Branch: Tag:

2023-01-27

2023-01-27 09:45:34 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Port: Add set_accept_callback().

Also alters the accept callback API slightly to be more in line
with that of Stdio.Port:

* The accept callback now gets a single argument; the id as
set by set_id().

* Installation of the internal accept callback (ie ssl_callback())
is now delayed until the first call of accept() if no external
accept callback has been installed (ie with any of bind(),
listen_fd() or set_accept_callback()). This allows for altering
the context between binding and starting to accept connections.

2022-10-02

2022-10-02 09:48:39 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Testsuite [7.8::Crypto]: Fix some tests.

2022-09-22

2022-09-22 09:04:29 by Tobias S. Josefowitz <tobij@tobij.de>

Debug: added functions to generate perf map files

2022-09-16

2022-09-16 10:30:11 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Documentation [Protocols.HTTP]: Prefix StatusCode descriptions with code.

This makes it easier to find out that eg Protocols.HTTP.HTTP_NOT_FOUND
should be used to generate error code 404.

2022-09-16 08:36:05 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.HTTP: Updated the set of known status codes.

The set of status codes should now be up to date with
http://www.iana.org/assignments/http-status-codes/http-status-codes.txt .

Also adds the enum StatusCode for grouping the status codes and
autodoc markup with rfc references for all the symbols.

2022-09-15

2022-09-15 08:45:11 by Henrik Grubbström (Grubba) <grubba@grubba.org>

EFUNs: Improved integer types for several math functions.

Improves the return types for predef::sqrt(), predef::min(),
predef::max(), predef::limit(), predef::abs() and predef::sgn()
when called with integer types.

2022-08-28

2022-08-28 17:01:54 by Peter Bortas <bortas@gmail.com>

Misc: Fix incorrect syntax in autodoc

2022-07-03

2022-07-03 20:28:10 by Marcus Comstedt <marcus@mc.pp.se>

Remote: Stricter handling of zero.

2022-06-15

2022-06-15 13:40:35 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Compiler: Update code generator to support F_SSCANF_80.

2022-06-11

2022-06-11 09:08:19 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Compiler [Typechecker]: Changed API for apply_type_attribute() et al.

They now get a mapping that they may use to keep state between arguments.

2022-06-02

2022-06-02 08:33:12 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Crypto: Fix multiple warnings about passing of zero values.

2022-06-01

2022-06-01 11:42:47 by Martin Nilsson <nilsson@fastmail.com>

Updated types where documentation said 'or zero'.

2022-05-29

2022-05-29 08:59:58 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Web.Api.Instagram: Allow post data to be zero.

Fixes several compilation errors.

2022-05-25

2022-05-25 12:42:02 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Web.Api: Authenticate with the Authorization header by default.

Sending OAuth authorization information via query variables has been
deprecated by RFC6750 (and others), and some endpoints (eg GitHub)
do no longer support the old method.

Switch to using

Authorization: Bearer <access_token>

by default.

Also updates Web.Api.Github accordingly.

2022-05-07

2022-05-07 14:40:29 by Marcus Comstedt <marcus@mc.pp.se>

Protocols.HTTP: Allow async callbacks to be zero

2022-05-07 13:38:50 by Marcus Comstedt <marcus@mc.pp.se>

Protocols.HTTP: Allow callbacks to be zero

2022-05-07 12:14:44 by Marcus Comstedt <marcus@mc.pp.se>

Stdio.File: Allow callbacks to be zero

2022-03-09

2022-03-09 11:13:10 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Merge branch 'patches/support-mixed-in-count_memory'

* patches/support-mixed-in-count_memory:
GC: Support remaining types in Pike.count_memory().

2022-01-30

2022-01-30 14:52:05 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Documentation [SSL]: Fix typo in previous commit.

2022-01-29

2022-01-29 23:15:56 by H William Welliver <william@welliver.org>

doc: fixing some autodoc markup

2022-01-13

2022-01-13 09:32:36 by Henrik Grubbström (Grubba) <grubba@grubba.org>

__builtin.Sql.Connection: Added query_db() and reset() to the API.

2021-10-27

2021-10-27 14:02:40 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Improved support for Edwards curves.

Default to using Edwards curves for ECDH(E) if possible.

Also adds experimental support for x448-curves analogous
to the support for x25519-curves.

2021-10-21

2021-10-21 12:47:22 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Doc [Protocols.LysKOM]: Some minor changes.

2021-10-20

2021-10-20 16:03:58 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Doc [Traditional]: More sections and move around stuff.

2021-10-14

2021-10-14 11:06:48 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Doc [SSL.Packet]: Use Autodoc markup.

2021-09-16

2021-09-16 12:39:01 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Add {query,set}_timeout().

This adds an API to set an optional timeout to be used
for blocking operations. When the timeout expires it is
handled as if the peer sent a fatal internal error alert.

2021-09-16 12:32:01 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Connection: Change API of handle_alert() and make it visible.

handle_alert() is useful to eg simulate external alerts,
so make it easier to use.

2021-09-15

2021-09-15 10:57:09 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Add {query,set}_timeout().

This adds an API to set an optional timeout to be used
for blocking operations. When the timeout expires it is
handled as if the peer sent a fatal internal error alert.

2021-08-25

2021-08-25 08:13:36 by Chris Angelico <rosuav@gmail.com>

Protocols.TCP: Add autodoc everywhere

2021-08-25 07:36:10 by Chris Angelico <rosuav@gmail.com>

Protocols.TCP: Begin implementation of Happy Eyeballs (RFC 8305).

Code formatting not sorted out, lots of bugs, this is not ready to
use yet.

2021-08-19

2021-08-19 21:50:51 by Chris Angelico <rosuav@gmail.com>

WebSocket: Provide a query_id() function to parallel Stdio.File

2021-07-02

2021-07-02 20:27:26 by Tobias S. Josefowitz <tobij@tobij.de>

decode_value(): Allow to restrict decoding to simple types

The encoded value has quite a bit of control over our process. Allow to
restrict decoding to primitive types by passing coding as -1.

2021-06-27

2021-06-27 07:13:10 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Remove obsolete (draft-only) constant.

2021-06-25

2021-06-25 07:19:53 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Doc [SSL]: Adjusted some documentation.

2021-06-20

2021-06-20 23:40:54 by Chris Angelico <rosuav@gmail.com>

Merge branch 'rosuav/http-multi-connect'

2021-06-16

2021-06-16 22:13:47 by Chris Angelico <rosuav@gmail.com>

Protocols.DNS: Return host_to_ip to its former state of IPv4-only

2021-06-16 20:59:18 by Chris Angelico <rosuav@gmail.com>

Protocols.DNS: Add host_to_ips (plural) to parallel host_to_ip

2021-05-16

2021-05-16 07:33:08 by Stephen R. van den Berg <srb@cuci.nl>

Protocols.DNS: Cleanup interface, allow arbitrary numbers of restargs.

2021-05-15

2021-05-15 17:25:41 by Stephen R. van den Berg <srb@cuci.nl>

Protocol.DNS: Windows has a hosts file too.

2021-05-15 17:25:41 by Stephen R. van den Berg <srb@cuci.nl>

Protocols.DNS: Add a resolver compatible generic_query().

2021-05-09

2021-05-09 17:29:37 by Stephen R. van den Berg <srb@cuci.nl>

Protocols.DNS: Extend rcode constant list.

2021-05-09 17:29:37 by Stephen R. van den Berg <srb@cuci.nl>

DNS.client: Expose match_etc_hosts.

2021-05-08

2021-05-08 16:23:35 by Martin Nilsson <nilsson@fastmail.com>

Implemented Promise variants of async lookup.

2021-05-01

2021-05-01 14:18:21 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Doc: Fix some documentation typos.

2020-09-13

2020-09-13 12:09:11 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.ServerConnection: Added API clarification.

2020-06-07

2020-06-07 06:57:38 by Stephen R. van den Berg <srb@cuci.nl>

HTTP.Server: Expose filename_to_extension().

2020-05-29

2020-05-29 00:06:19 by Tobias S. Josefowitz <tobij@tobij.de>

SSL.Context: Context commits to tickets via offers_tickets()

In certain situations, i.e. after receiving an empty Session Ticket
extension (client supports, but does not yet have a ticket), by
including the Session Ticket extension in the server hello commits us to
providing a ticket later.

As SSL.Context would simply return 0 in encode_ticket() when use_cache
was zero (not the default), we used to break the protocol on such
occasions. Instead, we now use SSL.Context()->offers_tickets() to signal
whether Session Tickets should be supported on the connection (and
whether the Context commits to encoding a session as ticket later on).

2020-05-28

2020-05-28 23:49:01 by Tobias S. Josefowitz <tobij@tobij.de>

SSL.Context: Context commits to tickets via offers_tickets()

In certain situations, i.e. after receiving an empty Session Ticket
extension (client supports, but does not yet have a ticket), by
including the Session Ticket extension in the server hello commits us to
providing a ticket later.

As SSL.Context would simply return 0 in encode_ticket() when use_cache
was zero (not the default), we used to break the protocol on such
occasions. Instead, we now use SSL.Context()->offers_tickets() to signal
whether Session Tickets should be supported on the connection (and
whether the Context commits to encoding a session as ticket later on).

2020-05-25

2020-05-25 12:25:43 by Stephen R. van den Berg <srb@cuci.nl>

HTTP.Server.Request: Add response member for log_cb.

2020-05-25 07:38:16 by Stephen R. van den Berg <srb@cuci.nl>

MIME: Move decode_/encode_headerfield_params functions here.

2020-05-24

2020-05-24 09:18:43 by Stephen R. van den Berg <srb@cuci.nl>

HTTP: Add params_encode() and params_decode().

2020-04-24

2020-04-24 15:30:25 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Stdio: Added query_mtu() to Stdio.File and Stdio.UDP.

2020-04-19

2020-04-19 13:49:05 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Connection: Filter duplicate DTLS packets.

2020-04-11

2020-04-11 12:08:03 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.DTLSState: Implemented sliding window for sequence numbers.

Needed for DTLS (#10032).

2020-04-09

2020-04-09 13:22:38 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Packet: Added seq_num to Packet.

This is in preparation for implementing DTLS (#10032).

2020-02-24

2020-02-24 00:10:59 by Tobias S. Josefowitz <tobij@tobij.de>

SSL: Do not accept MD2, MD5 and SHA1 signatures any longer

Web browsers and others have distrusted SHA1 a long while ago, MD2 and
MD5 are at this point simply dangerous to support. However, we now
support configuration of supported signature algorithms via
@[SSL.Context] in case any use case simply needs to support older
signature algorithms.

2020-02-24 00:09:58 by Tobias S. Josefowitz <tobij@tobij.de>

SSL: Do not accept MD2, MD5 and SHA1 signatures any longer

Web browsers and others have distrusted SHA1 a long while ago, MD2 and
MD5 are at this point simply dangerous to support. However, we now
support configuration of supported signature algorithms via
@[SSL.Context] in case any use case simply needs to support older
signature algorithms.

2020-02-01

2020-02-01 16:32:54 by Tobias S. Josefowitz <tobij@tobij.de>

SSL.Context: Fix autodoc typo

2019-12-04

2019-12-04 21:10:03 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.ServerConnection: Session tickets (RFC 4507 and RFC 5077).

Server side support for session tickets.

Note that the default ticket encoding is to use the session_id,
it thus uses server side state. The ticket encoding can be changed
by overriding {en,de}code_ticket() in SSL.Context.

Implementation verified against OpenSSL's s_client.

Backported from 372b2a05d05fa0d0e052e6634d2acf8d03629ed4 by Tobias
Josefowitz.

2019-11-18

2019-11-18 07:48:16 by Martin Nilsson <nilsson@fastmail.com>

Documentation tweaks.

2019-11-18 07:40:02 by Martin Nilsson <nilsson@fastmail.com>

Added support for SHA-512-256, userhash and utf-8.

2019-11-18 06:46:50 by Martin Nilsson <nilsson@fastmail.com>

Added support for SHA-256 HTTP Digest

2019-11-18 06:25:39 by Martin Nilsson <nilsson@fastmail.com>

Reworkd HTTP Authentication quite a bit. Supports client and server.

2019-09-21

2019-09-21 07:46:39 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Documentation [SSL]: Fixed typo.

2019-06-24

2019-06-24 21:48:45 by Stephen R. van den Berg <srb@cuci.nl>

SSL.File: Add support for set_nodelay().

2019-06-24 12:54:19 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Renamed some EdDSA-related constants for consistency.

2019-06-20

2019-06-20 12:07:05 by Stephen R. van den Berg <srb@cuci.nl>

Doc fix.

