1. b6b0956 Rm of memset instead of x509_crt_init() by Paul Bakker · 12 years ago
  2. c559c7a Renamed x509_cert structure to x509_crt for consistency by Paul Bakker · 12 years ago
  3. ddf26b4 Renamed x509parse_* functions to new form by Paul Bakker · 12 years ago
  4. 7c6b2c3 Split up X509 files into smaller modules by Paul Bakker · 12 years ago
  5. 2292d1f Fixed warnings in case POLARSSL_X509_PARSE_C is not defined by Paul Bakker · 12 years ago
  6. f7dc378 Make CBC an option, step 1: ssl ciphersuites by Manuel Pégourié-Gonnard · 12 years ago
  7. bfb355c Fix memory leak on missed session reuse by Manuel Pégourié-Gonnard · 12 years ago
  8. d13a409 GCM ciphersuites using only cipher layer by Manuel Pégourié-Gonnard · 12 years ago
  9. b8bd593 Restrict cipher_update() for GCM by Manuel Pégourié-Gonnard · 12 years ago
  10. 226d5da GCM ciphersuites partially using cipher layer by Manuel Pégourié-Gonnard · 12 years ago
  11. 45125bc Changes to handle merged enhancements by Paul Bakker · 12 years ago
  12. ea6ad3f ARC4 ciphersuites using only cipher layer by Paul Bakker · 12 years ago
  13. cca5b81 All CBC ciphersuites via the cipher layer by Paul Bakker · 12 years ago
  14. da02a7f AES_CBC ciphersuites now run purely via cipher layer by Paul Bakker · 12 years ago
  15. c852a68 More robust selection of ctx_enc size by Manuel Pégourié-Gonnard · 12 years ago
  16. 577e006 Merged ECDSA-based key-exchange and ciphersuites into development by Paul Bakker · 12 years ago
  17. 2fb15f6 Un-rename ssl_set_own_cert_alt() by Manuel Pégourié-Gonnard · 12 years ago
  18. a20c58c Use convert functions for SSL_SIG_* and SSL_HASH_* by Manuel Pégourié-Gonnard · 12 years ago
  19. 0d42049 Merge code for RSA and ECDSA in SSL by Manuel Pégourié-Gonnard · 12 years ago
  20. 070cc7f Use the new PK RSA-alt interface by Manuel Pégourié-Gonnard · 12 years ago
  21. 8df2769 Introduce pk_sign() and use it in ssl by Manuel Pégourié-Gonnard · 12 years ago
  22. ac75523 Adapt ssl_set_own_cert() to generic keys by Manuel Pégourié-Gonnard · 12 years ago
  23. 0be444a Ability to disable server_name extension (RFC 6066) by Paul Bakker · 12 years ago
  24. d2f068e Ability to enable / disable SSL v3 / TLS 1.0 / TLS 1.1 / TLS 1.2 individually by Paul Bakker · 12 years ago
  25. fb08fd2 Entropy collector and CTR-DRBG now also work on SHA-256 if SHA-512 not available by Paul Bakker · 12 years ago
  26. 38d1eba Move verify_result from ssl_context to session by Manuel Pégourié-Gonnard · 12 years ago
  27. 75c1a6f Fixed potential heap buffer overflow on large hostname setting by Paul Bakker · 12 years ago
  28. 5fd4917 Add missing ifdefs in ssl modules by Paul Bakker · 12 years ago
  29. 1f2bc62 Made support for the truncated_hmac extension configurable by Paul Bakker · 12 years ago
  30. 05decb2 Made support for the max_fragment_length extension configurable by Paul Bakker · 12 years ago
  31. 606b4ba Session ticket expiration checked on server by Paul Bakker · 12 years ago
  32. a503a63 Made session tickets support configurable from config.h by Paul Bakker · 12 years ago
  33. 56dc9e8 Authenticate session tickets. by Manuel Pégourié-Gonnard · 12 years ago
  34. 990c51a Encrypt session tickets by Manuel Pégourié-Gonnard · 12 years ago
  35. 779e429 Start adding ticket keys (only key_name for now) by Manuel Pégourié-Gonnard · 12 years ago
