aboutsummaryrefslogtreecommitdiff
path: root/networking/tls.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* tls: add ECDHE_PSK and remove ARIA cipher idsDenys Vlasenko2018-11-271-8/+4
* tls: add _anon_ cipher definitionsDenys Vlasenko2018-11-261-0/+4
* tls: enable TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipherDenys Vlasenko2018-11-261-29/+29
* tls: cipher 009D is not yet supported, don't test for itDenys Vlasenko2018-11-261-4/+3
* tls: speed up prf_hmac_sha256()Denys Vlasenko2018-11-261-40/+39
* tls: simplify hmac_begin()Denys Vlasenko2018-11-261-11/+27
* tls: add support for 8 more cipher ids - all tested to workDenys Vlasenko2018-11-261-87/+117
* tls: fix commentsDenys Vlasenko2018-11-251-1/+5
* tls: add a comment on expanding list of supported ciphersDenys Vlasenko2018-11-251-7/+30
* tls: do not leak RSA keyDenys Vlasenko2018-11-251-0/+1
* tls: code shrinkDenys Vlasenko2018-11-251-15/+12
* tls: code shrinkDenys Vlasenko2018-11-251-15/+16
* tls: code shrinkDenys Vlasenko2018-11-251-1/+1
* tls: actually fill in CIPHER_ID3 value in hello messageDenys Vlasenko2018-11-251-5/+3
* tls: fix is.gd again, fix AES-CBC using decrypt key instead of encryptDenys Vlasenko2018-11-241-5/+7
* tls: speed up xor'ing of aligned 16-byte buffersDenys Vlasenko2018-11-241-10/+24
* tls: in AES-GCM decoding, avoid memmoveDenys Vlasenko2018-11-241-4/+16
* tls: make tls_get_random() FAST_FUNCDenys Vlasenko2018-11-231-1/+1
* tls: code shrinkDenys Vlasenko2018-11-231-15/+16
* tls: simplify aesgcm_GHASH()Denys Vlasenko2018-11-231-16/+14
* tls: in AES-CBC code, do not set key for every record - do it onceDenys Vlasenko2018-11-231-3/+9
* tls: add support for TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 cipherDenys Vlasenko2018-11-231-82/+278
* tls: add comment, no code changesDenys Vlasenko2018-11-181-2/+14
* tls: code shrinkDenys Vlasenko2018-11-131-11/+13
* tls: tidy up recently added ECDSA codeDenys Vlasenko2018-11-131-19/+21
* tls: add support for ECDHE-ECDSA-AES-128-CBC-SHA and x25519 curveDenys Vlasenko2018-11-131-79/+255
* tls: code shrinkDenys Vlasenko2018-11-051-8/+4
* tls: reorder a few more cipher idsDenys Vlasenko2018-11-041-17/+17
* tls: move TLS_AES_128_GCM_SHA256 definition upDenys Vlasenko2018-11-041-1/+1
* tls: add more cipher ids, no code changesDenys Vlasenko2018-11-041-15/+48
* tls: fix to handle X.509 v1 certificates correctlyIvan Abrea2018-06-241-1/+19
* tls: remove redundant floor preventionDenys Vlasenko2018-02-141-2/+0
* wget: initial support for ftps://Denys Vlasenko2018-02-061-1/+3
* tls: fix hash calculations if client cert is requested and sentDenys Vlasenko2018-02-061-40/+54
* tls: use capped SNI len everywhereDenys Vlasenko2017-07-041-2/+2
* tls: do not compile in TLS_RSA_WITH_NULL_SHA256 code if unreachableDenys Vlasenko2017-04-041-5/+12
* tls: avoid using int16 in pstm codeDenys Vlasenko2017-04-031-2/+2
* tls: merge sha1 and sha256 hmac functionsDenys Vlasenko2017-04-031-44/+12
* tls: covert i/o loop from using select() to poll()Denys Vlasenko2017-02-161-14/+11
* tls: fold AES CBC en/decryption into single functionsDenys Vlasenko2017-02-041-19/+11
* wget/tls: session_id of zero length is ok (arxiv.org responds with such)Denys Vlasenko2017-02-031-3/+3
* tls: can download kernels now :)Denys Vlasenko2017-01-241-52/+120
* tls: if got CERTIFICATE_REQUEST, send an empty CERTIFICATEDenys Vlasenko2017-01-241-20/+45
* tls: add 2nd cipher_id, TLS_RSA_WITH_AES_128_CBC_SHA, so far it doesn't workDenys Vlasenko2017-01-241-165/+248
* tls: reorder tls_handshake_data fields for smaller size, tweak commentsDenys Vlasenko2017-01-231-16/+9
* tls: send EMPTY_RENEGOTIATION_INFO_SCSV in our client helloDenys Vlasenko2017-01-231-26/+86
* tls: set TLS_DEBUG to 0; placate a gcc indentation warningDenys Vlasenko2017-01-231-1/+1
* separate TLS code into a library, use in in wgetDenys Vlasenko2017-01-231-106/+45
* tls: reorder tls_state fields for smaller offsetsDenys Vlasenko2017-01-211-18/+20
* tls: send SNI in the client helloDenys Vlasenko2017-01-201-19/+52