2019-06-18

2019-06-18 14:24:03 by Stephen R. van den Berg <srb@cuci.nl>

HTTP.Server.Request: Restore backward compatibility and fixes to Shuffler.

Changes to HTTP.Server.Request:
- Support set_mode() in HTTP.Server.Request to optionally enable
Shuffler to output the data on the wire. Without setting it, it
will revert to the old buffered-output method.
- Reinstate write-timeout on HTTP.Server.Request, make sure it works
in both classic and Shuffler modes.

Changes to Shuffler:
- Add automatic TCP_CORK support.
- Clean up code duplication between shuffler and sendfile.
- Move wrap_callback from a separate member to an optional argument
to add_source().
- Add support for Stdio.Buffer.
- Adding empty sources works consistently now.
- Fix broken cornercases when adding strings or memory regions.
- Fix dataloss when using non-blocking io on input files.
- Support starting in a file at the spot where the filepointer is.
- Add start/length arguments to the main Shuffle object, to skip and
limit in the entire concatenated output (needed for HTTP-range support).

2019-06-14

2019-06-14 11:50:17 by Stephen R. van den Berg <srb@cuci.nl>

HTTP.Server.Request: Use Shuffler to send and support sending chunked data.

2019-06-10

2019-06-10 13:50:50 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Added some constants for RSA PSS signatures.

2019-05-29

2019-05-29 14:52:00 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Documentation [SSL.Constants]: Updated AutoDoc.

2019-05-28

2019-05-28 11:38:50 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Use SignatureScheme instead of array({Hash,Signature}Algorithm).

2019-05-28 09:25:54 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Renumbered HASH_* in preparation for using SignatureScheme.

2019-05-26

2019-05-26 17:15:27 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Fixed typo.

2019-05-26 10:48:40 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.constants: Added some entries from RFC 8422.

2019-05-05

2019-05-05 00:21:38 by Martin Nilsson <nilsson@fastmail.com>

Implemented MD5-sess algorithm.

2019-05-05 00:13:36 by Martin Nilsson <nilsson@fastmail.com>

Support verifying that the nonce used actually came from the server.

2019-05-04

2019-05-04 16:36:45 by Martin Nilsson <nilsson@fastmail.com>

Added support for Digest MD5

2019-04-24

2019-04-24 14:34:10 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Toole.Standalone.test_pike: Complain about calls of handle_error().

2019-03-19

2019-03-19 12:33:55 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Merge commit '722771973bd' into patches/lyslyskom22891031

* commit '722771973bd': (6177 commits)
Verify that callablep responses are aligned with reality.
...

2019-03-14

2019-03-14 10:39:03 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Merge commit '2470270f500c728d10b8895314d8d8b07016e37b' into grubba/typechecker-automap

* commit '2470270f500c728d10b8895314d8d8b07016e37b': (18681 commits)
Removed the old typechecker.
...

2018-02-18

2018-02-18 22:32:17 by Martin Nilsson <nilsson@fastmail.com>

Somewhat more flexible opportunistic TLS implementation.

2018-02-15

2018-02-15 15:54:26 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Merge commit '75c9d1806f1a69ca21c27a2c2fe1b4a6ea38e77e' into patches/pike63

* commit '75c9d1806f1a69ca21c27a2c2fe1b4a6ea38e77e': (19587 commits)
...

2018-01-19

2018-01-19 15:28:07 by Per Cederqvist <cederp@opera.com>

Always name the 4th argument of bind reuse_port instead of share

2017-12-12

2017-12-12 13:41:02 by Martin Nilsson <nilsson@fastmail.com>

Sparse list of version support added.

2017-12-10

2017-12-10 01:14:30 by Martin Nilsson <nilsson@fastmail.com>

Added some new 1.3 constants.

2017-12-01

2017-12-01 07:58:56 by Stephen R. van den Berg <srb@cuci.nl>

Promise: Replace Promise with Promise2, slightly updated interface.

Most notable differences between HTTP.Promise2 and HTTP.Promise:
- Less filling (20% smaller compiled object file).
- Instead of two result objects, we simply have a single
HTTP.Promise.Result object which is passed both on_success()
and on_failure(). Why does the original separate this in a
Promise.Success and Promise.Failure type?
- Various code optimisations, that do not change the interface.
- The Result object lacks the ok() method. What use was/is it?
You should normally already know if you are a success or a failure
callback.
- The Result object returns the raw body through "data", and the decoded
body through get() (to conform more to standard Future objects).

2017-12-01 01:11:18 by Stephen R. van den Berg <srb@cuci.nl>

HTTP.Promise2: Offer get() instead of data in the Result object.

2017-12-01 00:48:06 by Stephen R. van den Berg <srb@cuci.nl>

HTTP.Promise2: Proposed changes/optimisation/simplification of HTTP.Promise.

2017-11-22

2017-11-22 14:54:23 by Stephen R. van den Berg <srb@cuci.nl>

Fix docs.

2017-11-21

2017-11-21 09:08:09 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added support for set_buffer_mode().

Adds support for user provided buffers in both directions.

Updates the {read,write,close}_callbacks to the current conventions of
Stdio.File (this includes defaulting the callback_id to this_object()).

Also adds some corresponding tests to the testsuite.

2017-11-21 09:04:20 by Stephen R. van den Berg <srb@cuci.nl>

SSL.File: Fix docs.

2017-11-21 00:58:08 by Stephen R. van den Berg <srb@cuci.nl>

SSL.File: Implement query_fd().

2017-11-20

2017-11-20 23:48:05 by Stephen R. van den Berg <srb@cuci.nl>

SSL.File: Implement query_fd().

2017-11-05

2017-11-05 15:53:18 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Merge branch 'grubba/rename_lfun_destroy' into 8.1

* grubba/rename_lfun_destroy:
Modules: Fixed logts of warnings.
Testsuite: Updated for LFUN::_destruct().
Compiler: Don't complain about LFUN::destroy() in compat mode.
Fix multiple warnings.
Runtime: LFUN::destroy() has been renamed to _destruct().
Compiler: Rename LFUN::destroy() to LFUN::_destruct().

2017-11-05 15:49:10 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Modules: Fixed logts of warnings.

More fall out from the LFUN::destroy ==> LFUN::_destruct rename.

2017-09-18

2017-09-18 21:44:26 by Tobias S. Josefowitz <tobij@tobij.de>

Protocols.DNS: Add support for CAA records.

Certificate Authorities are actually required to check for them since
this month as mandated by the CA/Browser Forum.

2017-08-28

2017-08-28 21:19:33 by Per Cederqvist <cederp@opera.com>

Add extensible error handling in Protocols.DNS.server

Some servers might want to report errors during other mechanisms than
werror. By moving the error reporting to the new
report_decode_error() method, it is easy to override that method and
do something else.

Likewise, some servers might want to not reply to malformed requests.
Move that code to the new handle_decode_error() method.

2017-08-28 21:17:42 by Per Cederqvist <cederp@opera.com>

Add extensible error handling in Protocols.DNS.server

Some servers might want to report errors during other mechanisms than
werror. By moving the error reporting to the new
report_decode_error() method, it is easy to override that method and
do something else.

Likewise, some servers might want to not reply to malformed requests.
Move that code to the new handle_decode_error() method.

2017-08-28 21:11:31 by Per Cederqvist <cederp@opera.com>

Add extensible error handling in Protocols.DNS.server

Some servers might want to report errors during other mechanisms than
werror. By moving the error reporting to the new
report_decode_error() method, it is easy to override that method and
do something else.

Likewise, some servers might want to not reply to malformed requests.
Move that code to the new handle_decode_error() method.

2017-07-25

2017-07-25 11:12:23 by Pontus Östlund <ponost@roxen.com>

Pikedoc fixes.

2017-07-21

2017-07-21 11:36:32 by Pontus Östlund <ponost@roxen.com>

There was an XML syntax error in this file.

2017-07-10

2017-07-10 10:30:01 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Manual: Extended the data types chapter with void & mixed.

Added some elaboration on the difference between compile-time
and run-time types, as well as some about the types void & mixed
and how they are used.

Fixes [bug 1656 (#1656)].

2017-05-22

2017-05-22 22:37:00 by Martin Nilsson <nilsson@fastmail.com>

Essentially white space changes.

2017-04-05

2017-04-05 12:12:27 by Chris Angelico <rosuav@gmail.com>

Add a little docs to Protocols.WebSocket

2017-04-05 03:45:26 by Chris Angelico <rosuav@gmail.com>

Add minimal autodoc as the create() signature changed in the inherit

2017-02-14

2017-02-14 15:56:42 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.HTTP.Server.Request: Added some AutoDoc markup.

2017-01-18

2017-01-18 12:16:21 by Pontus Östlund <ponost@roxen.com>

Added the content_type getter to Protocols.HTTP.Promise.Success and added automatic decoding of gzipped data. This means the explicit decoding in Web.SOAP isn't neccessary anymore.

2017-01-18 11:55:21 by Pontus Östlund <ponost@roxen.com>

Renamed `content_encoding() to `charset() since that is what's returned. Also fixed a bug where `content_type() wouldn't return anything if no charset is defined in the content-type header.

2017-01-15

2017-01-15 22:16:17 by Jeff Hungerford <hungerf3@house.ofdoom.com>

Protocols.DNS: fix decoding and add encoding of LOC RRs.

2016-12-29

2016-12-29 17:05:09 by Martin Nilsson <nilsson@fastmail.com>

Documented finish.

2016-12-14

2016-12-14 12:37:33 by Jonas Walld?n <jonasw@roxen.com>

Fix refdoc typo.

2016-11-27

2016-11-27 02:18:50 by Stephen R. van den Berg <srb@cuci.nl>

SocketIO/EngineIO: Packetised queues, increment protocol versions for both.

SocketIO/EngineIO: Drop id parameter, it's better solved using inheritance.
EngineIO: Prioritise PING/PONG messages.

2016-11-05

2016-11-05 11:04:38 by Arne Goedeke <el@laramies.com>

WebSocket: finish the extension support revert

Some changes had not been reverted

2016-11-05 11:04:38 by Arne Goedeke <el@laramies.com>

WebSocket: finish the extension support revert

Some changes had not been reverted

2016-11-05 10:54:21 by Martin Nilsson <nilsson@fastmail.com>

Revert EngineIO and SocketIO from 8.0 for now.

2016-11-05 10:54:21 by Martin Nilsson <nilsson@fastmail.com>

Revert EngineIO and SocketIO from 8.0 for now.

2016-10-21

2016-10-21 13:15:13 by Stephen R. van den Berg <srb@cuci.nl>

WebSocket: Revert out deflate code, leave options, upward compatible with 8.1.

2016-10-21 13:15:13 by Stephen R. van den Berg <srb@cuci.nl>

WebSocket: Revert out deflate code, leave options, upward compatible with 8.1.

2016-10-19

2016-10-19 15:43:05 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Crypto [Nettle]: Inlined __builtin.Nettle.DH_Params into Crypto.DH.

This is needed to break a circular Nettle-load time dependency.

The problem was that __builtin.Nettle.DH_Params had a preprocessor
dependency on Nettle.DH_Params, and __builtin.Nettle.DH_Params
could sometimes get loaded while Nettle was still initializing.

2016-10-18

2016-10-18 09:25:51 by Arne Goedeke <el@laramies.com>

Protocols.WebSocket: refactored WebSocket extension support

Added a new API which allows implementing Extensions as
Protocols.WebSocket.Extension subclasses. This is used both
for real WebSocket extensions, as well as defragmentation and
conformance checks. Updated the documentation accordingly.

2016-10-04

2016-10-04 15:29:06 by Pontus Östlund <ponost@roxen.com>

Query: timed_async_fetch() didn't support chunked transfer encoding.

Promise: Some pikedoc fixes.

2016-10-03

2016-10-03 09:54:25 by Pontus Östlund <ponost@roxen.com>

Some Pike-doc fixes.

2016-09-29

2016-09-29 01:23:24 by Stephen R. van den Berg <srb@cuci.nl>

WebSocket/EngineIO/SocketIO: Simplify specifying options per packet.

2016-09-29 01:11:04 by Stephen R. van den Berg <srb@cuci.nl>

WebSocket/EngineIO/SocketIO: Simplify specifying options per packet.

2016-09-29 01:11:04 by Stephen R. van den Berg <srb@cuci.nl>

WebSocket/EngineIO/SocketIO: Simplify specifying options per packet.

2016-09-28

2016-09-28 20:10:20 by Martin Nilsson <nilsson@fastmail.com>

clone() is not referenced, so define it away for now.

2016-09-27

2016-09-27 23:31:08 by Stephen R. van den Berg <srb@cuci.nl>

SocketIO: Streamline Universe API, events run in their own threads.

