aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Expand)AuthorAgeFilesLines
...
* Missing constantlloyd2012-08-131-0/+2
* Reject SRP6 values which are negative or larger than p since these arelloyd2012-08-111-2/+2
* Working fragmentation. Initial start at flight tracking.lloyd2012-08-102-14/+63
* Hooks for DTLS fragmentationlloyd2012-08-102-12/+32
* Make the CCS message a Handshake_Msg and send it through the handshakelloyd2012-08-105-12/+31
* Const arg of Handshake_IO::sendlloyd2012-08-102-5/+5
* Instead of using static salts in the KDF for generating the cipher andlloyd2012-08-091-7/+22
* Remove stray newlinelloyd2012-08-091-1/+0
* Lame but usable DTLS defragmentationlloyd2012-08-092-7/+15
* We weren't handling DTLS handshake fragments at all. Now reject themlloyd2012-08-082-24/+35
* Clean up DTLS handshake formattinglloyd2012-08-082-19/+21
* Make Handshake_IO::format constlloyd2012-08-082-5/+5
* Fix DTLS handshake encoding. Handle multiple messages in a packet.lloyd2012-08-082-31/+72
* DTLS needs some help with ChangeCipherSpec because it is not includedlloyd2012-08-085-11/+51
* Move check of plaintext size to after MAC check. Use assign instead oflloyd2012-08-071-8/+8
* Remove Handshake_IO::have_full_record and Handshake_IO::emptylloyd2012-08-073-50/+14
* This was in an awkward placelloyd2012-08-071-2/+1
* Track the sequence number and return it from the record reader. Takelloyd2012-08-075-15/+33
* Wrap lineslloyd2012-08-062-2/+7
* Fix parenslloyd2012-08-061-1/+1
* Add a Policy item for if a client will accept a server-initiatedlloyd2012-08-062-1/+7
* Expose Handshake_Message as an API type.lloyd2012-08-069-66/+117
* Don't need to make these privatelloyd2012-08-061-5/+3
* The client wasn't sending a next protocol message on a sessionlloyd2012-08-061-0/+11
* A heartbeat request send by the counterparty during a handshake wouldlloyd2012-08-061-5/+8
* Move server-specific parts of the handshake state to a server subclass.lloyd2012-08-064-21/+29
* Move things that are client specific in the handshake state to alloyd2012-08-062-16/+28
* Make the handshake hash privatelloyd2012-08-067-33/+36
* Make handshake session keys private with get/setlloyd2012-08-066-24/+33
* Make the handshake Ciphersuite only available by const reference.lloyd2012-08-068-36/+35
* Const Handshake_State args where possiblelloyd2012-08-063-5/+5
* Move Certificate message to it's own file.lloyd2012-08-064-68/+89
* Use unique_ptr in Server_Kex_Exchange and Extensionslloyd2012-08-064-37/+19
* Store record MAC objects in unique_ptrlloyd2012-08-063-21/+12
* Have all the TLS handshake messages stored in unique_ptrs with onlylloyd2012-08-0615-294/+436
* m_ namespace remaining TLS messageslloyd2012-08-065-78/+78
* In the in-memory session manager, choose a random key at startup andlloyd2012-08-053-10/+28
* Remove Channel::read_handshake. Have the server set expected next msglloyd2012-08-054-43/+15
* If we're negotiating a datagram protocol, allow a hello verifylloyd2012-08-031-2/+20
* Take the initial record version from the Handshake_IO instance insteadlloyd2012-08-035-3/+24
* Add Handshake_Hash::resetlloyd2012-08-033-3/+24
* Add preliminary IO handler for datagram handshakes. Does not fragmentlloyd2012-08-032-0/+184
* Rename all the message source files to msg_lloyd2012-08-0311-10/+10
* Combine Handshake_Writer and Handshake_Reader into Handshake_IO.lloyd2012-08-0320-245/+170
* Move the code that pretends a CCS message is a handshake message fromlloyd2012-08-023-40/+32
* Use TLS v1.0 PRF unless the version supports a ciphersuite specific PRFlloyd2012-08-021-4/+5
* Add TLS::Protocol_Version::supports_ciphersuite_specific_prflloyd2012-08-024-14/+16
* Fix DTLS HelloVerify message decodinglloyd2012-08-021-3/+12
* Use m_ namespace member vars in CurveGFplloyd2012-08-011-35/+36
* Move monty_invert to numthry.h and use it in CurveGFp as welllloyd2012-08-014-51/+48