aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Expand)AuthorAgeFilesLines
* Partially protect OAEP decoding against a timing attack. Possibilitylloyd2010-05-121-12/+28
* Avoid trying to use GCC's cpuid.h in versions where it doesn't existlloyd2010-05-061-1/+3
* Modify the implementation of multiplication mod 65537 used in IDEA tolloyd2010-04-301-10/+13
* HMAC_RNG handling changes - split up reseed() and add_entropy()lloyd2010-04-272-35/+31
* Remove add_entropy_vec. Much cleaner way of doing this: add the entirelloyd2010-04-273-7/+4
* mutex.h is internal - had been picking up system installed versionlloyd2010-04-231-1/+1
* Add the other parties Random value to the local PRNG statelloyd2010-04-232-0/+4
* Return SecureVector vals by const reflloyd2010-04-231-4/+4
* Add add_entropy_vec which calls add_entropy on the passed vector. Haslloyd2010-04-231-0/+3
* Check to make sure the user didn't provide two of the same has forlloyd2010-04-231-0/+3
* Remove some C-style castslloyd2010-04-234-6/+6
* Comb4P: hashes must be the same lengthlloyd2010-04-221-2/+0
* Fix EMSA_Raw in the case where the original input had leading 0 bytes.lloyd2010-04-211-1/+19
* Extension codes for ECC negotiationlloyd2010-04-211-0/+3
* If we couldn't agree on a suite, fail immediatelylloyd2010-04-201-0/+5
* Expose public_value() in ECDH public keylloyd2010-04-201-3/+10
* Compile fixlloyd2010-04-201-1/+1
* Expose function breaking down ciphersuite to algo valueslloyd2010-04-192-3/+5
* In the string constructor of EC_Domain_Params, check if the PEM decodinglloyd2010-04-192-6/+16
* Add codes for SHA-1 based ECC suites (RFC 4492).lloyd2010-04-192-25/+81
* Add support for SEED ciphersuites. Tested against OpenSSL 0.9.8nlloyd2010-04-173-0/+24
* Add support for reading SSLv2 client helloslloyd2010-04-175-8/+86
* Clean up ciphersuite handlinglloyd2010-04-177-91/+273
* Add support for TLS 1.2 PRFlloyd2010-04-172-22/+63
* Add Comb4P hash combiner, as described in Anja Lehmann's thesis.lloyd2010-04-174-0/+167
* If the CBC padding is incorrect, then assume the pad size is zero andlloyd2010-04-091-4/+10
* Present requested hostname (SNI extn) to TLS_Server userlloyd2010-03-302-0/+6
* Remove bad filenamelloyd2010-03-301-1/+0
* Instead of just discarding the extension size, confirm that thelloyd2010-03-301-1/+4
* Support TLS Extensions, specifically SNIlloyd2010-03-301-35/+29
* Constify assert_at_least. Add some helperslloyd2010-03-301-1/+17
* Add some magic numbers for TLS extension codeslloyd2010-03-301-0/+11
* Add a class that knows how to decode a (very small subset of) TLS datalloyd2010-03-306-61/+249
* Don't fail simply because the client sent a version code that we don'tlloyd2010-03-301-6/+0
* Fix server handshake.lloyd2010-03-302-15/+14
* Fix DSA TLS serverslloyd2010-03-301-1/+1
* Add support for TLS v1.1's per-record random IV. Tested against GnuTLS server.lloyd2010-03-307-12/+46
* Rename pad_amount to block_size, more accurate/descriptivelloyd2010-03-303-12/+20
* Also remove compression bits from record writerlloyd2010-03-251-14/+4
* Remove single byte versions of read and write - caused problems with overloadslloyd2010-03-251-3/+0
* Remove the bits for supporting compression - it was never actuallylloyd2010-03-252-19/+4
* Use size_t for lengths in Socket interfacelloyd2010-03-253-9/+9
* Allow adding engines dynamicallylloyd2010-03-243-17/+20
* Remove printfslloyd2010-03-231-17/+0
* Make Record_Reader event driven. Callers (eg TLS_Client andlloyd2010-03-236-45/+132
* Delete global RNG and the mutex in ~Library_Statelloyd2010-03-231-3/+5
* Don't delete the global RNG in AutoSeeded_RNG's destructorlloyd2010-03-231-1/+0
* Rename SecureVector::L param to INITIAL_LEN so as to be somewhat obvious as t...lloyd2010-03-231-2/+3
* Remove SecureBuffer, which is the fixed-size variant of SecureVector.lloyd2010-03-2363-137/+101
* Remove reference to no-longer existing function in docslloyd2010-03-221-6/+2