aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Expand)AuthorAgeFilesLines
* The client wasn't sending a next protocol message on a sessionlloyd2012-08-061-0/+11
* A heartbeat request send by the counterparty during a handshake wouldlloyd2012-08-061-5/+8
* Move server-specific parts of the handshake state to a server subclass.lloyd2012-08-064-21/+29
* Move things that are client specific in the handshake state to alloyd2012-08-062-16/+28
* Make the handshake hash privatelloyd2012-08-067-33/+36
* Make handshake session keys private with get/setlloyd2012-08-066-24/+33
* Make the handshake Ciphersuite only available by const reference.lloyd2012-08-068-36/+35
* Const Handshake_State args where possiblelloyd2012-08-063-5/+5
* Move Certificate message to it's own file.lloyd2012-08-064-68/+89
* Use unique_ptr in Server_Kex_Exchange and Extensionslloyd2012-08-064-37/+19
* Store record MAC objects in unique_ptrlloyd2012-08-063-21/+12
* Have all the TLS handshake messages stored in unique_ptrs with onlylloyd2012-08-0615-294/+436
* m_ namespace remaining TLS messageslloyd2012-08-065-78/+78
* In the in-memory session manager, choose a random key at startup andlloyd2012-08-053-10/+28
* Remove Channel::read_handshake. Have the server set expected next msglloyd2012-08-054-43/+15
* If we're negotiating a datagram protocol, allow a hello verifylloyd2012-08-031-2/+20
* Take the initial record version from the Handshake_IO instance insteadlloyd2012-08-035-3/+24
* Add Handshake_Hash::resetlloyd2012-08-033-3/+24
* Add preliminary IO handler for datagram handshakes. Does not fragmentlloyd2012-08-032-0/+184
* Rename all the message source files to msg_lloyd2012-08-0311-10/+10
* Combine Handshake_Writer and Handshake_Reader into Handshake_IO.lloyd2012-08-0320-245/+170
* Move the code that pretends a CCS message is a handshake message fromlloyd2012-08-023-40/+32
* Use TLS v1.0 PRF unless the version supports a ciphersuite specific PRFlloyd2012-08-021-4/+5
* Add TLS::Protocol_Version::supports_ciphersuite_specific_prflloyd2012-08-024-14/+16
* Fix DTLS HelloVerify message decodinglloyd2012-08-021-3/+12
* Use m_ namespace member vars in CurveGFplloyd2012-08-011-35/+36
* Move monty_invert to numthry.h and use it in CurveGFp as welllloyd2012-08-014-51/+48
* Remove z_size parameter to bigint_monty_redc because it should alwayslloyd2012-08-014-26/+12
* Cleanup BigInt::cmplloyd2012-08-014-41/+43
* Move all BigInt constructors to the top of the decllloyd2012-08-011-81/+82
* Remove BigInt::assignlloyd2012-08-012-25/+24
* Remove BigInt(NumberType type, size_t n) and replace it with a staticlloyd2012-08-019-37/+24
* Remove all support for octal BigInt conversions.lloyd2012-08-014-39/+25
* Remove BigInt::get_reglloyd2012-08-013-13/+6
* Remove BigInt::operator[]. Use BigInt::word_at, which checks sizeslloyd2012-08-014-14/+12
* Remove BigInt::operator[] returning a mutable word referencelloyd2012-08-013-13/+9
* Rename the version of BigInt::data returning a mutable pointerlloyd2012-08-015-38/+38
* Remove the mutable version of BigInt::get_reglloyd2012-07-315-22/+18
* m_ namespace BigInt memberslloyd2012-07-313-40/+40
* Remove BigInt::grow_reg which was only used by a few tests.lloyd2012-07-312-14/+4
* Rename activate to more descriptive change_cipher_speclloyd2012-07-295-28/+41
* Use unique_ptr for handshake state, avoid lots of delete+nullptr assignlloyd2012-07-294-48/+43
* If we're going to reject an insecure renegotiation, do it immediately,lloyd2012-07-293-41/+63
* Helper func for loading 24 bit valuelloyd2012-07-281-8/+15
* Pass protocol to initiate_handshakelloyd2012-07-282-5/+7
* Combine client initial handshake and renegotiation in initiate_handshake.lloyd2012-07-282-55/+39
* Fix DTLS version string.lloyd2012-07-285-15/+27
* Make Handshake_Writer non-copyablelloyd2012-07-281-0/+6
* Add format() hook to Handshake_Writer, so that Handshake_Hash does notlloyd2012-07-286-39/+34
* Add Public_Key::estimated_strength which gives an approximation of howlloyd2012-07-279-13/+68