aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Expand)AuthorAgeFilesLines
* Remove the support for writing application data before the handshakelloyd2012-01-042-14/+3
* As someone pointed out on the TLS list, NPN isn't really a negotiationlloyd2012-01-048-23/+23
* The first 4 bytes of the client and server randoms are supposed to belloyd2012-01-043-4/+16
* Split hello.cpp into c_hello.cpp and s_hello.cpplloyd2012-01-048-223/+271
* Add support for next protocol negotiation. Client only currently;lloyd2012-01-0412-104/+362
* Fix unused param warnings. Comments in headerlloyd2012-01-032-25/+32
* If the handshake_fn returns false explicitly remove the session fromlloyd2012-01-032-0/+4
* Assume handshake_fn existslloyd2012-01-031-6/+1
* Make handshake completion function non-optional. Now returns a boollloyd2012-01-036-17/+16
* Add Credentials_Manager which is an interface to something that knowslloyd2012-01-0312-73/+202
* Code for NewSessionTicket handshake messagelloyd2012-01-031-0/+1
* Some basic infrastructure pieces for SRP (policy, etc)lloyd2011-12-316-23/+46
* Add support for client-side session resumptionlloyd2011-12-3110-101/+228
* Better names on the session manager. Plausible client lookup support,lloyd2011-12-303-23/+57
* Rename the session type to 'TLS_Session'. Split the manager out intolloyd2011-12-3013-164/+215
* Add a function for getting the version number of an active connection.lloyd2011-12-3016-39/+85
* Add support for the maximum fragment length extension. No hooks for itlloyd2011-12-309-141/+288
* Prevent ping-ponging of close alerts by tracking both if a handshakelloyd2011-12-304-18/+31
* Full support for renegotiation including RFC 5746 extensions forlloyd2011-12-308-42/+133
* Server side handling of the secure renegotiation extension.lloyd2011-12-303-2/+26
* Many renegotiation fixes. Add support for the secure renegotiationlloyd2011-12-3013-36/+209
* Reset the sequence numbers when we activate a connection state. Thislloyd2011-12-302-0/+9
* About half an implementation of RFC 5746lloyd2011-12-2910-68/+158
* Add support for sending server name indicator in client hellolloyd2011-12-2911-70/+379
* Clean up the ordering of constructor args to the various message typeslloyd2011-12-299-99/+108
* SSLv3 clients will send this as a warning if the server requests alloyd2011-12-291-0/+1
* Ref mozilla bug alsolloyd2011-12-291-2/+2
* Only insert small fragments for application records. Handshakes wouldlloyd2011-12-291-1/+1
* Don't buffer in the record writer at all - we immediately process andlloyd2011-12-287-64/+42
* Fix for RC4 suiteslloyd2011-12-281-1/+2
* Optimization/work on future optimization for the record writer;lloyd2011-12-282-50/+67
* Rounding to nearest 0 should be a no-oplloyd2011-12-281-0/+6
* Add support for raw deflate in the zlib filterlloyd2011-12-282-12/+35
* Comment grammarlloyd2011-12-281-2/+2
* Fixlloyd2011-12-281-0/+1
* Cleanerlloyd2011-12-282-3/+2
* Fixes for DSA authlloyd2011-12-282-8/+11
* Add non-null assertion, don't print msg if empty stringlloyd2011-12-282-1/+11
* Assert there is nothing left over at the end of packet parsing.lloyd2011-12-281-0/+6
* Additional bits for SSLv3 client authlloyd2011-12-284-9/+37
* Save peer certs in session info. Use helper function for handshakelloyd2011-12-285-42/+30
* Working though hacking client verify (server side only). Only supportslloyd2011-12-2817-62/+123
* Remove debug print, include info in the exception msg insteadlloyd2011-12-281-8/+3
* Slightly better alert option for this caselloyd2011-12-281-1/+1
* We wouldn't send an alert before handshaking was complete becauselloyd2011-12-281-7/+4
* Make TLS_Session_Params a real class. Various cleanups.lloyd2011-12-286-124/+193
* Partial bits of the server side of client auth. Incomplete.lloyd2011-12-286-39/+87
* Make tls_session_key.h an internal headerlloyd2011-12-279-8/+18
* Actually send the right info in a resumed session server hellolloyd2011-12-271-7/+4
* Force resumed session to use previous ciphersuite, etclloyd2011-12-274-26/+73