aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls
Commit message (Expand)AuthorAgeFilesLines
* Report what we have already received on an unexpected statelloyd2012-06-073-9/+11
* Cleanup, m_ namespace Secure_Renegotiation_Statelloyd2012-06-073-26/+28
* Clients sending a SSLv2 hello would cause an internal failure becauselloyd2012-06-072-2/+25
* Fix for DHE, strip_leading_zeros always took off the last bytelloyd2012-06-061-1/+1
* Add assert_done checks here to help avoid interesting substitutionlloyd2012-06-052-0/+4
* Use std::deque instead of SecureQueue in TLS::Stream_Handshake_Readerlloyd2012-05-263-16/+18
* propagate from branch 'net.randombit.botan.x509-path-validation' (head 63b5a2...lloyd2012-05-251-1/+1
* Replace 0 and NULL pointer constants with nullptr. Also fix an oldlloyd2012-05-1811-41/+41
* Fairly huge update that replaces the old secmem types with std::vectorlloyd2012-05-1841-302/+299
* Huge pile of post merge fixups, mtn really fucked that mergelloyd2012-04-2525-153/+112
* propagate from branch 'net.randombit.botan.tls-state-machine' (head a4741cd07...lloyd2012-04-2536-788/+1264
|\
| * Camellia is now split by key lengthlloyd2012-04-241-26/+26
| * Compile fixlloyd2012-04-201-1/+1
| * Put the implementation of Policy::dh_group in source so it's easier tolloyd2012-04-192-1/+6
| * Various dependency/amalgamation fixeslloyd2012-04-194-6/+8
| * Add a bool param to renegotiate on if we should force a fulllloyd2012-04-189-28/+71
| * Send almost all of the extensions on a renegotiation on an existinglloyd2012-04-181-14/+12
| * The secure renegotiation state was not updated on a sessionlloyd2012-04-181-9/+7
| * As best I can tell the client is allowed to send a certificate chainlloyd2012-04-161-5/+0
| * The encoding of Certificate Request messages was wrong, each DERlloyd2012-04-161-4/+6
| * Add support for TLS heartbeats (RFC 6520). Heartbeat initiations fromlloyd2012-04-1617-38/+282
| * Add support for the 3 alert types we didn't have codes for.lloyd2012-04-092-32/+38
| * Finish up server side SRP support, a little ugly but it works.lloyd2012-04-067-36/+75
| * Re-enable TLS (was disabled by trunk merge), and require the srp6 modulelloyd2012-04-053-3/+42
| * Initial client-side support for SRP (finally!). Tested against OpenSSLlloyd2012-04-054-0/+45
| * propagate from branch 'net.randombit.botan' (head 91305e3daaae9ea8a1786daf058...lloyd2012-04-051-0/+2
| * Remove Policy::choose_compression and move to tls_serverlloyd2012-04-044-62/+59
| * Limit the lifetime of tickets to Policy::session_ticket_lifetime()lloyd2012-04-0415-178/+196
| * Add anonymous DH/ECDH ciphersuites to the cipher list. Interop checkedlloyd2012-04-022-18/+62
| * Use SHA-256 when MD5 is negotiated as the HMAC hash in TLS 1.2,lloyd2012-04-022-2/+6
| * Remove the Ciphersuite_Code enum and move all ciphersuitelloyd2012-03-307-351/+298
* | Post merge fixes for using chrono lib for timeouts, unique_ptr,lloyd2012-03-303-25/+29
* | propagate from branch 'net.randombit.botan.tls-state-machine' (head 63b88a65b...lloyd2012-03-3035-247/+1358
|\|
| * Rework session crypto code. Drop the 4 bytes of zeros reserved forlloyd2012-03-282-38/+54
| * For unencrypted initial handshake records, copy them to the writebuflloyd2012-03-231-12/+12
| * Revert the session_ticket callback in credentials manager. If a PSKlloyd2012-03-233-39/+33
| * Fix depslloyd2012-03-232-0/+6
| * Add a special hook in credentials manager for the session ticket key,lloyd2012-03-231-17/+33
| * Include the curves and sig algos list in a session resumption clientlloyd2012-03-233-5/+18
| * Only claim we support session tickets if we actually have a key oflloyd2012-03-232-9/+16
| * Call Credentials_Manager::psk for the session ticket key.lloyd2012-03-221-11/+24
| * Add encryption for the SQLite sessions databaselloyd2012-03-224-54/+163
| * propagate from branch 'net.randombit.botan.tls-state-machine' (head 6bcbae3d2...lloyd2012-03-2215-56/+455
| |\
| | * Server side handling of session tickets, though currently with alloyd2012-03-227-33/+106
| | * Working client-side session tickets. Tested against gmail.com andlloyd2012-03-226-17/+37
| | * Correct ticket decoding/encodinglloyd2012-03-221-5/+6
| | * Add missing source file for New_Session_Ticket msglloyd2012-03-221-0/+39
| | * propagate from branch 'net.randombit.botan.tls-state-machine' (head f761c340d...lloyd2012-03-224-2/+311
| | |\
| | * | Basic protocol message flow for session ticketslloyd2012-03-2011-64/+120
| | * | Small fixes, cleanupslloyd2012-03-195-9/+22