summaryrefslogtreecommitdiff
path: root/networking/tls.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Merge branch 'busybox' into mergeRon Yorston2019-01-101-17/+62
|\
| * tls: add comment about dl.fedoraproject.org needing secp256r1 ECC curveDenys Vlasenko2019-01-081-0/+8
| * tls: prepare for ECDH_anon ciphersDenys Vlasenko2018-12-101-7/+14
| * tls: fix a potential (currently "disabled" by a macro) SHA1-related bugDenys Vlasenko2018-12-101-1/+1
| * tls: if !ENABLE_FEATURE_TLS_SHA1, tls->MAC_size is always SHA256_OUTSIZE for ...Denys Vlasenko2018-12-101-6/+12
| * tls: introduce FEATURE_TLS_SHA1 to make SHA1 code optionalDenys Vlasenko2018-12-101-6/+30
* | Merge branch 'busybox' into mergeRon Yorston2018-11-281-299/+817
|\|
| * tls: add ECDHE_PSK and remove ARIA cipher idsDenys Vlasenko2018-11-271-8/+4
| * tls: add _anon_ cipher definitionsDenys Vlasenko2018-11-261-0/+4
| * tls: enable TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipherDenys Vlasenko2018-11-261-29/+29
| * tls: cipher 009D is not yet supported, don't test for itDenys Vlasenko2018-11-261-4/+3
| * tls: speed up prf_hmac_sha256()Denys Vlasenko2018-11-261-40/+39
| * tls: simplify hmac_begin()Denys Vlasenko2018-11-261-11/+27
| * tls: add support for 8 more cipher ids - all tested to workDenys Vlasenko2018-11-261-87/+117
| * tls: fix commentsDenys Vlasenko2018-11-251-1/+5
| * tls: add a comment on expanding list of supported ciphersDenys Vlasenko2018-11-251-7/+30
| * tls: do not leak RSA keyDenys Vlasenko2018-11-251-0/+1
| * tls: code shrinkDenys Vlasenko2018-11-251-15/+12
| * tls: code shrinkDenys Vlasenko2018-11-251-15/+16
| * tls: code shrinkDenys Vlasenko2018-11-251-1/+1
| * tls: actually fill in CIPHER_ID3 value in hello messageDenys Vlasenko2018-11-251-5/+3
| * tls: fix is.gd again, fix AES-CBC using decrypt key instead of encryptDenys Vlasenko2018-11-241-5/+7
| * tls: speed up xor'ing of aligned 16-byte buffersDenys Vlasenko2018-11-241-10/+24
| * tls: in AES-GCM decoding, avoid memmoveDenys Vlasenko2018-11-241-4/+16
| * tls: make tls_get_random() FAST_FUNCDenys Vlasenko2018-11-231-1/+1
| * tls: code shrinkDenys Vlasenko2018-11-231-15/+16
| * tls: simplify aesgcm_GHASH()Denys Vlasenko2018-11-231-16/+14
| * tls: in AES-CBC code, do not set key for every record - do it onceDenys Vlasenko2018-11-231-3/+9
| * tls: add support for TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 cipherDenys Vlasenko2018-11-231-82/+278
| * tls: add comment, no code changesDenys Vlasenko2018-11-181-2/+14
| * tls: code shrinkDenys Vlasenko2018-11-131-11/+13
| * tls: tidy up recently added ECDSA codeDenys Vlasenko2018-11-131-19/+21
| * tls: add support for ECDHE-ECDSA-AES-128-CBC-SHA and x25519 curveDenys Vlasenko2018-11-131-79/+255
| * tls: code shrinkDenys Vlasenko2018-11-051-8/+4
| * tls: reorder a few more cipher idsDenys Vlasenko2018-11-041-17/+17
| * tls: move TLS_AES_128_GCM_SHA256 definition upDenys Vlasenko2018-11-041-1/+1
| * tls: add more cipher ids, no code changesDenys Vlasenko2018-11-041-15/+48
* | Merge branch 'busybox'Ron Yorston2018-07-251-1/+19
|\|
| * tls: fix to handle X.509 v1 certificates correctlyIvan Abrea2018-06-241-1/+19
* | wget: add support for httpsRon Yorston2018-03-151-0/+6
|/
* tls: remove redundant floor preventionDenys Vlasenko2018-02-141-2/+0
* wget: initial support for ftps://Denys Vlasenko2018-02-061-1/+3
* tls: fix hash calculations if client cert is requested and sentDenys Vlasenko2018-02-061-40/+54
* tls: use capped SNI len everywhereDenys Vlasenko2017-07-041-2/+2
* tls: do not compile in TLS_RSA_WITH_NULL_SHA256 code if unreachableDenys Vlasenko2017-04-041-5/+12
* tls: avoid using int16 in pstm codeDenys Vlasenko2017-04-031-2/+2
* tls: merge sha1 and sha256 hmac functionsDenys Vlasenko2017-04-031-44/+12
* tls: covert i/o loop from using select() to poll()Denys Vlasenko2017-02-161-14/+11
* tls: fold AES CBC en/decryption into single functionsDenys Vlasenko2017-02-041-19/+11
* wget/tls: session_id of zero length is ok (arxiv.org responds with such)Denys Vlasenko2017-02-031-3/+3