index
:
botan.git
master
Unnamed repository; edit this file 'description' to name the repository.
about
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
src
Commit message (
Expand
)
Author
Age
Files
Lines
*
Move min_version and pref_version to the source file so they can be
lloyd
2012-03-02
2
-4
/
+12
*
Bad conditional
lloyd
2012-02-28
1
-1
/
+1
*
We would call the handshake callback twice on session resumption:
lloyd
2012-02-28
1
-20
/
+19
*
Indentation
lloyd
2012-02-27
6
-38
/
+38
*
Actually check CA signatures in Credentials_Manager. This area needs a
lloyd
2012-02-01
6
-18
/
+55
*
Support getting ciphersuites by name as well as suite ID
lloyd
2012-01-28
6
-10
/
+29
*
Add Camellia ciphersuites from RFC 4132.
lloyd
2012-01-28
3
-5
/
+40
*
propagate from branch 'net.randombit.botan' (head 3f6b267bc00d2da1b5d36ca2215...
lloyd
2012-01-28
90
-4462
/
+8276
|
\
|
*
Add anon SRP ciphersuites to the list, add missing _CBC on the
lloyd
2012-01-28
2
-12
/
+27
|
*
Support alternate PRF hashes in TLS 1.2. Add support for the SHA-384
lloyd
2012-01-28
8
-74
/
+90
|
*
Fix inverted conditional
lloyd
2012-01-27
1
-2
/
+2
|
*
Change naming convention to match RFCs
lloyd
2012-01-27
5
-30
/
+26
|
*
Remove debug output
lloyd
2012-01-27
1
-11
/
+0
|
*
Server side PSK
lloyd
2012-01-27
4
-101
/
+124
|
*
Working though somewhat clumsy DHE_PSK and ECDHE_PSK. Tested against GnuTLS
lloyd
2012-01-27
5
-24
/
+100
|
*
Somewhat cleaner PSK handling
lloyd
2012-01-27
3
-27
/
+34
|
*
Server side PSK kex
lloyd
2012-01-27
4
-13
/
+37
|
*
Split up the psk function as the server also wants to be able to look
lloyd
2012-01-27
3
-22
/
+37
|
*
Credentials hooks for PSK
lloyd
2012-01-27
2
-2
/
+27
|
*
Add client-side support for PSK kex. Tested against OpenSSL.
lloyd
2012-01-27
8
-14
/
+97
|
*
First attempt to get certificates matching the name the client sent in
lloyd
2012-01-27
1
-3
/
+27
|
*
Remove Alert::Level enum, replace with bool
lloyd
2012-01-26
5
-14
/
+10
|
*
Change callback interface to pass the Alert object itself instead
lloyd
2012-01-26
8
-17
/
+86
|
*
Make Alert a first class object ala Version. Move the alert codes into
lloyd
2012-01-26
23
-177
/
+224
|
*
Deleting the return of private_key_for in the TLS server forces the
lloyd
2012-01-26
4
-11
/
+11
|
*
Clean up record writer a bit
lloyd
2012-01-25
1
-55
/
+60
|
*
Move around the order of arguments to activate() and add the
lloyd
2012-01-25
5
-14
/
+30
|
*
In earlier versions, key exchange == "RSA" meant export-style
lloyd
2012-01-25
5
-20
/
+22
|
*
Move all key exchange mechanism code (eg DH/ECDH/SRP) out of the
lloyd
2012-01-25
6
-95
/
+143
|
*
Fix printing PSK ciphersuites. Better assert msg.
lloyd
2012-01-25
2
-14
/
+17
|
*
Convenience method
lloyd
2012-01-25
1
-0
/
+2
|
*
Go back to choosing the ciphersuite based on the server's preferences.
lloyd
2012-01-25
5
-25
/
+57
|
*
Hiding SRP users or not is policy. Not sure what the default should be for this
lloyd
2012-01-25
1
-2
/
+10
|
*
Storing the version as a single u16bit makes compares simpler
lloyd
2012-01-24
1
-27
/
+14
|
*
Move extension type here, no need to make it visible to apps
lloyd
2012-01-24
2
-20
/
+20
|
*
s/tls_suites/tls_ciphersuite/
lloyd
2012-01-24
8
-13
/
+14
|
*
Require ECDH and ECDSA modules for TLS. This is slightly non-optimal
lloyd
2012-01-24
1
-0
/
+2
|
*
Add support for the IDEA ciphersuite, though don't require it to be
lloyd
2012-01-24
3
-1
/
+13
|
*
Fix ECC curve negotiation on the server side.
lloyd
2012-01-24
2
-35
/
+34
|
*
We can now actually handle multiple certificate types in the server
lloyd
2012-01-24
8
-57
/
+87
|
*
Remove Certificate_Type enum
lloyd
2012-01-24
3
-16
/
+52
|
*
ECDSA support. Only client side tested
lloyd
2012-01-24
2
-4
/
+4
|
*
Send the supported elliptic curves extension. Instead of hardcoding
lloyd
2012-01-24
8
-23
/
+66
|
*
Get the list of supported ECC curves out of the client hello, and
lloyd
2012-01-24
5
-4
/
+17
|
*
Forgot to check in server side ECDH key gen
lloyd
2012-01-24
1
-3
/
+11
|
*
Allow ECDH negotiation by default
lloyd
2012-01-24
1
-4
/
+1
|
*
For ECDH you don't strip leading zeros. Bikeshedding: 1 Consistency: 0
lloyd
2012-01-24
1
-3
/
+5
|
*
Read ECDH client key exchange messages
lloyd
2012-01-24
1
-25
/
+26
|
*
Working ECDH key exchange. Only tested on client side but seems good
lloyd
2012-01-24
3
-37
/
+95
|
*
Cleanup
lloyd
2012-01-24
1
-10
/
+10
[next]