Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/quite/humla-spongycastle.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Expand)Author
2014-04-16Use a separate PRNG for noncesPeter Dettman
2014-04-16Deprecate TlsClientProtocol auto-creation of SecureRandomPeter Dettman
2014-04-04Use the TLS 1.0 PRF for the random blockPeter Dettman
2014-01-28Wire up the extension processing for encrypt_then_macPeter Dettman
2013-12-07Add checks for ciphersuite validity vs the negotiated versionPeter Dettman
2013-12-07Use high-precision timer, if available, to seed randomPeter Dettman
2013-12-06Fix client handshake when a NewSessionTicket is received.Peter Dettman
2013-11-28Fix the CertificateVerify signature calculation for (D)TLS 1.2+Peter Dettman
2013-11-28Refactor array utility method into Arrays classPeter Dettman
2013-11-17Refactoring around DeferredHash so that for (D)TLS 1.2 we can snapshotPeter Dettman
2013-11-11Fix recent regression relating to DeferredHash handling pre-TLS 1.2Peter Dettman
2013-11-08Rename some methods to make it clearer they relate to the PRF hashPeter Dettman
2013-11-08Add calls to TlsHandshakeHash.stopTracking()Peter Dettman
2013-11-08For TLS 1.2, client and server track the hash algorithms mentioned inPeter Dettman
2013-11-08Call sealHashAlgorithms() call after server_hello_done sent/receivedPeter Dettman
2013-11-07Add TODOs related to the handshake hashPeter Dettman
2013-11-07Add some TODOsPeter Dettman
2013-09-17Refactor to use TlsUtils.isSSLPeter Dettman
2013-09-16SSLv3 clients that refuse renegotiation SHOULD use a fatalPeter Dettman
2013-09-16Check whether SCSV is present already before addingPeter Dettman
2013-09-01Indicate where SignatureAndHashAlgorithm has to be selected when sendingPeter Dettman
2013-07-17For compatibility with latest GnuTLS/OpenSSL, just ignore any serverPeter Dettman
2013-06-29Add extra TODO to find out more about status_request extension duringPeter Dettman
2013-06-29Exclude some extensions during session resumptionPeter Dettman
2013-06-27Store server extensions in session parameters and process on resumptionPeter Dettman
2013-06-25Refactor ServerHello code to bring security/session parameters into thePeter Dettman
2013-06-25RefactoringPeter Dettman
2013-06-23Replace majority of usages of failWithError with TlsFatalAlertPeter Dettman
2013-06-23For consistency, only call setResumableSession at completionPeter Dettman
2013-06-23Add the peer certificate, if any, to the SessionParametersPeter Dettman
2013-06-23Add TlsClient.getResumableSession instead of newPeter Dettman
2013-06-22Invalidate session if connection not closed gracefullyPeter Dettman
2013-06-22Initial implementation of session resumption (client-side TLS)Peter Dettman
2013-06-22ChangeCipherSpec doesn't need a queue, and shouldn't have handshakePeter Dettman
2013-06-22Add checks on various lengths to make sure they aren't overflowing theirPeter Dettman
2013-06-22Check that any server session_ticket extension_data is emptyPeter Dettman
2013-06-22Factor out a method for checking for empty extension_dataPeter Dettman
2013-06-22Add check that server status_request extension_data is empty (RFC 3546)Peter Dettman
2013-06-22Store the server certificate in a fieldPeter Dettman
2013-06-22Cleanup state after handshakePeter Dettman
2013-06-22Call notifyHandshakeComplete via the peer interfacePeter Dettman
2013-06-20Add support for max_fragment_length extension to D/TLS protocolsPeter Dettman
2013-06-20Add HandshakeMessage class to avoid unnecessary copies of byte[]Peter Dettman
2013-06-20Sample code for acting on max_fragment_length extensionPeter Dettman
2013-06-20Detect when truncated_hmac has been negotiated and apply truncation inPeter Dettman
2013-06-20New utility method and refactoring related to extension dataPeter Dettman
2013-06-19Add supported_signature_algorithms field to CertificateRequest for TLSPeter Dettman
2013-06-19Use explicit DigitallySigned struct instead of simple signaturePeter Dettman
2013-06-16Parse certificate_status messages at the clientPeter Dettman
2013-06-16Track whether or not a certificate_status message is allowedPeter Dettman