Add onclose(), various cleanups.

2016-09-27 23:31:08 by Stephen R. van den Berg <srb@cuci.nl>

EngineIO: Drop named inherits. binary frames, make compression overridable.

2016-09-27 23:30:28 by Stephen R. van den Berg <srb@cuci.nl>

EngineIO: Drop named inherits. binary frames, make compression overridable.

2016-09-27 23:30:28 by Stephen R. van den Berg <srb@cuci.nl>

EngineIO: Drop named inherits. binary frames, make compression overridable.

2016-09-27 23:30:27 by Stephen R. van den Berg <srb@cuci.nl>

SocketIO: Streamline Universe API, events run in their own threads.

Add onclose(), various cleanups.

2016-09-27 23:30:27 by Stephen R. van den Berg <srb@cuci.nl>

SocketIO: Streamline Universe API, events run in their own threads.

Add onclose(), various cleanups.

2016-09-27 09:42:33 by Stephen R. van den Berg <srb@cuci.nl>

SocketIO: Streamline Universe API, events run in their own threads.

2016-09-27 09:40:54 by Stephen R. van den Berg <srb@cuci.nl>

SocketIO: Streamline Universe API, events run in their own threads.

2016-09-27 09:40:54 by Stephen R. van den Berg <srb@cuci.nl>

SocketIO: Streamline Universe API, events run in their own threads.

2016-09-26

2016-09-26 16:28:09 by Stephen R. van den Berg <srb@cuci.nl>

SocketIO: Support creation of multiple Universes (Yes, we think BIG :-).

2016-09-26 15:55:55 by Stephen R. van den Berg <srb@cuci.nl>

SocketIO: Support creation of multiple Universes (Yes, we think BIG :-).

2016-09-26 15:55:55 by Stephen R. van den Berg <srb@cuci.nl>

SocketIO: Support creation of multiple Universes (Yes, we think BIG :-).

2016-09-26 12:07:58 by Stephen R. van den Berg <srb@cuci.nl>

EngineIO: Rename options to lower visibility outside the class.

2016-09-26 12:03:24 by Stephen R. van den Berg <srb@cuci.nl>

WebSocket: Support for permessage-deflate compression.

2016-09-26 11:59:38 by Stephen R. van den Berg <srb@cuci.nl>

EngineIO: Rename options to lower visibility outside the class.

2016-09-26 11:59:38 by Stephen R. van den Berg <srb@cuci.nl>

EngineIO: Rename options to lower visibility outside the class.

2016-09-26 11:25:53 by Stephen R. van den Berg <srb@cuci.nl>

EngineIO: Tune deflate compressionparameters.

2016-09-26 10:50:34 by Stephen R. van den Berg <srb@cuci.nl>

WebSocket: Support for permessage-deflate compression.

2016-09-26 10:50:34 by Stephen R. van den Berg <srb@cuci.nl>

WebSocket: Support for permessage-deflate compression.

2016-09-26 10:18:56 by Stephen R. van den Berg <srb@cuci.nl>

EngineIO: Tune deflate compressionparameters.

2016-09-26 10:18:56 by Stephen R. van den Berg <srb@cuci.nl>

EngineIO: Tune deflate compressionparameters.

2016-09-23

2016-09-23 18:09:24 by Stephen R. van den Berg <srb@cuci.nl>

EngineIO/SocketIO: Improve documentation.

2016-09-23 18:08:17 by Stephen R. van den Berg <srb@cuci.nl>

EngineIO/SocketIO: Improve documentation.

2016-09-23 18:08:17 by Stephen R. van den Berg <srb@cuci.nl>

EngineIO/SocketIO: Improve documentation.

2016-09-22

2016-09-22 16:03:56 by Stephen R. van den Berg <srb@cuci.nl>

SocketIO/EngineIO:

Define PDT() debugging macro.
Define DUSERERROR() macro.
Throw proper errors with backtraces.
Link statically as far as possible.
Provide sid and lastrequest members on SocketIO.Server.
Pass up ERROR messages from the protocol.

2016-09-22 16:01:35 by Stephen R. van den Berg <srb@cuci.nl>

SocketIO/EngineIO:

Define PDT() debugging macro.
Define DUSERERROR() macro.
Throw proper errors with backtraces.
Link statically as far as possible.
Provide sid and lastrequest members on SocketIO.Server.
Pass up ERROR messages from the protocol.

2016-09-22 16:01:35 by Stephen R. van den Berg <srb@cuci.nl>

SocketIO/EngineIO:

Define PDT() debugging macro.
Define DUSERERROR() macro.
Throw proper errors with backtraces.
Link statically as far as possible.
Provide sid and lastrequest members on SocketIO.Server.
Pass up ERROR messages from the protocol.

2016-09-22 13:35:39 by Stephen R. van den Berg <srb@cuci.nl>

SocketIO: Make it thread safe, and simplify the API.

2016-09-22 13:26:24 by Stephen R. van den Berg <srb@cuci.nl>

SocketIO: Make it thread safe, and simplify the API.

2016-09-22 13:26:24 by Stephen R. van den Berg <srb@cuci.nl>

SocketIO: Make it thread safe, and simplify the API.

2016-09-21

2016-09-21 18:39:08 by Stephen R. van den Berg <srb@cuci.nl>

Clean-room basic Socket.IO implementation.

Namespaces are supported.
Events belong in the next layer.
Rooms belong even one layer further up.

2016-09-21 18:39:05 by Stephen R. van den Berg <srb@cuci.nl>

EngineIO:

_sprintf() includes protocol revision.
Add lastrequest member.
Consolidate setting callbacks to a single function.
Binary frames have their type in binary sometimes too.
Run the close_cb just prior to shutting down the write channel.
Use the faster sprintf in favour of Buffers for %c%s type situations.
Add accessible close() method.
Avoid circular references in id.
Close Transport without destructing.
Tie up dangling refences when closing is forced.

2016-09-21 18:38:43 by Stephen R. van den Berg <srb@cuci.nl>

EngineIO:

_sprintf() includes protocol revision.
Add lastrequest member.
Consolidate setting callbacks to a single function.
Binary frames have their type in binary sometimes too.
Run the close_cb just prior to shutting down the write channel.
Use the faster sprintf in favour of Buffers for %c%s type situations.
Add accessible close() method.
Avoid circular references in id.
Close Transport without destructing.
Tie up dangling refences when closing is forced.

2016-09-21 18:38:43 by Stephen R. van den Berg <srb@cuci.nl>

Clean-room basic Socket.IO implementation.

Namespaces are supported.
Events belong in the next layer.
Rooms belong even one layer further up.

2016-09-21 18:38:43 by Stephen R. van den Berg <srb@cuci.nl>

Clean-room basic Socket.IO implementation.

Namespaces are supported.
Events belong in the next layer.
Rooms belong even one layer further up.

2016-09-21 18:38:43 by Stephen R. van den Berg <srb@cuci.nl>

EngineIO:

_sprintf() includes protocol revision.
Add lastrequest member.
Consolidate setting callbacks to a single function.
Binary frames have their type in binary sometimes too.
Run the close_cb just prior to shutting down the write channel.
Use the faster sprintf in favour of Buffers for %c%s type situations.
Add accessible close() method.
Avoid circular references in id.
Close Transport without destructing.
Tie up dangling refences when closing is forced.

2016-09-20

2016-09-20 08:55:07 by Arne Goedeke <el@laramies.com>

Protocols.WebSocket: added defragment()

defragment() can be used to automatically recombine fragmented frames.

2016-09-20 08:54:22 by Arne Goedeke <el@laramies.com>

Protocols.WebSocket: handle more protocol errors

The following protocol errors are now handled:

* invalid close status codes
* invalid utf8 in TEXT frames
* long control frames
* fragmented control frames
* check that the reserved bits are zero

Some of these checks are only active if WEBSOCKET_DEBUG is turned on,
especially those which might break future use of WebSocket extensions.

2016-09-20 08:34:43 by Arne Goedeke <el@laramies.com>

Protocols.WebSocket: added API for continuation frames

2016-09-20 07:58:08 by Stephen R. van den Berg <srb@cuci.nl>

Clean-room Engine.IO implementation.

2016-09-20 07:50:12 by Stephen R. van den Berg <srb@cuci.nl>

Clean-room Engine.IO implementation.

2016-09-20 07:50:12 by Stephen R. van den Berg <srb@cuci.nl>

Clean-room Engine.IO implementation.

2016-08-29

2016-08-29 14:15:43 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants [Documentation]: Some notes about ALPN.

2016-08-26

2016-08-26 15:07:39 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher.CipherSpec: Added max_bytes.

This value is intended to be used as a threshold for automatic key
renegotiation (and make us proof against eg Sweet32).

cf https://sweet32.info/

2016-08-20

2016-08-20 10:10:12 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Added enum Extension.

Fixes some documentation references.

2016-08-14

2016-08-14 12:39:10 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Documentation [SSL]: Improved AutoDoc mk II markup somewhat.

2016-08-03

2016-08-03 10:21:20 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Documentation [SSL]: Document the fmt_*() functions.

2016-07-30

2016-07-30 10:23:47 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Documentation [Protocols.HTTP]: Fixed typo.

2016-07-29

2016-07-29 13:19:08 by Martin Nilsson <nilsson@fastmail.com>

Fixed autodoc

2016-07-28

2016-07-28 10:44:43 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.LDAP: Support passing an SSL.Context to get_connection().

Sometimes the default SSL.Context isn't appropriate, so support
passing a custom one along to Protocols.LDAP.client().

2016-07-28 10:44:43 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.LDAP: Support passing an SSL.Context to get_connection().

Sometimes the default SSL.Context isn't appropriate, so support
passing a custom one along to Protocols.LDAP.client().

2016-07-28 10:43:20 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.LDAP: Support passing an SSL.Context to get_connection().

Sometimes the default SSL.Context isn't appropriate, so support
passing a custom one along to Protocols.LDAP.client().

2016-07-28 10:43:20 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.LDAP: Support passing an SSL.Context to get_connection().

Sometimes the default SSL.Context isn't appropriate, so support
passing a custom one along to Protocols.LDAP.client().

2016-07-28 10:40:31 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.LDAP: Support passing an SSL.Context to get_connection().

Sometimes the default SSL.Context isn't appropriate, so support
passing a custom one along to Protocols.LDAP.client().

2016-07-13

2016-07-13 12:18:00 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.ServerConnection: Session tickets (RFC 4507 and RFC 5077).

Server side support for session tickets.

Note that the default ticket encoding is to use the session_id,
it thus uses server side state. The ticket encoding can be changed
by overriding {en,de}code_ticket() in SSL.Context.

Implementation verified against OpenSSL's s_client.

2016-06-16

2016-06-16 07:38:40 by Arne Goedeke <el@laramies.com>

Protocols.HTTP.Server: fixed handling of range requests

- The content-length header must contain the length of the
entity body, not the full length of the resource
- The instance-length part of the content-range header should be the
full length of the resource, if known, or '*'

2016-05-30

2016-05-30 15:55:10 by Grzegorz Malachowski <gmalachowski@opera.com>

Allow preservation of case in headers in HeaderParser.

This is needed when acting as a proxy sine some servers treat headers
as case-sensitive.

2016-05-30 15:55:10 by Grzegorz Malachowski <gmalachowski@opera.com>

Allow preservation of case in headers in HeaderParser.

This is needed when acting as a proxy sine some servers treat headers
as case-sensitive.

2016-05-29

2016-05-29 14:10:32 by Pontus Östlund <ponost@roxen.com>

Just some Pike doc fixes.

2016-05-24

2016-05-24 10:30:58 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Handle non-empty buffers in set_buffer_mode().

2016-05-22

2016-05-22 20:42:18 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Documentation [SSL.File]: Document get_server_name().

Also fixes a documentation typo.

2016-05-21

2016-05-21 17:33:08 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added support for set_buffer_mode().

Adds support for user provided buffers in both directions.

Updates the {read,write,close}_callbacks to the current conventions of
Stdio.File (this includes defaulting the callback_id to this_object()).

Also adds some corresponding tests to the testsuite.

2016-05-21 10:37:55 by Marcus Agehall <agehall@gmail.com>

Let's use variants for the callbacks to avoid having different names for them.

2016-05-21 08:37:38 by Marcus Agehall <agehall@gmail.com>

Added client mode to Websockets.

2016-05-21 08:37:37 by Marcus Agehall <agehall@gmail.com>

Removed unused class.

2016-05-21 08:37:37 by Marcus Agehall <agehall@gmail.com>

Make full use of buffers when parsing incoming frames.

