summaryrefslogtreecommitdiff
path: root/networking/tls.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* tls: avoid unnecessary changes to POSIX build, part 2Ron Yorston2021-01-251-1/+1
* tls: avoid unnecessary changes to POSIX buildRon Yorston2021-01-241-6/+0
* Merge branch 'busybox' into mergeRon Yorston2021-01-141-1/+1
|\
| * decrease paddign: gcc-9.3.1 slaps 32-byte alignment on arrays willy-nillyDenys Vlasenko2020-11-301-1/+1
* | Merge branch 'busybox' into mergeRon Yorston2020-08-231-2/+0
|\|
| * ntpd: fix refid reported in server mode, closes 13056Denys Vlasenko2020-07-201-2/+0
* | Merge branch 'busybox' into mergeRon Yorston2019-08-161-7/+7
|\|
| * libbb: reduce the overhead of single parameter bb_error_msg() callsJames Byrne2019-07-021-7/+7
* | Merge branch 'busybox' into mergeRon Yorston2019-05-271-3/+3
|\|
| * *: slap on a few ALIGN1/2s where appropriateDenys Vlasenko2019-05-211-3/+3
* | Merge branch 'busybox' into mergeRon Yorston2019-01-101-17/+62
|\|
| * tls: add comment about dl.fedoraproject.org needing secp256r1 ECC curveDenys Vlasenko2019-01-081-0/+8
| * tls: prepare for ECDH_anon ciphersDenys Vlasenko2018-12-101-7/+14
| * tls: fix a potential (currently "disabled" by a macro) SHA1-related bugDenys Vlasenko2018-12-101-1/+1
| * tls: if !ENABLE_FEATURE_TLS_SHA1, tls->MAC_size is always SHA256_OUTSIZE for ...Denys Vlasenko2018-12-101-6/+12
| * tls: introduce FEATURE_TLS_SHA1 to make SHA1 code optionalDenys Vlasenko2018-12-101-6/+30
* | Merge branch 'busybox' into mergeRon Yorston2018-11-281-299/+817
|\|
| * tls: add ECDHE_PSK and remove ARIA cipher idsDenys Vlasenko2018-11-271-8/+4
| * tls: add _anon_ cipher definitionsDenys Vlasenko2018-11-261-0/+4
| * tls: enable TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipherDenys Vlasenko2018-11-261-29/+29
| * tls: cipher 009D is not yet supported, don't test for itDenys Vlasenko2018-11-261-4/+3
| * tls: speed up prf_hmac_sha256()Denys Vlasenko2018-11-261-40/+39
| * tls: simplify hmac_begin()Denys Vlasenko2018-11-261-11/+27
| * tls: add support for 8 more cipher ids - all tested to workDenys Vlasenko2018-11-261-87/+117
| * tls: fix commentsDenys Vlasenko2018-11-251-1/+5
| * tls: add a comment on expanding list of supported ciphersDenys Vlasenko2018-11-251-7/+30
| * tls: do not leak RSA keyDenys Vlasenko2018-11-251-0/+1
| * tls: code shrinkDenys Vlasenko2018-11-251-15/+12
| * tls: code shrinkDenys Vlasenko2018-11-251-15/+16
| * tls: code shrinkDenys Vlasenko2018-11-251-1/+1
| * tls: actually fill in CIPHER_ID3 value in hello messageDenys Vlasenko2018-11-251-5/+3
| * tls: fix is.gd again, fix AES-CBC using decrypt key instead of encryptDenys Vlasenko2018-11-241-5/+7
| * tls: speed up xor'ing of aligned 16-byte buffersDenys Vlasenko2018-11-241-10/+24
| * tls: in AES-GCM decoding, avoid memmoveDenys Vlasenko2018-11-241-4/+16
| * tls: make tls_get_random() FAST_FUNCDenys Vlasenko2018-11-231-1/+1
| * tls: code shrinkDenys Vlasenko2018-11-231-15/+16
| * tls: simplify aesgcm_GHASH()Denys Vlasenko2018-11-231-16/+14
| * tls: in AES-CBC code, do not set key for every record - do it onceDenys Vlasenko2018-11-231-3/+9
| * tls: add support for TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 cipherDenys Vlasenko2018-11-231-82/+278
| * tls: add comment, no code changesDenys Vlasenko2018-11-181-2/+14
| * tls: code shrinkDenys Vlasenko2018-11-131-11/+13
| * tls: tidy up recently added ECDSA codeDenys Vlasenko2018-11-131-19/+21
| * tls: add support for ECDHE-ECDSA-AES-128-CBC-SHA and x25519 curveDenys Vlasenko2018-11-131-79/+255
| * tls: code shrinkDenys Vlasenko2018-11-051-8/+4
| * tls: reorder a few more cipher idsDenys Vlasenko2018-11-041-17/+17
| * tls: move TLS_AES_128_GCM_SHA256 definition upDenys Vlasenko2018-11-041-1/+1
| * tls: add more cipher ids, no code changesDenys Vlasenko2018-11-041-15/+48
* | Merge branch 'busybox'Ron Yorston2018-07-251-1/+19
|\|
| * tls: fix to handle X.509 v1 certificates correctlyIvan Abrea2018-06-241-1/+19
* | wget: add support for httpsRon Yorston2018-03-151-0/+6
|/