aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Expand)AuthorAgeFilesLines
* Update cms, cvc, zlib, bzip2, openssl, and gnump modules for the newlloyd2012-06-0729-178/+199
* Report what we have already received on an unexpected statelloyd2012-06-073-9/+11
* Cleanup, m_ namespace Secure_Renegotiation_Statelloyd2012-06-073-26/+28
* Clients sending a SSLv2 hello would cause an internal failure becauselloyd2012-06-072-2/+25
* Fix for DHE, strip_leading_zeros always took off the last bytelloyd2012-06-061-1/+1
* Modify DL_Group::PEM_decode and BER_decode to take values instead oflloyd2012-06-056-21/+19
* Add assert_done checks here to help avoid interesting substitutionlloyd2012-06-052-0/+4
* Always print the include dir as we are never in the default pathlloyd2012-06-051-4/+1
* Wrong OID namelloyd2012-06-011-1/+1
* Missing source file from d8021f3e5aa8812a2843d6afd27bbe56d04af734lloyd2012-06-011-0/+44
* Drop some deprecated functionslloyd2012-06-017-224/+0
* Allow arbitrary ciphers and hashes with PKCS #5 v2.0. The onlylloyd2012-05-318-61/+45
* Add new PBKDF interface that takes a std::chrono::milliseconds andlloyd2012-05-3118-424/+373
* Target GCC 4.7.0 by defaultlloyd2012-05-301-2/+2
* Use libc++ with Clang by default as libstdc++ and Clang don't playlloyd2012-05-301-1/+1
* Call clear_mem instead of memset directlylloyd2012-05-302-6/+7
* Support for the authority information access extension, limited tolloyd2012-05-275-1/+86
* Add an X509_Certificate::allowed_usage for extended constraints.lloyd2012-05-275-51/+64
* Signature verification on OCSP responses. Still needs a bit of APIlloyd2012-05-274-18/+89
* Derive X509_Object from ASN1_Object.lloyd2012-05-277-30/+52
* Initial ability to check the results.lloyd2012-05-273-26/+34
* Very preliminary and fairly nasty OCSP support. Client side only. Canlloyd2012-05-275-0/+408
* Have BER_Deocder::decode_list actually start the SEQUENCE. All callerslloyd2012-05-273-12/+22
* Remove the PRIVATE ASN.1 tag. Not being used outside of the prettylloyd2012-05-274-5/+6
* Several new hooks in X509_Certificate to get raw (from the certlloyd2012-05-272-9/+39
* No reason to use secure_vector herelloyd2012-05-262-2/+2
* Use std::deque instead of SecureQueue in TLS::Stream_Handshake_Readerlloyd2012-05-263-16/+18
* Plain hex_decode now returns a std::vector, use hex_decode_locked tolloyd2012-05-265-18/+66
* Only build the mlock allocator on Linux, *BSD, or Solaris.lloyd2012-05-261-0/+8
* Some post merge fixups.lloyd2012-05-2512-69/+33
* propagate from branch 'net.randombit.botan.x509-path-validation' (head 63b5a2...lloyd2012-05-25541-9386/+14284
|\
| * Two more locking_allocator bugs. In allocate, we did not setlloyd2012-05-251-5/+9
| * Use std::async for parallel CRT in Rabin Williams signature generation.lloyd2012-05-251-6/+7
| * Remove targets clang doesn't actually supportlloyd2012-05-251-6/+0
| * Always use -pthread with clang, matching gcc behaviorlloyd2012-05-251-5/+3
| * Include <string> in buf_comp.h and filter.h as we used std::string butlloyd2012-05-253-16/+2
| * Resize key arrays in HMAC and SSL3_MAC when the key is set.lloyd2012-05-255-18/+19
| * Fix alignment again and add assert checks so we don't mess up again.lloyd2012-05-251-4/+30
| * For block and stream ciphers, don't set the size of the key vectorslloyd2012-05-2558-193/+205
| * Instead of a map of start->length for recording the free list use alloyd2012-05-242-33/+44
| * Properly align return values of mlock_allocator. Be more careful aboutlloyd2012-05-226-108/+35
| * Remove a debug call in secmem.h.lloyd2012-05-224-4/+220
| * Replace 0 and NULL pointer constants with nullptr. Also fix an oldlloyd2012-05-1863-176/+179
| * Fairly huge update that replaces the old secmem types with std::vectorlloyd2012-05-18379-2834/+2047
| * propagate from branch 'net.randombit.botan' (head 6332543aa5a8a4cc13662008ff9...lloyd2012-05-1812-99/+793
| |\
| | * NR_Verification_Operation::verify_mr would return false if the inputlloyd2012-05-182-2/+5
| | * Pipe::reset's requirement that a message be completed meant thatlloyd2012-05-181-2/+0
| | * We were checking the wrong bit for rdrand support. Found using SDE'slloyd2012-05-101-1/+1
| | * Markus Wanner pointed out on the mailing list that using rdrand opcodelloyd2012-05-071-3/+8
| | * Padding wasn't set for DSA keys. Irrelevant for cert verify as thatlloyd2012-05-022-3/+3