2016-05-20

2016-05-20 20:04:28 by Pontus Östlund <ponost@roxen.com>

Protocols.HTTP.Promise: The arguments are now passes as an object of class Arguments for better type cheking and more coherent method signatures for the request methods.
Also some refactoring.

Web.Api.Api: Using Protocols.HTTP.Promise for the requests if available and applicable.

2016-05-19

2016-05-19 15:37:32 by Marcus Agehall <agehall@gmail.com>

Added client mode for WebSocket module.

2016-05-19 15:37:32 by Marcus Agehall <agehall@gmail.com>

Added client mode for WebSocket module.

2016-05-09

2016-05-09 22:21:49 by Pontus Östlund <poppanator@gmail.com>

Protocols.HTTP.Query: Fixed an old bug (https://bugzilla.roxen.com/bugzilla/show_bug.cgi?id=7676) where basically the timeout in timed_async_fetch wasn't reset each new data read.
This timeout had it's own property (data_timeout) which now is "deprecated" since the property "timeout" pretty much serves the same purpose, but on connection. So now timeout is the default value to use unless data_timeout is explicitly set, in which case that value will be used.
Since there was no proper way to set a max time for the entire operation (well, that was by accident and not intention how the data_timeout in timed_async_fetch worked) the new property "maxtime" has been added. If this is set (default is 0=indefinetly) the request will be aborted after maxtime second even if data is still being read.

So in short:

data_timeout = 0 // unless explicitly set
timeout = 120 // connection timeout, and then data read timeout
maxtime = 0 // 0 = off, otherwise the entire operation must be done within maxtime seconds or else the request is aborted

Protocols.HTTP.Session: Added some documentation

Protocols.HTTP.Promise: New module which utilise the new Concurrent.Promise/Future stuff for HTTP requests. Internally uses Protcols.HTTP.Session for the actual HTTP stuff.

Web.Api.Api: Now fetches data asynchronously when async calls are made.

Concurrent: on_success and on_fail now returns the object being called so that they can be chained.

Parser.Markdown: Fixed the #require macro directive.

2016-04-28

2016-04-28 15:10:51 by Chris Angelico <rosuav@gmail.com>

Tag IMAP docs for autodoc detection, and fix trivial typos

2016-03-25

2016-03-25 11:19:56 by Chris Angelico <rosuav@gmail.com>

Add an example to the IRC docs

2016-03-14

2016-03-14 16:15:06 by Martin Nilsson <nilsson@fastmail.com>

Use random_string instead of Crypto.Random.random_string

2016-03-14 16:15:06 by Martin Nilsson <nilsson@fastmail.com>

Use random_string instead of Crypto.Random.random_string

2016-02-08

2016-02-08 17:24:47 by Peter Bortas <bortas@gmail.com>

Revert "Added the Markdown module and the standalone pike_to_html.pike from 8.1."

This reverts commit 2706a62c3c72b296a0c77b418f1e186c682c7ac5.

2016-02-07

2016-02-07 08:02:06 by Chris Angelico <rosuav@gmail.com>

IRC: More properly implement the Channel class and add docs

2016-02-07 08:02:06 by Chris Angelico <rosuav@gmail.com>

IRC: More properly implement the Channel class and add docs

2016-02-06

2016-02-06 21:53:47 by Tobias S. Josefowitz <tobij@tobij.de>

a few autodoc fixes

2016-02-06 21:53:47 by Tobias S. Josefowitz <tobij@tobij.de>

a few autodoc fixes

2016-02-03

2016-02-03 17:22:22 by Martin Nilsson <nilsson@fastmail.com>

Added creation method raw to put binary data directly in an image object without adaptation.

2015-12-18

2015-12-18 13:52:09 by Martin Nilsson <nilsson@fastmail.com>

Rename preferred_auth_methods to client_auth_methods, and fill it with actual certificate type information.

2015-12-18 13:52:09 by Martin Nilsson <nilsson@fastmail.com>

Rename preferred_auth_methods to client_auth_methods, and fill it with actual certificate type information.

2015-12-18 11:49:06 by Martin Nilsson <nilsson@fastmail.com>

Updated comments and types.

2015-12-18 11:49:06 by Martin Nilsson <nilsson@fastmail.com>

Updated comments and types.

2015-12-14

2015-12-14 17:52:10 by Martin Nilsson <nilsson@fastmail.com>

Readded type information as comments.

2015-12-14 17:52:10 by Martin Nilsson <nilsson@fastmail.com>

Readded type information as comments.

2015-12-14 17:10:45 by Per Hedbor <ph@opera.com>

Protocols.HTTP now takes 0.08 instead of 0.23s to load.

Made Protocol.DNS, SSL and the Calendar module on-demand-loaded.

2015-12-14 17:10:45 by Per Hedbor <ph@opera.com>

Protocols.HTTP now takes 0.08 instead of 0.23s to load.

Made Protocol.DNS, SSL and the Calendar module on-demand-loaded.

2015-12-06

2015-12-06 13:11:51 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: Deprecated variable require_trust.

Setting of this variable is now equivalent to setting the
auth_level to AUTHLEVEL_require.

2015-12-06 13:11:51 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: Deprecated variable require_trust.

Setting of this variable is now equivalent to setting the
auth_level to AUTHLEVEL_require.

2015-12-04

2015-12-04 11:14:27 by Martin Nilsson <nilsson@fastmail.com>

Added AUTHLEVEL_verify to documentation and compat.

2015-12-04 11:14:27 by Martin Nilsson <nilsson@fastmail.com>

Added AUTHLEVEL_verify to documentation and compat.

2015-12-02

2015-12-02 12:47:32 by Martin Nilsson <nilsson@fastmail.com>

Added AUTHLEVEL_verify that will not require any optional certificates, but will verify any it gets.

2015-12-02 12:47:32 by Martin Nilsson <nilsson@fastmail.com>

Added AUTHLEVEL_verify that will not require any optional certificates, but will verify any it gets.

2015-12-01

2015-12-01 08:56:27 by Martin Nilsson <nilsson@fastmail.com>

Stop supporting compression by default.

2015-12-01 08:56:27 by Martin Nilsson <nilsson@fastmail.com>

Stop supporting compression by default.

2015-12-01 08:56:27 by Martin Nilsson <nilsson@fastmail.com>

Stop supporting compression by default.

2015-12-01 08:55:12 by Martin Nilsson <nilsson@fastmail.com>

Stop supporting compression by default.

2015-12-01 08:55:12 by Martin Nilsson <nilsson@fastmail.com>

Stop supporting compression by default.

2015-11-19

2015-11-19 16:34:58 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: Added some references to RFCs.

2015-11-19 16:34:58 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: Added some references to RFCs.

2015-11-18

2015-11-18 17:56:39 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: Added some documentation for trusted_issuers_cache.

2015-11-18 17:56:39 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: Added some documentation for trusted_issuers_cache.

2015-11-14

2015-11-14 12:42:54 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Crypto.RSA: Cleaned up RSASSA-PSS API.

It is now possible to get a PSS signature object from an RSA state by
indexing it with "PSS". Eg

Crypto.RSA.State rsa = ...;
string(8bit) sign = rsa->PSS->pkcs_sign(message, hash);
int(0..1) ok = rsa->PSS->pkcs_verify(message, hash, sign);

Also adds a corresponding symbol "PKCS1_5" for the traditional (and
default) PKCS#1 1.5 style signatures.

2015-11-14 12:42:54 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Crypto.RSA: Cleaned up RSASSA-PSS API.

It is now possible to get a PSS signature object from an RSA state by
indexing it with "PSS". Eg

Crypto.RSA.State rsa = ...;
string(8bit) sign = rsa->PSS->pkcs_sign(message, hash);
int(0..1) ok = rsa->PSS->pkcs_verify(message, hash, sign);

Also adds a corresponding symbol "PKCS1_5" for the traditional (and
default) PKCS#1 1.5 style signatures.

2015-11-11

2015-11-11 17:05:00 by Marcus Agehall <agehall@gmail.com>

Added access methord since my_node_id is protected.

2015-11-11 17:05:00 by Marcus Agehall <agehall@gmail.com>

Added access methord since my_node_id is protected.

2015-11-10

2015-11-10 15:27:01 by Marcus Agehall <agehall@gmail.com>

Added support for Bittorrent DHT (BEP005).

2015-11-10 15:27:01 by Marcus Agehall <agehall@gmail.com>

Added support for Bittorrent DHT (BEP005).

2015-11-08

2015-11-08 01:27:58 by Martin Nilsson <nilsson@fastmail.com>

Fix documentation issue.

2015-11-08 01:27:58 by Martin Nilsson <nilsson@fastmail.com>

Fix documentation issue.

2015-11-08 01:27:58 by Martin Nilsson <nilsson@fastmail.com>

Fix documentation issue.

2015-11-06

2015-11-06 10:22:23 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Encrypt then MAC mode is an RFC now...

2015-11-06 10:22:23 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Encrypt then MAC mode is an RFC now...

2015-11-06 10:22:23 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Encrypt then MAC mode is an RFC now...

2015-11-01

2015-11-01 17:56:56 by Martin Nilsson <nilsson@fastmail.com>

Rename HASH_sha to HASH_sha1.

2015-11-01 17:56:56 by Martin Nilsson <nilsson@fastmail.com>

Rename HASH_sha to HASH_sha1.

2015-11-01 17:56:56 by Martin Nilsson <nilsson@fastmail.com>

Rename HASH_sha to HASH_sha1.

2015-10-30

2015-10-30 15:04:34 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added some constants from RFC 4681.

2015-10-30 15:04:34 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added some constants from RFC 4681.

2015-10-30 15:04:34 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added some constants from RFC 4681.

2015-10-26

2015-10-26 11:16:45 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Protocol version handling cleanup.

The protocol version is now represented the same way everywhere;
a 16-bit integer with the major (ie 3) in the high 8 bits, and
the minor in the low 8 bits.

Previously there was a mix between having a two element array,
and just keeping track of the minor.

Also strengthens the types of version variables in a few places.

2015-10-26 11:16:45 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Protocol version handling cleanup.

The protocol version is now represented the same way everywhere;
a 16-bit integer with the major (ie 3) in the high 8 bits, and
the minor in the low 8 bits.

Previously there was a mix between having a two element array,
and just keeping track of the minor.

Also strengthens the types of version variables in a few places.

2015-10-26 11:16:45 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Protocol version handling cleanup.

The protocol version is now represented the same way everywhere;
a 16-bit integer with the major (ie 3) in the high 8 bits, and
the minor in the low 8 bits.

Previously there was a mix between having a two element array,
and just keeping track of the minor.

Also strengthens the types of version variables in a few places.

2015-10-26 10:23:17 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Renumber the CipherModes.

Attempt to have a the cipher modes in approximate order of strength,
so that cipher_suite_sort_key() doesn't need to get more complicated.

2015-10-26 10:23:17 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Renumber the CipherModes.

Attempt to have a the cipher modes in approximate order of strength,
so that cipher_suite_sort_key() doesn't need to get more complicated.

2015-10-26 10:23:17 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Renumber the CipherModes.

Attempt to have a the cipher modes in approximate order of strength,
so that cipher_suite_sort_key() doesn't need to get more complicated.

2015-10-26 10:05:36 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.context: Added sort_suites().

2015-10-26 10:05:36 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.context: Added sort_suites().

2015-10-26 10:05:36 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.context: Added sort_suites().

2015-10-25

2015-10-25 21:54:03 by Martin Nilsson <nilsson@fastmail.com>

Documentation fix.

2015-10-25 21:54:03 by Martin Nilsson <nilsson@fastmail.com>

Documentation fix.

2015-10-25 21:54:03 by Martin Nilsson <nilsson@fastmail.com>

Documentation fix.

2015-10-25 18:42:13 by Martin Nilsson <nilsson@fastmail.com>

Use Stdio.Buffer for Bencoding.decode. Slightly laxer at handling truncated data.

2015-10-25 18:42:13 by Martin Nilsson <nilsson@fastmail.com>

Use Stdio.Buffer for Bencoding.decode. Slightly laxer at handling truncated data.

2015-10-25 18:42:13 by Martin Nilsson <nilsson@fastmail.com>

Use Stdio.Buffer for Bencoding.decode. Slightly laxer at handling truncated data.

2015-10-25 17:12:19 by Martin Nilsson <nilsson@fastmail.com>

We can't store UNDEFINED in arrays. Clear up some confusion.

2015-10-25 17:12:19 by Martin Nilsson <nilsson@fastmail.com>

We can't store UNDEFINED in arrays. Clear up some confusion.

2015-10-25 17:12:19 by Martin Nilsson <nilsson@fastmail.com>

We can't store UNDEFINED in arrays. Clear up some confusion.

