interesting substitution | lloyd | 2012-06-05 | 2 | -0/+4 |
* | Use std::deque instead of SecureQueue in TLS::Stream_Handshake_Reader | lloyd | 2012-05-26 | 3 | -16/+18 |
* | propagate from branch 'net.randombit.botan.x509-path-validation' (head 63b5a2... | lloyd | 2012-05-25 | 1 | -1/+1 |
* | Replace 0 and NULL pointer constants with nullptr. Also fix an old | lloyd | 2012-05-18 | 11 | -41/+41 |
* | Fairly huge update that replaces the old secmem types with std::vector | lloyd | 2012-05-18 | 41 | -302/+299 |
* | Huge pile of post merge fixups, mtn really fucked that merge | lloyd | 2012-04-25 | 25 | -153/+112 |
* | propagate from branch 'net.randombit.botan.tls-state-machine' (head a4741cd07... | lloyd | 2012-04-25 | 36 | -788/+1264 |
|\ |
|
| * | Camellia is now split by key length | lloyd | 2012-04-24 | 1 | -26/+26 |
| * | Compile fix | lloyd | 2012-04-20 | 1 | -1/+1 |
| * | Put the implementation of Policy::dh_group in source so it's easier to | lloyd | 2012-04-19 | 2 | -1/+6 |
| * | Various dependency/amalgamation fixes | lloyd | 2012-04-19 | 4 | -6/+8 |
| * | Add a bool param to renegotiate on if we should force a full | lloyd | 2012-04-18 | 9 | -28/+71 |
| * | Send almost all of the extensions on a renegotiation on an existing | lloyd | 2012-04-18 | 1 | -14/+12 |
| * | The secure renegotiation state was not updated on a session | lloyd | 2012-04-18 | 1 | -9/+7 |
| * | As best I can tell the client is allowed to send a certificate chain | lloyd | 2012-04-16 | 1 | -5/+0 |
| * | The encoding of Certificate Request messages was wrong, each DER | lloyd | 2012-04-16 | 1 | -4/+6 |
| * | Add support for TLS heartbeats (RFC 6520). Heartbeat initiations from | lloyd | 2012-04-16 | 17 | -38/+282 |
| * | Add support for the 3 alert types we didn't have codes for. | lloyd | 2012-04-09 | 2 | -32/+38 |
| * | Finish up server side SRP support, a little ugly but it works. | lloyd | 2012-04-06 | 7 | -36/+75 |
| * | Re-enable TLS (was disabled by trunk merge), and require the srp6 module | lloyd | 2012-04-05 | 3 | -3/+42 |
| * | Initial client-side support for SRP (finally!). Tested against OpenSSL | lloyd | 2012-04-05 | 4 | -0/+45 |
| * | propagate from branch 'net.randombit.botan' (head 91305e3daaae9ea8a1786daf058... | lloyd | 2012-04-05 | 1 | -0/+2 |
| * | Remove Policy::choose_compression and move to tls_server | lloyd | 2012-04-04 | 4 | -62/+59 |
| * | Limit the lifetime of tickets to Policy::session_ticket_lifetime() | lloyd | 2012-04-04 | 15 | -178/+196 |
| * | Add anonymous DH/ECDH ciphersuites to the cipher list. Interop checked | lloyd | 2012-04-02 | 2 | -18/+62 |
| * | Use SHA-256 when MD5 is negotiated as the HMAC hash in TLS 1.2, | lloyd | 2012-04-02 | 2 | -2/+6 |
| * | Remove the Ciphersuite_Code enum and move all ciphersuite | lloyd | 2012-03-30 | 7 | -351/+298 |