aboutsummaryrefslogtreecommitdiff
path: root/networking/tls.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* decrease paddign: gcc-9.3.1 slaps 32-byte alignment on arrays willy-nillyDenys Vlasenko2020-11-301-1/+1
* ntpd: fix refid reported in server mode, closes 13056Denys Vlasenko2020-07-201-2/+0
* libbb: reduce the overhead of single parameter bb_error_msg() callsJames Byrne2019-07-021-7/+7
* *: slap on a few ALIGN1/2s where appropriateDenys Vlasenko2019-05-211-3/+3
* tls: add comment about dl.fedoraproject.org needing secp256r1 ECC curveDenys Vlasenko2019-01-081-0/+8
* tls: prepare for ECDH_anon ciphersDenys Vlasenko2018-12-101-7/+14
* tls: fix a potential (currently "disabled" by a macro) SHA1-related bugDenys Vlasenko2018-12-101-1/+1
* tls: if !ENABLE_FEATURE_TLS_SHA1, tls->MAC_size is always SHA256_OUTSIZE for ...Denys Vlasenko2018-12-101-6/+12
* tls: introduce FEATURE_TLS_SHA1 to make SHA1 code optionalDenys Vlasenko2018-12-101-6/+30
* tls: add ECDHE_PSK and remove ARIA cipher idsDenys Vlasenko2018-11-271-8/+4
* tls: add _anon_ cipher definitionsDenys Vlasenko2018-11-261-0/+4
* tls: enable TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipherDenys Vlasenko2018-11-261-29/+29
* tls: cipher 009D is not yet supported, don't test for itDenys Vlasenko2018-11-261-4/+3
* tls: speed up prf_hmac_sha256()Denys Vlasenko2018-11-261-40/+39
* tls: simplify hmac_begin()Denys Vlasenko2018-11-261-11/+27
* tls: add support for 8 more cipher ids - all tested to workDenys Vlasenko2018-11-261-87/+117
* tls: fix commentsDenys Vlasenko2018-11-251-1/+5
* tls: add a comment on expanding list of supported ciphersDenys Vlasenko2018-11-251-7/+30
* tls: do not leak RSA keyDenys Vlasenko2018-11-251-0/+1
* tls: code shrinkDenys Vlasenko2018-11-251-15/+12
* tls: code shrinkDenys Vlasenko2018-11-251-15/+16
* tls: code shrinkDenys Vlasenko2018-11-251-1/+1
* tls: actually fill in CIPHER_ID3 value in hello messageDenys Vlasenko2018-11-251-5/+3
* tls: fix is.gd again, fix AES-CBC using decrypt key instead of encryptDenys Vlasenko2018-11-241-5/+7
* tls: speed up xor'ing of aligned 16-byte buffersDenys Vlasenko2018-11-241-10/+24
* tls: in AES-GCM decoding, avoid memmoveDenys Vlasenko2018-11-241-4/+16
* tls: make tls_get_random() FAST_FUNCDenys Vlasenko2018-11-231-1/+1
* tls: code shrinkDenys Vlasenko2018-11-231-15/+16
* tls: simplify aesgcm_GHASH()Denys Vlasenko2018-11-231-16/+14
* tls: in AES-CBC code, do not set key for every record - do it onceDenys Vlasenko2018-11-231-3/+9
* tls: add support for TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 cipherDenys Vlasenko2018-11-231-82/+278
* tls: add comment, no code changesDenys Vlasenko2018-11-181-2/+14
* tls: code shrinkDenys Vlasenko2018-11-131-11/+13
* tls: tidy up recently added ECDSA codeDenys Vlasenko2018-11-131-19/+21
* tls: add support for ECDHE-ECDSA-AES-128-CBC-SHA and x25519 curveDenys Vlasenko2018-11-131-79/+255
* tls: code shrinkDenys Vlasenko2018-11-051-8/+4
* tls: reorder a few more cipher idsDenys Vlasenko2018-11-041-17/+17
* tls: move TLS_AES_128_GCM_SHA256 definition upDenys Vlasenko2018-11-041-1/+1
* tls: add more cipher ids, no code changesDenys Vlasenko2018-11-041-15/+48
* tls: fix to handle X.509 v1 certificates correctlyIvan Abrea2018-06-241-1/+19
* tls: remove redundant floor preventionDenys Vlasenko2018-02-141-2/+0
* wget: initial support for ftps://Denys Vlasenko2018-02-061-1/+3
* tls: fix hash calculations if client cert is requested and sentDenys Vlasenko2018-02-061-40/+54
* tls: use capped SNI len everywhereDenys Vlasenko2017-07-041-2/+2
* tls: do not compile in TLS_RSA_WITH_NULL_SHA256 code if unreachableDenys Vlasenko2017-04-041-5/+12
* tls: avoid using int16 in pstm codeDenys Vlasenko2017-04-031-2/+2
* tls: merge sha1 and sha256 hmac functionsDenys Vlasenko2017-04-031-44/+12
* tls: covert i/o loop from using select() to poll()Denys Vlasenko2017-02-161-14/+11
* tls: fold AES CBC en/decryption into single functionsDenys Vlasenko2017-02-041-19/+11
* wget/tls: session_id of zero length is ok (arxiv.org responds with such)Denys Vlasenko2017-02-031-3/+3