2015-10-23

2015-10-23 16:32:16 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.connection: Implement 1/(n-1) measure against BEAST.

Improve resilience against the BEAST client-side attack,
by splitting the first data packet into two, where the
first only contains a single byte of payload.

2015-10-23 16:32:16 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.connection: Implement 1/(n-1) measure against BEAST.

Improve resilience against the BEAST client-side attack,
by splitting the first data packet into two, where the
first only contains a single byte of payload.

2015-10-23 16:32:16 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.connection: Implement 1/(n-1) measure against BEAST.

Improve resilience against the BEAST client-side attack,
by splitting the first data packet into two, where the
first only contains a single byte of payload.

2015-10-23 09:50:48 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Fix priorities for anonymous cipher suites.

Anonymous key exchange suffers from man in the middle attackability,
so make sure that they are only chosen when there are no supported
authenticated suites.

2015-10-23 09:50:48 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Fix priorities for anonymous cipher suites.

Anonymous key exchange suffers from man in the middle attackability,
so make sure that they are only chosen when there are no supported
authenticated suites.

2015-10-23 09:50:48 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Fix priorities for anonymous cipher suites.

Anonymous key exchange suffers from man in the middle attackability,
so make sure that they are only chosen when there are no supported
authenticated suites.

2015-10-23 09:45:10 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Support KeyExchange using ECDHE.

2015-10-23 09:45:10 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Support KeyExchange using ECDHE.

2015-10-23 09:45:10 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Support KeyExchange using ECDHE.

2015-10-23 09:43:08 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.handshake: Added the ECC extensions from RFC 4492.

These extensions are required to be able to support ECDH and ECDSA.

2015-10-23 09:43:08 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.handshake: Added the ECC extensions from RFC 4492.

These extensions are required to be able to support ECDH and ECDSA.

2015-10-23 09:43:08 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.handshake: Added the ECC extensions from RFC 4492.

These extensions are required to be able to support ECDH and ECDSA.

2015-10-23 09:39:04 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added some constants from RFC 4492.

Also adds some related low-level support for ECC key exchanges.

2015-10-23 09:39:04 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added some constants from RFC 4492.

Also adds some related low-level support for ECC key exchanges.

2015-10-23 09:39:04 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added some constants from RFC 4492.

Also adds some related low-level support for ECC key exchanges.

2015-10-22

2015-10-22 13:07:58 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Improved TLS 1.2 compatibility.

The TLS 1.2 prf is now derived from the hash function used for
the MAC for the suite, as this seems to be the convention for
all the suites that have been defined after TLS 1.2.

This simplifies implementation of the prf selection behaviour
specified eg for the suites defined in RFC 6367 3.3:

When used with TLS versions prior to 1.2 (TLS 1.0 and TLS 1.1),
the PRF is calculated as specified in the appropriate version
of the TLS specification.

2015-10-22 13:07:58 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Improved TLS 1.2 compatibility.

The TLS 1.2 prf is now derived from the hash function used for
the MAC for the suite, as this seems to be the convention for
all the suites that have been defined after TLS 1.2.

This simplifies implementation of the prf selection behaviour
specified eg for the suites defined in RFC 6367 3.3:

When used with TLS versions prior to 1.2 (TLS 1.0 and TLS 1.1),
the PRF is calculated as specified in the appropriate version
of the TLS specification.

2015-10-22 13:07:58 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Improved TLS 1.2 compatibility.

The TLS 1.2 prf is now derived from the hash function used for
the MAC for the suite, as this seems to be the convention for
all the suites that have been defined after TLS 1.2.

This simplifies implementation of the prf selection behaviour
specified eg for the suites defined in RFC 6367 3.3:

When used with TLS versions prior to 1.2 (TLS 1.0 and TLS 1.1),
the PRF is calculated as specified in the appropriate version
of the TLS specification.

2015-10-21

2015-10-21 23:21:43 by Martin Nilsson <nilsson@fastmail.com>

A very, very small fix.

2015-10-21 23:21:43 by Martin Nilsson <nilsson@fastmail.com>

A very, very small fix.

2015-10-21 23:21:43 by Martin Nilsson <nilsson@fastmail.com>

A very, very small fix.

2015-10-21 15:18:44 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Add support for AEAD ciphers.

Implements the TLS 1.2 protocol-level support for AEAD cipher suites.

No AEAD cipher suites have been added yet.

2015-10-21 15:18:44 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Add support for AEAD ciphers.

Implements the TLS 1.2 protocol-level support for AEAD cipher suites.

No AEAD cipher suites have been added yet.

2015-10-21 15:18:44 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Add support for AEAD ciphers.

Implements the TLS 1.2 protocol-level support for AEAD cipher suites.

No AEAD cipher suites have been added yet.

2015-10-20

2015-10-20 10:18:58 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.context: Added get_suites().

Generate the cipher suite selection from CIPHER_SUITES, so
that it always is up to date, and has the correct order.

This gets rid of the hard-coded tables preferred_rsa_suites and
preferred_dhe_dss_suites.

Pike 7.8 only: preferred_rsa_suites and preferred_dhe_dss_suites
have been replaced with getters generating the same content.

2015-10-20 10:18:58 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.context: Added get_suites().

Generate the cipher suite selection from CIPHER_SUITES, so
that it always is up to date, and has the correct order.

This gets rid of the hard-coded tables preferred_rsa_suites and
preferred_dhe_dss_suites.

Pike 7.8 only: preferred_rsa_suites and preferred_dhe_dss_suites
have been replaced with getters generating the same content.

2015-10-20 10:18:58 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.context: Added get_suites().

Generate the cipher suite selection from CIPHER_SUITES, so
that it always is up to date, and has the correct order.

This gets rid of the hard-coded tables preferred_rsa_suites and
preferred_dhe_dss_suites.

Pike 7.8 only: preferred_rsa_suites and preferred_dhe_dss_suites
have been replaced with getters generating the same content.

2015-10-20 09:57:05 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Added KE_fortezza for completeness.

2015-10-20 09:57:05 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Added KE_fortezza for completeness.

2015-10-20 09:57:05 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Added KE_fortezza for completeness.

2015-10-19

2015-10-19 15:38:16 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.https: Added client mode.

2015-10-19 15:38:16 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.https: Added client mode.

2015-10-19 15:38:16 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.https: Added client mode.

2015-10-19 09:52:40 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.handshake: Support EXTENSION_signature_algorithms.

2015-10-19 09:52:40 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.handshake: Support EXTENSION_signature_algorithms.

2015-10-19 09:52:40 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.handshake: Support EXTENSION_signature_algorithms.

2015-10-16

2015-10-16 15:03:55 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Enable support for TLS 1.2.

This mainly adds some minimal support for TLS 1.2 signatures,
with which all the requirements for TLS are fulfilled.

Seems to interoperate with gnutls:
- Description: (TLS1.2-PKIX)-(DHE-RSA-1024)-(CAMELLIA-256-CBC)-(SHA1)
- Session ID: 52:93:96:96:50:69:6B:65:53:53:4C:33:00:00:00:1F
- Ephemeral Diffie-Hellman parameters
- Using prime: 1024 bits
- Secret key: 1020 bits
- Peer's public key: 1024 bits
- Version: TLS1.2
- Key Exchange: DHE-RSA
- Server Signature: RSA-SHA1
- Cipher: CAMELLIA-256-CBC
- MAC: SHA1
- Compression: NULL
- Handshake was completed

2015-10-16 15:03:55 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Enable support for TLS 1.2.

This mainly adds some minimal support for TLS 1.2 signatures,
with which all the requirements for TLS are fulfilled.

Seems to interoperate with gnutls:
- Description: (TLS1.2-PKIX)-(DHE-RSA-1024)-(CAMELLIA-256-CBC)-(SHA1)
- Session ID: 52:93:96:96:50:69:6B:65:53:53:4C:33:00:00:00:1F
- Ephemeral Diffie-Hellman parameters
- Using prime: 1024 bits
- Secret key: 1020 bits
- Peer's public key: 1024 bits
- Version: TLS1.2
- Key Exchange: DHE-RSA
- Server Signature: RSA-SHA1
- Cipher: CAMELLIA-256-CBC
- MAC: SHA1
- Compression: NULL
- Handshake was completed

2015-10-16 15:03:55 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Enable support for TLS 1.2.

This mainly adds some minimal support for TLS 1.2 signatures,
with which all the requirements for TLS are fulfilled.

Seems to interoperate with gnutls:
- Description: (TLS1.2-PKIX)-(DHE-RSA-1024)-(CAMELLIA-256-CBC)-(SHA1)
- Session ID: 52:93:96:96:50:69:6B:65:53:53:4C:33:00:00:00:1F
- Ephemeral Diffie-Hellman parameters
- Using prime: 1024 bits
- Secret key: 1020 bits
- Peer's public key: 1024 bits
- Version: TLS1.2
- Key Exchange: DHE-RSA
- Server Signature: RSA-SHA1
- Cipher: CAMELLIA-256-CBC
- MAC: SHA1
- Compression: NULL
- Handshake was completed

2015-10-16 13:27:51 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher.KeyExchange: Added some Autodoc markup.

2015-10-16 13:27:51 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher.KeyExchange: Added some Autodoc markup.

2015-10-16 13:20:48 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Added KeyExchangeNULL.

The SSL_null_with_null_null cipher suite now works (when enabled).

Removes KeyExchangeGeneric, since it is no longer in use.

2015-10-16 13:20:48 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Added KeyExchangeNULL.

The SSL_null_with_null_null cipher suite now works (when enabled).

Removes KeyExchangeGeneric, since it is no longer in use.

2015-10-16 13:20:48 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Added KeyExchangeNULL.

The SSL_null_with_null_null cipher suite now works (when enabled).

Removes KeyExchangeGeneric, since it is no longer in use.

2015-10-16 13:20:46 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Added KeyExchangeDH and KeyExchangeDHE.

The only thing KeyExchangeGeneric is used for now is KE_none (when
enabled)...

2015-10-16 13:20:46 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Added KeyExchangeDH and KeyExchangeDHE.

The only thing KeyExchangeGeneric is used for now is KE_none (when
enabled)...

2015-10-16 13:20:46 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Added KeyExchangeDH and KeyExchangeDHE.

The only thing KeyExchangeGeneric is used for now is KE_none (when
enabled)...

2015-10-16 13:20:33 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Added KeyExchangeRSA and KeyExchangeGeneric.

KeyExchangeRSA is a key exchanger that only handles KE_rsa.

Also changed server_derive_master_secret() to use derive_master_secret()
to avoid code duplication.

2015-10-16 13:20:33 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Added KeyExchangeRSA and KeyExchangeGeneric.

KeyExchangeRSA is a key exchanger that only handles KE_rsa.

Also changed server_derive_master_secret() to use derive_master_secret()
to avoid code duplication.

2015-10-16 13:20:33 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Added KeyExchangeRSA and KeyExchangeGeneric.

KeyExchangeRSA is a key exchanger that only handles KE_rsa.

Also changed server_derive_master_secret() to use derive_master_secret()
to avoid code duplication.

2015-10-16 12:10:01 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher.KeyExchange: Split out from SSL.handshake.

First step in cleaning up the key exchange code.
This mainly moves code (essentially unmodified) from SSL.handshake to
the new SSL.Cipher.KeyExchange.

2015-10-16 12:10:01 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher.KeyExchange: Split out from SSL.handshake.

First step in cleaning up the key exchange code.
This mainly moves code (essentially unmodified) from SSL.handshake to
the new SSL.Cipher.KeyExchange.

2015-10-16 12:10:01 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher.KeyExchange: Split out from SSL.handshake.

First step in cleaning up the key exchange code.
This mainly moves code (essentially unmodified) from SSL.handshake to
the new SSL.Cipher.KeyExchange.

2015-10-16 10:23:47 by Martin Nilsson <nilsson@opera.com>

SSL: Made the packet size configurable.

Setting the size to 1400 improves conditions when there are packet
loss, as it avoids block-of-line for the integrity check of the TLS
record. The tradeoff is more overhead.

2015-10-16 10:23:47 by Martin Nilsson <nilsson@opera.com>

SSL: Made the packet size configurable.

Setting the size to 1400 improves conditions when there are packet
loss, as it avoids block-of-line for the integrity check of the TLS
record. The tradeoff is more overhead.

2015-10-16 10:23:47 by Martin Nilsson <nilsson@opera.com>

SSL: Made the packet size configurable.

Setting the size to 1400 improves conditions when there are packet
loss, as it avoids block-of-line for the integrity check of the TLS
record. The tradeoff is more overhead.