  36. aa0d4d1 Add ssl_set_session_tickets() by Manuel Pégourié-Gonnard · 12 years ago
  37. 06650f6 Fix reusing session more than once by Manuel Pégourié-Gonnard · 12 years ago
  38. c086cce Don't cache empty session ID nor resumed session by Manuel Pégourié-Gonnard · 12 years ago
  39. 7cd5924 Rework NewSessionTicket handling in state machine by Manuel Pégourié-Gonnard · 12 years ago
  40. 7a358b8 ssl_srv: write & parse session ticket ext & msg by Manuel Pégourié-Gonnard · 12 years ago
  41. a5cc602 Parse NewSessionTicket message by Manuel Pégourié-Gonnard · 12 years ago
  42. 75d4401 Introduce ticket field in session structure by Manuel Pégourié-Gonnard · 12 years ago
  43. 5f280cc Implement saving peer cert as part of session. by Manuel Pégourié-Gonnard · 12 years ago
  44. 7471803 Add ssl_get_session() to save session on client by Manuel Pégourié-Gonnard · 12 years ago
  45. 8c1ede6 Changed prototype for ssl_set_truncated_hmac() to allow disabling by Paul Bakker · 12 years ago
  46. 277f7f2 Implement hmac truncation by Manuel Pégourié-Gonnard · 12 years ago
  47. e980a99 Add interface for truncated hmac by Manuel Pégourié-Gonnard · 12 years ago
  48. e048b67 Misc minor fixes by Manuel Pégourié-Gonnard · 12 years ago
  49. ed4af8b Move negotiated max fragment length to session by Manuel Pégourié-Gonnard · 12 years ago
  50. 581e6b6 Prepare migrating max fragment length to session by Manuel Pégourié-Gonnard · 12 years ago
  51. 6b4f237 Forbid setting max_frag_len > MAX_CONTENT_LEN by Manuel Pégourié-Gonnard · 12 years ago
  52. 30dc7ef Reset max_fragment_length in ssl_session_reset() by Manuel Pégourié-Gonnard · 12 years ago
  53. 787b658 Implement max_frag_len write restriction by Manuel Pégourié-Gonnard · 12 years ago
  54. 8b46459 Add ssl_set_max_frag_len() by Manuel Pégourié-Gonnard · 12 years ago
  55. 61d113b Init and free new contexts in the right place for SSL to prevent memory leaks by Paul Bakker · 12 years ago
  56. fa9b100 Also compiles / runs without time-based functions in OS by Paul Bakker · 12 years ago
  57. 6e339b5 Memory-allocation abstraction layer and buffer-based allocator added by Paul Bakker · 12 years ago
  58. abf2f8f zlib compression/decompression skipped on empty blocks by Paul Bakker · 12 years ago
  59. e5bffc3 Removed redundant includes by Paul Bakker · 12 years ago
  60. d2681d8 Renamed sha2.{c,h} to sha256.{c,h} and sha4.{c,h} to sha512.{c,h} by Paul Bakker · 12 years ago
  61. 9e36f04 SHA2 renamed to SHA256, SHA4 renamed to SHA512 and functions accordingly by Paul Bakker · 12 years ago
  62. 2fbefde Client and server now filter sent and accepted ciphersuites on minimum by Paul Bakker · 12 years ago
  63. b6c5d2e Cleanup up non-prototyped functions (static) and const-correctness by Paul Bakker · 12 years ago
  64. 90995b5 Added mechanism to provide alternative cipher / hash implementations by Paul Bakker · 12 years ago
  65. 89ecb2d ssl_parse_certificate() now calls x509parse_crt_der() directly by Paul Bakker · 12 years ago
  66. 3c2122f Fixed const correctness issues that have no impact on the ABI by Paul Bakker · 12 years ago
  67. 48f7a5d DHE-PSK based ciphersuite support added and cleaner key exchange based by Paul Bakker · 12 years ago
  68. ed27a04 More granular define selections within code to allow for smaller code sizes by Paul Bakker · 12 years ago
