aboutsummaryrefslogtreecommitdiffstats
path: root/src/libtls
Commit message (Expand)AuthorAgeFilesLines
* Send TLS close notify during tls_socket_t destructionMartin Willi2013-01-151-2/+25
* Send TLS close notify if application returns SUCCESSMartin Willi2013-01-151-2/+6
* Block TLS read when sending data, but have to wait for the handshake data firstMartin Willi2013-01-151-4/+11
* Use a more POSIXy tls_socket interface with more flexibility.Martin Willi2013-01-152-81/+165
* Fixed encoding of TLS extensions (elliptic_curves and signature_algorithms)Tobias Brunner2012-11-282-0/+2
* Moved debug.[ch] to utils folderTobias Brunner2012-10-2410-10/+10
* Moved data structures to new collections subfolderTobias Brunner2012-10-242-3/+3
* Added missing break when building TLS cipher suitesTobias Brunner2012-09-281-0/+1
* Don't allow NULL encryption with PEAPMartin Willi2012-09-121-1/+3
* Use memmove on overlapping regions, and operate with correct sizeof()Martin Willi2012-09-121-2/+2
* Whitespace cleanups in tls_eapMartin Willi2012-09-121-6/+6
* Check if TLS handshake received Finished before processing application dataMartin Willi2012-08-091-0/+6
* Fix tls_prf bug introduced with bc474883Martin Willi2012-07-171-4/+7
* Add a return value to hasher_t.allocate_hash()Martin Willi2012-07-161-2/+2
* Add a return value to hasher_t.get_hash()Martin Willi2012-07-161-4/+4
* Add a return value to crypter_t.set_key()Martin Willi2012-07-161-4/+10
* Add a return value to crypter_t.decrypt()Martin Willi2012-07-161-1/+6
* Add a return value to crypter_t.encryptMartin Willi2012-07-161-1/+10
* Check rng return value when generating TLS session identifiersMartin Willi2012-07-161-3/+3
* Check rng return value when generating secrets and IVs in libtlsTobias Brunner2012-07-163-16/+20
* Add a return value to prf_t.set_key()Martin Willi2012-07-161-5/+4
* Add a return value to prf_t.get_bytes()Martin Willi2012-07-161-5/+8
* Add a return value to tls_prf_t.set_key()Martin Willi2012-07-163-9/+13
* Add a return value to tls_prf_t.get_bytes()Martin Willi2012-07-163-20/+42
* Add a return value to signer_t.set_key()Martin Willi2012-07-161-4/+10
* Add a return value to tls_crypto_t.derive_secrets()Martin Willi2012-07-164-21/+44
* Add a return value to signer_t.get_signature()Martin Willi2012-07-161-8/+9
* Add a return value to signer_t.allocate_signature()Martin Willi2012-07-161-1/+5
* eliminate message length field in EAP-TNCAndreas Steffen2012-07-111-2/+6
* allow to transmit 64k TLS Handshake and Application messages via EAP-[T]TLSAndreas Steffen2012-07-113-19/+23
* some tls_eap optimizationsAndreas Steffen2012-07-111-10/+13
* max_message_count = 0 disables limitAndreas Steffen2012-07-111-1/+1
* log invalid TLS packet lengthAndreas Steffen2012-07-111-1/+2
* Install dev headers only if --with-dev-headers= option is setMartin Willi2012-07-111-1/+3
* Install libtls development headersMartin Willi2012-07-111-12/+9
* Double check if a cached suite is available, overwrite any old suite stateMartin Willi2012-02-071-2/+3
* Some Doxygen fixes.Tobias Brunner2012-02-071-9/+9
* Fix TLS EAP-MSK derivation, uses different order of randoms than key expansionMartin Willi2012-02-071-0/+1
* Filter TLS suite MAC by HMAC algorithm, as the hash is not necessarily the sameMartin Willi2012-02-071-4/+4
* Added a tls_socket_t.splice method to wrap a file descriptor into TLSMartin Willi2011-12-312-5/+107
* Implemented TLS session resumption both as client and as serverMartin Willi2011-12-3111-100/+266
* Implemented a TLS session cacheMartin Willi2011-12-313-0/+316
* Check for cipherspec changes after each handshake messageMartin Willi2011-12-311-2/+6
* Separated cipherspec checking and switching, allowing us to defer the secondMartin Willi2011-12-314-33/+49
* Be less verbose about TLS extensionsMartin Willi2011-12-241-1/+1
* In TLS 1.2, PRF and HASH function use at least SHA-256, not the MAC hash func...Martin Willi2011-12-241-20/+20
* Added a getter for the tls_socket file descriptorMartin Willi2011-12-242-0/+14
* added dummy libtls_init() function needed for integrity testingAndreas Steffen2011-11-082-0/+13
* Don't allocate extra memory to MAC the TLS headerMartin Willi2011-09-281-22/+23
* Verify TLS MAC even if padding is invalid to prevent timing attacksMartin Willi2011-09-281-6/+4