2015-10-16 10:20:11 by Martin Nilsson <nilsson@opera.com>

Fixed switch-on-object warning.

2015-10-16 10:20:11 by Martin Nilsson <nilsson@opera.com>

Fixed switch-on-object warning.

2015-10-16 10:20:11 by Martin Nilsson <nilsson@opera.com>

Fixed switch-on-object warning.

2015-10-16 10:18:25 by Bill Welliver <bill@welliver.org>

SSL/Protocols.HTTP: Add client support for SNI (server name indication)

2015-10-16 10:18:25 by Bill Welliver <bill@welliver.org>

SSL/Protocols.HTTP: Add client support for SNI (server name indication)

2015-10-16 10:18:25 by Bill Welliver <bill@welliver.org>

SSL/Protocols.HTTP: Add client support for SNI (server name indication)

2015-10-16 10:18:23 by Bill Welliver <bill@welliver.org>

SSL: Add support for Server Name Indication (SNI) based selection of
keys and certs.

2015-10-16 10:18:23 by Bill Welliver <bill@welliver.org>

SSL: Add support for Server Name Indication (SNI) based selection of
keys and certs.

2015-10-16 10:18:23 by Bill Welliver <bill@welliver.org>

SSL: Add support for Server Name Indication (SNI) based selection of
keys and certs.

2015-10-16 09:47:05 by Martin Nilsson <nilsson@opera.com>

Set a sensible default random function in the context.

2015-10-16 09:47:05 by Martin Nilsson <nilsson@opera.com>

Set a sensible default random function in the context.

2015-10-16 09:47:05 by Martin Nilsson <nilsson@opera.com>

Set a sensible default random function in the context.

2015-10-16 09:44:09 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: The debug code now knows about SSL 2.0.

SSL 2.0 constants may show up in HANDSHAKE_hello_v2 messages,
so make sure the debug code can display them properly.

2015-10-16 09:44:09 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: The debug code now knows about SSL 2.0.

SSL 2.0 constants may show up in HANDSHAKE_hello_v2 messages,
so make sure the debug code can display them properly.

2015-10-16 09:44:09 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: The debug code now knows about SSL 2.0.

SSL 2.0 constants may show up in HANDSHAKE_hello_v2 messages,
so make sure the debug code can display them properly.

2015-10-16 09:41:27 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.handshake: Fixed documentation typo.

2015-10-16 09:41:27 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.handshake: Fixed documentation typo.

2015-10-16 09:41:27 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.handshake: Fixed documentation typo.

2015-10-15

2015-10-15 14:50:05 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.session: Added fields for the active RSA and DSA keys.

2015-10-15 14:50:05 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.session: Added fields for the active RSA and DSA keys.

2015-10-15 14:50:05 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.session: Added fields for the active RSA and DSA keys.

2015-10-15 14:32:57 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Add support for some CAMELLIA cipher suites.

2015-10-15 14:32:57 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Add support for some CAMELLIA cipher suites.

2015-10-15 14:32:57 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Add support for some CAMELLIA cipher suites.

2015-10-15 14:03:26 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added HashAlgorithm enum.

2015-10-15 14:03:26 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added HashAlgorithm enum.

2015-10-15 14:03:26 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added HashAlgorithm enum.

2015-10-15 10:17:02 by Martin Nilsson <nilsson@opera.com>

Simplified some debug.

2015-10-15 10:17:02 by Martin Nilsson <nilsson@opera.com>

Simplified some debug.

2015-10-15 10:17:02 by Martin Nilsson <nilsson@opera.com>

Simplified some debug.

2015-10-14

2015-10-14 15:30:18 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added context()->filter_weak_suites().

Both context()->{rsa,dhe_dss}_mode() now take an optional argument and call filter_weak_suites().
Also moved the default sets of preferred cipher suites to Constants.preferred_*_suites.
SSL.Constants.CIPHER_algorithms is now a mapping (was a multiset).

2015-10-14 15:30:18 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added context()->filter_weak_suites().

Both context()->{rsa,dhe_dss}_mode() now take an optional argument and call filter_weak_suites().
Also moved the default sets of preferred cipher suites to Constants.preferred_*_suites.
SSL.Constants.CIPHER_algorithms is now a mapping (was a multiset).

2015-10-14 15:30:18 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added context()->filter_weak_suites().

Both context()->{rsa,dhe_dss}_mode() now take an optional argument and call filter_weak_suites().
Also moved the default sets of preferred cipher suites to Constants.preferred_*_suites.
SSL.Constants.CIPHER_algorithms is now a mapping (was a multiset).

2015-10-14 15:15:34 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added support for specifying the minimum and maximum versions of SSL.

The minimum and maximum accepted SSL/TLS versions are
configured by setting the corresponding variables in the
context object.

This is in line with how other SSL parameters are configured.

2015-10-14 15:15:34 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added support for specifying the minimum and maximum versions of SSL.

The minimum and maximum accepted SSL/TLS versions are
configured by setting the corresponding variables in the
context object.

This is in line with how other SSL parameters are configured.

2015-10-14 15:15:34 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added support for specifying the minimum and maximum versions of SSL.

The minimum and maximum accepted SSL/TLS versions are
configured by setting the corresponding variables in the
context object.

This is in line with how other SSL parameters are configured.

2015-10-14 12:59:27 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added symbolic constants for the SSL versions.

2015-10-14 12:59:27 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added symbolic constants for the SSL versions.

2015-10-14 12:59:27 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added symbolic constants for the SSL versions.

2015-10-14 12:23:29 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added some more SSL3_DEBUG and SSL3_DEBUG_CRYPT.

2015-10-14 12:23:29 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added some more SSL3_DEBUG and SSL3_DEBUG_CRYPT.

2015-10-14 12:23:27 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Support TLS 1.1 IVs.

2015-10-14 12:23:27 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Support TLS 1.1 IVs.

2015-10-14 12:23:27 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Support TLS 1.1 IVs.

2015-10-14 12:23:24 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Parameterized the SSL protocol version.

Backported from Pike 8.0.

2015-10-14 12:23:24 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Parameterized the SSL protocol version.

Backported from Pike 8.0.

2015-10-14 12:23:24 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Parameterized the SSL protocol version.

Backported from Pike 8.0.

2015-10-14 12:23:23 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Nettle: Let the IV be set through Nettle.Proxy (aka Crypto.Buffer).

2015-10-11

2015-10-11 14:04:24 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Merge branch '8.1' into grubba/typechecker-mk3

* 8.1: (51 commits)
Compiler [Types]: Got rid of my_describe_type().
Compiler [Types]: Fixed wide strings in nested types.
Compiler [Types]: low_describe_type() now uses string_builder.
string_builder_sprintf: Fixed '+' for floats.
string_builder_sprintf: Added support for %T.
Calendar.mkrules: Improved backward compat.
Auth.OAuth.Client: Fixed AutoDoc markup issue.
New modules for communicating with different (RESTful) web apis (including OAuth and OAuth2 client modules) .
Documentation [%]: Added some clarifications and improved markup.
Inotify: Minor code cleanup. Potential fix for [CID 1325796].
Inotify: Removed some debug output.
Filesystem.Monitor [Inotify]: Improved support for blocking mode.
Inotify: Don't reference count immediate circular references.
Inotify: Removed some dead code.
System.Inotify, Filesystem.Monitor: Updates to use new Inotify API.
Inotify: Use fd_callback_boxes, internal event parsing.
Search.Database.MySQL: Censor the SQL-url.
Sql: Added censor_sql_url().
Search.Database.MySQL: Avoid long lived database connections.
Inotify: Don't throw errors in rm_watch() on invalid watch descriptor.
...

2015-09-28

2015-09-28 16:55:15 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Documentation [Protocols.LDAP]: Added some RFC markup.

2015-09-28 16:55:15 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Documentation [Protocols.LDAP]: Added some RFC markup.

2015-09-28 16:55:15 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Documentation [Protocols.LDAP]: Added some RFC markup.

2015-09-24

2015-09-24 02:24:30 by Martin Nilsson <nilsson@fastmail.com>

Missed a sentence.

2015-09-24 02:24:30 by Martin Nilsson <nilsson@fastmail.com>

Missed a sentence.

2015-09-24 02:24:30 by Martin Nilsson <nilsson@fastmail.com>

Missed a sentence.

2015-09-24 02:21:11 by Martin Nilsson <nilsson@fastmail.com>

Allow fine grained control over what extensions to use.

2015-09-24 02:21:11 by Martin Nilsson <nilsson@fastmail.com>

Allow fine grained control over what extensions to use.

2015-09-24 02:21:11 by Martin Nilsson <nilsson@fastmail.com>

Allow fine grained control over what extensions to use.

2015-09-21

2015-09-21 15:48:17 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Documentation [Protocols.LDP]: Added some RFC markup.

2015-09-21 15:48:17 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Documentation [Protocols.LDP]: Added some RFC markup.

2015-09-21 15:48:17 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Documentation [Protocols.LDP]: Added some RFC markup.

2015-09-21 15:47:28 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Documentation [Protocols.LDP]: Added some RFC markup.

2015-09-21 15:47:28 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Documentation [Protocols.LDP]: Added some RFC markup.

2015-09-21 15:47:28 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Documentation [Protocols.LDP]: Added some RFC markup.

2015-09-18

2015-09-18 14:43:29 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Filesystem.Monitor: Added check_all().

2015-09-15

2015-09-15 14:18:30 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.HTTP2: Added Frame class.

2015-09-15 14:18:30 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.HTTP2: Added Frame class.

2015-09-15 14:18:30 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.HTTP2: Added Frame class.

2015-09-13

2015-09-13 10:10:12 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: Added option to disable renegotiation.

This is a feature required by HTTP/2 (RFC 7540 9.2.1).

2015-09-13 10:10:12 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: Added option to disable renegotiation.

This is a feature required by HTTP/2 (RFC 7540 9.2.1).

2015-09-13 10:10:12 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: Added option to disable renegotiation.

This is a feature required by HTTP/2 (RFC 7540 9.2.1).

2015-09-02

2015-09-02 20:16:22 by Martin Nilsson <nilsson@fastmail.com>

Disable extended master secret extension by default. It isn't standardized yet, and currently doesn't interopt with Chrome.

2015-09-02 20:16:22 by Martin Nilsson <nilsson@fastmail.com>

Disable extended master secret extension by default. It isn't standardized yet, and currently doesn't interopt with Chrome.

2015-09-02 20:16:22 by Martin Nilsson <nilsson@fastmail.com>

Disable extended master secret extension by default. It isn't standardized yet, and currently doesn't interopt with Chrome.

2015-09-02 20:08:06 by Martin Nilsson <nilsson@fastmail.com>

Truncated HMAC may be a security issues, and isn't really supported by anyone else. Disable it by default.

2015-09-02 20:08:06 by Martin Nilsson <nilsson@fastmail.com>

Truncated HMAC may be a security issues, and isn't really supported by anyone else. Disable it by default.

2015-09-02 20:08:06 by Martin Nilsson <nilsson@fastmail.com>

Truncated HMAC may be a security issues, and isn't really supported by anyone else. Disable it by default.

2015-09-02 19:58:53 by Martin Nilsson <nilsson@fastmail.com>

Documentation updates.

2015-09-02 19:58:53 by Martin Nilsson <nilsson@fastmail.com>

Documentation updates.

2015-09-02 19:58:53 by Martin Nilsson <nilsson@fastmail.com>

Documentation updates.

2015-08-25

2015-08-25 16:50:15 by Per Hedbor <ph@opera.com>

Merge remote-tracking branch 'origin/8.1' into per/substrings

2015-08-25 16:50:15 by Per Hedbor <ph@opera.com>

Merge remote-tracking branch 'origin/8.1' into per/substrings

2015-08-25 15:34:53 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Documentation [Protocols.LMTP]: Moved some documentation.

2015-08-25 15:34:53 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Documentation [Protocols.LMTP]: Moved some documentation.

2015-08-25 15:34:53 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Documentation [Protocols.LMTP]: Moved some documentation.

2015-08-22

2015-08-22 18:54:15 by Martin Nilsson <nilsson@fastmail.com>

Support linking direct to RFC anchor.

2015-08-22 18:54:15 by Martin Nilsson <nilsson@fastmail.com>

Support linking direct to RFC anchor.

2015-08-22 18:54:15 by Martin Nilsson <nilsson@fastmail.com>

Support linking direct to RFC anchor.

2015-08-21

2015-08-21 23:56:32 by Martin Nilsson <nilsson@fastmail.com>

Use @rfc{@} autodoc syntax.

2015-08-21 23:56:32 by Martin Nilsson <nilsson@fastmail.com>

Use @rfc{@} autodoc syntax.

