aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Expand)AuthorAgeFilesLines
* Get the list of supported ECC curves out of the client hello, andlloyd2012-01-245-4/+17
* Forgot to check in server side ECDH key genlloyd2012-01-241-3/+11
* Allow ECDH negotiation by defaultlloyd2012-01-241-4/+1
* For ECDH you don't strip leading zeros. Bikeshedding: 1 Consistency: 0lloyd2012-01-241-3/+5
* Read ECDH client key exchange messageslloyd2012-01-241-25/+26
* Working ECDH key exchange. Only tested on client side but seems goodlloyd2012-01-243-37/+95
* Cleanuplloyd2012-01-241-10/+10
* Expose the named curve ID/string conversion functions, needed for server key ...lloyd2012-01-242-9/+8
* Convert Internal_Error exceptions into the cooresponding alert.lloyd2012-01-242-4/+7
* Formatting and comment fixlloyd2012-01-241-5/+5
* Don't assume the server key exchange consists of a series of BigInts.lloyd2012-01-243-31/+25
* Add comments for the Policy class. Make the allowed_* calls virtual solloyd2012-01-241-16/+42
* PEM encoding. Fix BER decoding. Encode the entire cert chain in thelloyd2012-01-242-23/+68
* New helpers taking a stringlloyd2012-01-242-0/+28
* This should always have reported what it saw and expectedlloyd2012-01-241-1/+5
* Better documentation in this headerlloyd2012-01-241-11/+34
* The credentials manager interface seems a much better place for certlloyd2012-01-235-16/+76
* Add Ciphersuite::to_stringlloyd2012-01-237-20/+110
* Make the version number a proper class, makes many things much easierlloyd2012-01-2326-168/+304
* Since this branch is hugely API breaking already, go ahead and putlloyd2012-01-2338-277/+429
* Remove the key() method on server key exchange - instead leave it tolloyd2012-01-233-21/+18
* Have the client key exchange examine the server key exchange messagelloyd2012-01-236-52/+59
* Basic outline of the supported curves extension from RFC 4492lloyd2012-01-222-14/+167
* Reorder for readabilitylloyd2012-01-221-46/+48
* When generating a signature in TLS 1.2, respect the request of thelloyd2012-01-208-57/+73
* Report the length of the pre master secret. Who knows if when thislloyd2012-01-201-1/+2
* Missing a spacelloyd2012-01-201-1/+1
* Increase the max key length of HMAC to 512 bytes. Previously we wouldlloyd2012-01-202-2/+9
* A change to Finished in 687c3c7dccdd2f5e4825bdb60155c7bfba22339f brokelloyd2012-01-201-3/+5
* Helps if you return the right typelloyd2012-01-201-1/+1
* Support lookup of the SSLv3 PRFlloyd2012-01-201-0/+5
* Ignore ECDH suites in replyinglloyd2012-01-201-0/+3
* Fix decoding of signature_algorithms if we say something we don't recognizelloyd2012-01-201-4/+4
* Strangely you can negotiate using only MD5 in TLS 1.2. Just ignore itlloyd2012-01-201-5/+2
* Instead of using a hardcoded value for signature_algothms, go withlloyd2012-01-207-20/+32
* New policy methods. User provides lists of ciphers, hashes, etc theylloyd2012-01-205-144/+231
* Convert to using a switch statement here. It's faster, and offerslloyd2012-01-201-83/+88
* If the client sent something > TLS 1.2, we sould respond as TLS 1.1lloyd2012-01-201-16/+10
* Somewhat contorted, but fixes the issue with sending hash/sig ids withlloyd2012-01-205-18/+40
* TLS_Ciphersuite_Algos was just a strange level of indirection betweenlloyd2012-01-2018-506/+254
* Basic processing for signature_algorithms extension in client hellolloyd2012-01-202-1/+35
* Initialize values once in constructor instead of in each branchlloyd2012-01-202-14/+13
* Many fixes for TLS 1.2 though some things in particular client authlloyd2012-01-2013-150/+251
* Various and sundry bug fixeslloyd2012-01-199-11/+31
* Add the AES/SHA-256 suites to the standard lists. Works under TLS 1.2lloyd2012-01-191-0/+13
* Kinda maybe working TLS 1.2 for clients. Not well tested at all, but alloyd2012-01-1921-88/+172
* Remove Handshake_Message::deserialize which was an unnecessary hook.lloyd2012-01-1910-153/+132
* I'm not sure if I like this asthetically, but passing around thelloyd2012-01-1915-311/+219
* Fix RSA client cert verification for SSLv3lloyd2012-01-191-3/+14
* Support SSLv3 client auth on the client side.lloyd2012-01-196-15/+53