  69. d4a56ec Added pre-shared key handling for the client side of SSL / TLS by Paul Bakker · 12 years ago
  70. f7abd42 Removed extra spaces on end of lines by Paul Bakker · 12 years ago
  71. 8f4ddae Ability to specify allowed ciphersuites based on the protocol version. by Paul Bakker · 12 years ago
  72. b7149bc Corrected behaviour for CBC-based suites using the SHA384 MAC and PRF by Paul Bakker · 12 years ago
  73. 41c83d3 Added Ephemeral Elliptic Curve Diffie Hellman ciphersuites to SSL/TLS by Paul Bakker · 12 years ago
  74. 68884e3 Moved to advanced ciphersuite representation and more dynamic SSL code by Paul Bakker · 13 years ago
  75. c9118b4 Renamed hash structures to ctx by Paul Bakker · 12 years ago
  76. 92be97b Align data with future location based on IV size by Paul Bakker · 13 years ago
  77. 07eb38b Update ssl_hw_record_init() to receive keylen, ivlen and maclen as well by Paul Bakker · 13 years ago
  78. c787811 Do not set done in case of a fall-through by Paul Bakker · 13 years ago
  79. 5bd4229 Reverted commit 186751d9dd28082d4b19e69a2c15fd432d366133 and made out_hdr and out_msg back-to-back again by Paul Bakker · 13 years ago
  80. 926c8e4 Fixed possible NULL pointer exception in ssl_get_ciphersuite() by Paul Bakker · 12 years ago
  81. e47b34b Removed further timing differences during SSL message decryption in ssl_decrypt_buf() by Paul Bakker · 12 years ago
  82. 86f04f4 Fixed comment by Paul Bakker · 12 years ago
  83. c046350 Fixed memory leak in ssl_free() and ssl_reset() for active session by Paul Bakker · 12 years ago
  84. 40865c8 Added sending of alert messages in case of decryption failures as per RFC by Paul Bakker · 13 years ago
  85. d66f070 Disable debug messages that can introduce a timing side channel. by Paul Bakker · 13 years ago
  86. 4582999 Fixed timing difference resulting from badly formatted padding. by Paul Bakker · 13 years ago
  87. 1961b70 Added ssl_handshake_step() to allow single stepping the handshake process by Paul Bakker · 13 years ago
  88. 769075d Fixed dependency on POLARSSL_SHA4_C in ssl modules by Paul Bakker · 13 years ago
  89. 645ce3a - Moved ciphersuite naming scheme to IANA reserved names by Paul Bakker · 13 years ago
  90. b0550d9 - Added ssl_get_peer_cert() to SSL API by Paul Bakker · 13 years ago
  91. 23f3680 - Added proper support for TLS 1.2 signature_algorithm extension on server by Paul Bakker · 13 years ago
  92. 1d29fb5 - Added option to add minimum accepted SSL/TLS protocol version by Paul Bakker · 13 years ago
  93. 62f2dee - Set POLARSSL_DHM_RFC5114_MODP_1024_[PG] as default DHM MODP group for SSL/TLS by Paul Bakker · 13 years ago
  94. 915275b - Revamped x509_verify() and the SSL f_vrfy callback implementations by Paul Bakker · 13 years ago
  95. 5701cdc - Added ServerName extension parsing (SNI) at server side by Paul Bakker · 13 years ago
  96. eb2c658 - Generalized external private key implementation handling (like PKCS#11) in SSL/TLS by Paul Bakker · 13 years ago
  97. 0a59707 - Added simple SSL session cache implementation by Paul Bakker · 13 years ago
  98. d0f6fa7 - Sending of handshake_failures during renegotiation added by Paul Bakker · 13 years ago
  99. 48916f9 - Added Secure Renegotiation (RFC 5746) by Paul Bakker · 13 years ago
  100. 5f70b25 - Correctly handle SHA256 ciphersuites in SSLv3 by Paul Bakker · 13 years ago