2015-08-21 23:56:32 by Martin Nilsson <nilsson@fastmail.com>

Use @rfc{@} autodoc syntax.

2015-08-17

2015-08-17 13:26:18 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: Default to the FFDHE2048 group.

Changes the default DHE group from MODP group 24 to FFDHE2048.

This makes SMACKTest (http://smacktest.com/) happy, and reduces
the risk of precalculated attacks against the MODP group.

2015-08-17 13:26:18 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: Default to the FFDHE2048 group.

Changes the default DHE group from MODP group 24 to FFDHE2048.

This makes SMACKTest (http://smacktest.com/) happy, and reduces
the risk of precalculated attacks against the MODP group.

2015-08-17 13:26:18 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: Default to the FFDHE2048 group.

Changes the default DHE group from MODP group 24 to FFDHE2048.

This makes SMACKTest (http://smacktest.com/) happy, and reduces
the risk of precalculated attacks against the MODP group.

2015-08-17 13:26:18 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: Default to the FFDHE2048 group.

Changes the default DHE group from MODP group 24 to FFDHE2048.

This makes SMACKTest (http://smacktest.com/) happy, and reduces
the risk of precalculated attacks against the MODP group.

2015-08-06

2015-08-06 12:08:57 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.HTTP2: Added the constants from RFC 7540.

2015-08-06 12:08:57 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.HTTP2: Added the constants from RFC 7540.

2015-08-06 12:08:57 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.HTTP2: Added the constants from RFC 7540.

2015-08-06 12:08:57 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.HTTP2: Added the constants from RFC 7540.

2015-08-05

2015-08-05 12:31:45 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Connection: Added shutdown().

2015-08-05 12:31:45 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Connection: Added shutdown().

2015-08-05 12:31:45 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Connection: Added shutdown().

2015-08-05 12:31:45 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Connection: Added shutdown().

2015-07-31

2015-07-31 00:10:32 by Martin Nilsson <nilsson@fastmail.com>

Mark read and write as deprecated. Added documentation.

2015-07-31 00:10:32 by Martin Nilsson <nilsson@fastmail.com>

Mark read and write as deprecated. Added documentation.

2015-07-31 00:10:32 by Martin Nilsson <nilsson@fastmail.com>

Mark read and write as deprecated. Added documentation.

2015-07-31 00:10:32 by Martin Nilsson <nilsson@fastmail.com>

Mark read and write as deprecated. Added documentation.

2015-07-08

2015-07-08 15:54:26 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added query_application_protocol().

This is needed for protocols using ALPN.

2015-07-08 15:54:26 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added query_application_protocol().

This is needed for protocols using ALPN.

2015-07-08 15:54:26 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added query_application_protocol().

This is needed for protocols using ALPN.

2015-07-08 15:54:26 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added query_application_protocol().

This is needed for protocols using ALPN.

2015-07-08 15:53:14 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added query_application_protocol().

This is needed for protocols using ALPN.

2015-07-08 15:53:14 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added query_application_protocol().

This is needed for protocols using ALPN.

2015-07-08 15:53:14 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added query_application_protocol().

This is needed for protocols using ALPN.

2015-07-08 15:53:14 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added query_application_protocol().

This is needed for protocols using ALPN.

2015-07-07

2015-07-07 10:05:25 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Minor documentation changes.

2015-07-07 10:05:25 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Minor documentation changes.

2015-07-07 10:05:25 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Minor documentation changes.

2015-07-07 10:05:25 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Minor documentation changes.

2015-07-06

2015-07-06 13:52:56 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.ClientConnection: Support ALPN being accepted.

Fixes [LysLysKOM 21365565].

2015-07-06 13:52:56 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.ClientConnection: Support ALPN being accepted.

Fixes [LysLysKOM 21365565].

2015-07-06 13:52:56 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.ClientConnection: Support ALPN being accepted.

Fixes [LysLysKOM 21365565].

2015-07-06 13:52:56 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.ClientConnection: Support ALPN being accepted.

Fixes [LysLysKOM 21365565].

2015-07-06 13:36:00 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.ClientConnection: Support ALPN being accepted.

Fixes [LysLysKOM 21365565].

2015-07-06 13:36:00 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.ClientConnection: Support ALPN being accepted.

Fixes [LysLysKOM 21365565].

2015-07-06 13:36:00 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.ClientConnection: Support ALPN being accepted.

Fixes [LysLysKOM 21365565].

2015-07-06 13:36:00 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.ClientConnection: Support ALPN being accepted.

Fixes [LysLysKOM 21365565].

2015-07-06 13:31:20 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Buffer: Added read_string_array().

2015-07-06 13:31:20 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Buffer: Added read_string_array().

2015-07-06 13:31:20 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Buffer: Added read_string_array().

2015-07-06 13:31:20 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Buffer: Added read_string_array().

2015-05-26

2015-05-26 10:33:42 by Martin Nilsson <nilsson@opera.com>

Removed trailing spaces.

2015-05-26 10:33:42 by Martin Nilsson <nilsson@opera.com>

Removed trailing spaces.

2015-05-26 10:33:42 by Martin Nilsson <nilsson@opera.com>

Removed trailing spaces.

2015-05-26 10:33:42 by Martin Nilsson <nilsson@opera.com>

Removed trailing spaces.

2015-05-24

2015-05-24 18:41:15 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.DNS: Added some constants from the DNSSEC RFCs.

2015-05-24 18:41:15 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.DNS: Added some constants from the DNSSEC RFCs.

2015-05-24 18:41:15 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.DNS: Added some constants from the DNSSEC RFCs.

2015-05-24 18:41:15 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.DNS: Added some constants from the DNSSEC RFCs.

2015-05-05

2015-05-05 14:57:36 by Chris Angelico <rosuav@gmail.com>

Add a non-ASCII character to the example to demo automatic UTF-8 encoding

2015-05-05 14:57:36 by Chris Angelico <rosuav@gmail.com>

Add a non-ASCII character to the example to demo automatic UTF-8 encoding

2015-05-05 14:57:36 by Chris Angelico <rosuav@gmail.com>

Add a non-ASCII character to the example to demo automatic UTF-8 encoding

2015-05-05 14:57:36 by Chris Angelico <rosuav@gmail.com>

Add a non-ASCII character to the example to demo automatic UTF-8 encoding

2015-04-22

2015-04-22 15:04:58 by Martin Nilsson <nilsson@opera.com>

Keep track of Session activity, so they can be removed when inactive, not just old.

2015-04-22 15:04:58 by Martin Nilsson <nilsson@opera.com>

Keep track of Session activity, so they can be removed when inactive, not just old.

2015-04-22 15:04:58 by Martin Nilsson <nilsson@opera.com>

Keep track of Session activity, so they can be removed when inactive, not just old.

2015-04-22 15:04:58 by Martin Nilsson <nilsson@opera.com>

Keep track of Session activity, so they can be removed when inactive, not just old.

2015-04-14

2015-04-14 13:09:18 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Sql: Added support for multiple results.

Adds Sql.sql_result()->next_result().

2015-04-14 13:09:18 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Sql: Added support for multiple results.

Adds Sql.sql_result()->next_result().

2015-04-14 13:09:18 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Sql: Added support for multiple results.

Adds Sql.sql_result()->next_result().

2015-04-14 13:09:18 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Sql: Added support for multiple results.

Adds Sql.sql_result()->next_result().

2015-04-14 12:52:53 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Sql: Added support for multiple results.

Adds Sql.sql_result()->next_result().

2015-04-14 12:52:53 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Sql: Added support for multiple results.

Adds Sql.sql_result()->next_result().

2015-04-14 12:52:53 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Sql: Added support for multiple results.

Adds Sql.sql_result()->next_result().

2015-04-14 12:52:53 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Sql: Added support for multiple results.

Adds Sql.sql_result()->next_result().

2015-04-13

2015-04-13 21:06:45 by Tobias S. Josefowitz <tobij@tobij.de>

First go at MPI bindings

2015-04-13 21:06:45 by Tobias S. Josefowitz <tobij@tobij.de>

First go at MPI bindings

2015-04-12

2015-04-12 14:56:26 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Port: Support on-demand creation of the Context.

Adds context_factory() and a few related getters and setters.

2015-04-12 14:56:26 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Port: Support on-demand creation of the Context.

Adds context_factory() and a few related getters and setters.

2015-04-12 14:56:26 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Port: Support on-demand creation of the Context.

Adds context_factory() and a few related getters and setters.

2015-04-12 14:56:26 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Port: Support on-demand creation of the Context.

Adds context_factory() and a few related getters and setters.

2015-04-05

2015-04-05 22:44:33 by Martin Nilsson <nilsson@opera.com>

Fix a comment.

2015-04-05 22:44:33 by Martin Nilsson <nilsson@opera.com>

Fix a comment.

2015-04-05 22:44:33 by Martin Nilsson <nilsson@opera.com>

Fix a comment.

2015-04-05 22:44:33 by Martin Nilsson <nilsson@opera.com>

Fix a comment.

2015-04-05 22:27:35 by Martin Nilsson <nilsson@opera.com>

Added the final defined PSK suites, ECDHE. The suite lookup table test broke as always, but all the defined ciphers appears to work.

2015-04-05 22:27:35 by Martin Nilsson <nilsson@opera.com>

Added the final defined PSK suites, ECDHE. The suite lookup table test broke as always, but all the defined ciphers appears to work.

2015-04-05 22:27:35 by Martin Nilsson <nilsson@opera.com>

Added the final defined PSK suites, ECDHE. The suite lookup table test broke as always, but all the defined ciphers appears to work.

2015-04-05 22:27:35 by Martin Nilsson <nilsson@opera.com>

Added the final defined PSK suites, ECDHE. The suite lookup table test broke as always, but all the defined ciphers appears to work.

2015-04-04

2015-04-04 13:56:19 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Session: Updated some documentation.

2015-04-04 13:56:19 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Session: Updated some documentation.

2015-04-04 13:56:19 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Session: Updated some documentation.

2015-04-04 13:56:19 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Session: Updated some documentation.

2015-03-31

2015-03-31 16:18:01 by Martin Nilsson <nilsson@opera.com>

Changed packet parsing to use Stdio.Buffer objects. The Packet factory is still weird and needs some more thought.

2015-03-31 16:18:01 by Martin Nilsson <nilsson@opera.com>

Changed packet parsing to use Stdio.Buffer objects. The Packet factory is still weird and needs some more thought.

2015-03-31 16:18:01 by Martin Nilsson <nilsson@opera.com>

Changed packet parsing to use Stdio.Buffer objects. The Packet factory is still weird and needs some more thought.

2015-03-31 16:18:01 by Martin Nilsson <nilsson@opera.com>

Changed packet parsing to use Stdio.Buffer objects. The Packet factory is still weird and needs some more thought.

2015-03-31 06:31:34 by Martin Nilsson <nilsson@opera.com>

Serialize packets directly into the output buffer.

2015-03-31 06:31:34 by Martin Nilsson <nilsson@opera.com>

Serialize packets directly into the output buffer.

2015-03-31 06:31:34 by Martin Nilsson <nilsson@opera.com>

Serialize packets directly into the output buffer.

2015-03-31 06:31:34 by Martin Nilsson <nilsson@opera.com>

Serialize packets directly into the output buffer.

2015-03-31 05:43:43 by Martin Nilsson <nilsson@opera.com>

Change to_write API to return 0 on no data instead of empty string.

2015-03-31 05:43:43 by Martin Nilsson <nilsson@opera.com>

Change to_write API to return 0 on no data instead of empty string.

2015-03-31 05:43:43 by Martin Nilsson <nilsson@opera.com>

Change to_write API to return 0 on no data instead of empty string.

2015-03-31 05:43:43 by Martin Nilsson <nilsson@opera.com>

Change to_write API to return 0 on no data instead of empty string.

2015-03-31 03:41:36 by Martin Nilsson <nilsson@opera.com>

Optimize export crypto a bit for the testsuite.

2015-03-31 03:41:36 by Martin Nilsson <nilsson@opera.com>

Optimize export crypto a bit for the testsuite.

2015-03-31 03:41:36 by Martin Nilsson <nilsson@opera.com>

Optimize export crypto a bit for the testsuite.

2015-03-31 03:41:36 by Martin Nilsson <nilsson@opera.com>

Optimize export crypto a bit for the testsuite.

2015-03-30

2015-03-30 20:27:37 by Martin Nilsson <nilsson@opera.com>

Made internal methods protected.

2015-03-30 20:27:37 by Martin Nilsson <nilsson@opera.com>

Made internal methods protected.

2015-03-30 20:27:37 by Martin Nilsson <nilsson@opera.com>

Made internal methods protected.

2015-03-30 20:27:37 by Martin Nilsson <nilsson@opera.com>

Made internal methods protected.

2015-03-23

2015-03-23 23:36:04 by Martin Nilsson <nilsson@opera.com>

No one is seriously using export ciphers, so stop optimizing them and throw out some code. (My desktop is doing 710 keys per second)

2015-03-23 23:36:04 by Martin Nilsson <nilsson@opera.com>

No one is seriously using export ciphers, so stop optimizing them and throw out some code. (My desktop is doing 710 keys per second)

2015-03-23 23:36:04 by Martin Nilsson <nilsson@opera.com>

No one is seriously using export ciphers, so stop optimizing them and throw out some code. (My desktop is doing 710 keys per second)

2015-03-23 23:36:04 by Martin Nilsson <nilsson@opera.com>

No one is seriously using export ciphers, so stop optimizing them and throw out some code. (My desktop is doing 710 keys per second)

2015-03-22

2015-03-22 10:38:41 by Arne Goedeke <el@laramies.com>

Protocols.WebSocket: Use Stdio.File buffer mode

2015-03-22 10:38:41 by Arne Goedeke <el@laramies.com>

Protocols.WebSocket: Use Stdio.File buffer mode

2015-03-22 10:38:41 by Arne Goedeke <el@laramies.com>

Protocols.WebSocket: Use Stdio.File buffer mode

2015-03-22 10:38:41 by Arne Goedeke <el@laramies.com>

Protocols.WebSocket: Use Stdio.File buffer mode

2015-03-16

2015-03-16 12:30:38 by Martin Nilsson <nilsson@opera.com>

Small cleanup.

2015-03-16 12:30:38 by Martin Nilsson <nilsson@opera.com>

Small cleanup.

2015-03-16 12:30:38 by Martin Nilsson <nilsson@opera.com>

Small cleanup.

2015-03-16 12:30:38 by Martin Nilsson <nilsson@opera.com>

Small cleanup.

2015-03-09

2015-03-09 13:32:58 by Martin Nilsson <nilsson@opera.com>

Don't use RC4 by default.

2015-03-09 13:32:58 by Martin Nilsson <nilsson@opera.com>

Don't use RC4 by default.

2015-03-09 13:32:58 by Martin Nilsson <nilsson@opera.com>

Don't use RC4 by default.

2015-03-09 13:32:58 by Martin Nilsson <nilsson@opera.com>

Don't use RC4 by default.

2015-03-07

2015-03-07 13:42:51 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: Added support for private FFDHE-groups.

2015-03-07 13:42:51 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: Added support for private FFDHE-groups.

2015-03-07 13:42:51 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: Added support for private FFDHE-groups.

2015-03-07 13:42:51 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: Added support for private FFDHE-groups.

2015-03-06

2015-03-06 13:53:20 by Martin Nilsson <nilsson@opera.com>

Remove redundant PROTOCOL_SSL constants.

2015-03-06 13:53:20 by Martin Nilsson <nilsson@opera.com>

Remove redundant PROTOCOL_SSL constants.

2015-03-06 13:53:20 by Martin Nilsson <nilsson@opera.com>

Remove redundant PROTOCOL_SSL constants.

2015-03-06 13:53:20 by Martin Nilsson <nilsson@opera.com>

Remove redundant PROTOCOL_SSL constants.

2015-03-06 13:37:52 by Martin Nilsson <nilsson@opera.com>

Doc fixes.

2015-03-06 13:37:52 by Martin Nilsson <nilsson@opera.com>

Doc fixes.

2015-03-06 13:37:52 by Martin Nilsson <nilsson@opera.com>

Doc fixes.

2015-03-06 13:37:52 by Martin Nilsson <nilsson@opera.com>

Doc fixes.

2015-03-04

2015-03-04 19:57:31 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Added KeyExchangeExportRSA.

This breaks out the handling of export-RSA from KeyExchangeRSA in
order to reduce the attack surface for attacks like FREAK.

2015-03-04 19:57:31 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Added KeyExchangeExportRSA.

This breaks out the handling of export-RSA from KeyExchangeRSA in
order to reduce the attack surface for attacks like FREAK.

2015-03-04 19:57:31 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Added KeyExchangeExportRSA.

This breaks out the handling of export-RSA from KeyExchangeRSA in
order to reduce the attack surface for attacks like FREAK.

2015-03-04 19:57:31 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Added KeyExchangeExportRSA.

This breaks out the handling of export-RSA from KeyExchangeRSA in
order to reduce the attack surface for attacks like FREAK.

2015-03-04 19:54:38 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Added KE_rsa_export.

This is in preparation for breaking out the export-RSA handshaking
from KeyExchangeRSA.

2015-03-04 19:54:38 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Added KE_rsa_export.

This is in preparation for breaking out the export-RSA handshaking
from KeyExchangeRSA.

2015-03-04 19:54:38 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Added KE_rsa_export.

This is in preparation for breaking out the export-RSA handshaking
from KeyExchangeRSA.

2015-03-04 19:54:38 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Added KE_rsa_export.

This is in preparation for breaking out the export-RSA handshaking
from KeyExchangeRSA.

2015-03-04 13:54:18 by Kevin O'Rourke <kevinor@opera.com>

TURBO2-942: Add Stdio.Buffer support to Gz.inflate

2015-03-04 13:54:18 by Kevin O'Rourke <kevinor@opera.com>

TURBO2-942: Add Stdio.Buffer support to Gz.inflate

2015-03-04 13:54:18 by Kevin O'Rourke <kevinor@opera.com>

TURBO2-942: Add Stdio.Buffer support to Gz.inflate

2015-03-04 13:54:18 by Kevin O'Rourke <kevinor@opera.com>

TURBO2-942: Add Stdio.Buffer support to Gz.inflate

2015-03-03

2015-03-03 19:52:02 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Crypto.DH: Restored definitions of FFDHE2432 and FFDHE6144.

The latest TLS-FFDHE draft (06) reinstates FFDHE6144 and
mentions FFDHE2432.

I also don't see any reason to remove these symbols to begin
with, since even if they might not be used as named curves,
they are still possible to use in eg TLS 1.2 and earlier.

2015-03-03 19:52:02 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Crypto.DH: Restored definitions of FFDHE2432 and FFDHE6144.

The latest TLS-FFDHE draft (06) reinstates FFDHE6144 and
mentions FFDHE2432.

I also don't see any reason to remove these symbols to begin
with, since even if they might not be used as named curves,
they are still possible to use in eg TLS 1.2 and earlier.

2015-03-03 19:52:02 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Crypto.DH: Restored definitions of FFDHE2432 and FFDHE6144.

The latest TLS-FFDHE draft (06) reinstates FFDHE6144 and
mentions FFDHE2432.

I also don't see any reason to remove these symbols to begin
with, since even if they might not be used as named curves,
they are still possible to use in eg TLS 1.2 and earlier.

2015-03-03 19:52:02 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Crypto.DH: Restored definitions of FFDHE2432 and FFDHE6144.

The latest TLS-FFDHE draft (06) reinstates FFDHE6144 and
mentions FFDHE2432.

I also don't see any reason to remove these symbols to begin
with, since even if they might not be used as named curves,
they are still possible to use in eg TLS 1.2 and earlier.

2015-02-22

2015-02-22 18:37:49 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Implemented EXTENSION_extended_master_secret.

2015-02-22 18:37:49 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Implemented EXTENSION_extended_master_secret.

2015-02-22 18:37:49 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Implemented EXTENSION_extended_master_secret.

2015-02-22 18:37:49 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Implemented EXTENSION_extended_master_secret.

2015-02-20

2015-02-20 02:33:09 by Martin Nilsson <nilsson@opera.com>

Implemented RSA PSK key exchange. select_cipher_suite() in Session however requires a rewrite to work with these suites.

2015-02-20 02:33:09 by Martin Nilsson <nilsson@opera.com>

Implemented RSA PSK key exchange. select_cipher_suite() in Session however requires a rewrite to work with these suites.

2015-02-20 02:33:09 by Martin Nilsson <nilsson@opera.com>

Implemented RSA PSK key exchange. select_cipher_suite() in Session however requires a rewrite to work with these suites.

2015-02-20 02:33:09 by Martin Nilsson <nilsson@opera.com>

Implemented RSA PSK key exchange. select_cipher_suite() in Session however requires a rewrite to work with these suites.

2015-02-19

2015-02-19 16:27:20 by Martin Nilsson <nilsson@opera.com>

Documentation of CIPHER_SUITES

2015-02-19 16:27:20 by Martin Nilsson <nilsson@opera.com>

Documentation of CIPHER_SUITES

2015-02-19 16:27:20 by Martin Nilsson <nilsson@opera.com>

Documentation of CIPHER_SUITES

2015-02-19 16:27:20 by Martin Nilsson <nilsson@opera.com>

Documentation of CIPHER_SUITES

2015-02-19 16:17:17 by Martin Nilsson <nilsson@opera.com>

Added support for DHE PSK.

2015-02-19 16:17:17 by Martin Nilsson <nilsson@opera.com>

Added support for DHE PSK.

2015-02-19 16:17:17 by Martin Nilsson <nilsson@opera.com>

Added support for DHE PSK.

2015-02-19 16:17:17 by Martin Nilsson <nilsson@opera.com>

Added support for DHE PSK.

2015-02-19 15:24:49 by Martin Nilsson <nilsson@opera.com>

Return appropriate alert if key id or hint was not recognized.

2015-02-19 15:24:49 by Martin Nilsson <nilsson@opera.com>

Return appropriate alert if key id or hint was not recognized.

2015-02-19 15:24:49 by Martin Nilsson <nilsson@opera.com>

Return appropriate alert if key id or hint was not recognized.

2015-02-19 15:24:49 by Martin Nilsson <nilsson@opera.com>

Return appropriate alert if key id or hint was not recognized.

2015-02-19 14:53:32 by Martin Nilsson <nilsson@opera.com>

Some documentation. Perhaps we want to move all this to an abstract class PSKContext?

2015-02-19 14:53:32 by Martin Nilsson <nilsson@opera.com>

Some documentation. Perhaps we want to move all this to an abstract class PSKContext?

2015-02-19 14:53:32 by Martin Nilsson <nilsson@opera.com>

Some documentation. Perhaps we want to move all this to an abstract class PSKContext?

2015-02-19 14:53:32 by Martin Nilsson <nilsson@opera.com>

Some documentation. Perhaps we want to move all this to an abstract class PSKContext?

2015-02-18

2015-02-18 16:57:02 by Martin Nilsson <nilsson@opera.com>

Fixed so that anonymous mode actually works.

2015-02-18 16:57:02 by Martin Nilsson <nilsson@opera.com>

Fixed so that anonymous mode actually works.

2015-02-18 16:57:02 by Martin Nilsson <nilsson@opera.com>

Fixed so that anonymous mode actually works.

2015-02-18 16:57:02 by Martin Nilsson <nilsson@opera.com>

Fixed so that anonymous mode actually works.

2015-02-10

2015-02-10 16:08:57 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Compiler: Documented a few more #pragmas.

2015-02-10 16:08:57 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Compiler: Documented a few more #pragmas.

2015-02-10 16:08:57 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Compiler: Documented a few more #pragmas.

2015-02-10 16:08:57 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Compiler: Documented a few more #pragmas.

2015-02-04

2015-02-04 17:01:27 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: KeyExchangeECDH now uses init_{server,client}().

Reverses the inheritance order for KeyExchangeECDH and KeyExchangeECDHE
to reduce the code complexity a bit.

2015-02-04 17:01:27 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: KeyExchangeECDH now uses init_{server,client}().

Reverses the inheritance order for KeyExchangeECDH and KeyExchangeECDHE
to reduce the code complexity a bit.

2015-02-04 17:01:27 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: KeyExchangeECDH now uses init_{server,client}().

Reverses the inheritance order for KeyExchangeECDH and KeyExchangeECDHE
to reduce the code complexity a bit.

2015-02-04 17:01:27 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: KeyExchangeECDH now uses init_{server,client}().

Reverses the inheritance order for KeyExchangeECDH and KeyExchangeECDHE
to reduce the code complexity a bit.

2015-02-02

2015-02-02 13:44:05 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: get_suites() now also filters on the version range.

2015-02-02 13:44:05 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: get_suites() now also filters on the version range.

2015-02-02 13:44:05 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: get_suites() now also filters on the version range.

2015-02-02 13:44:05 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: get_suites() now also filters on the version range.

2015-01-27

2015-01-27 22:24:06 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Crypto.ECC.Curve: Added LFUN::`==().

2015-01-27 22:24:06 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Crypto.ECC.Curve: Added LFUN::`==().

2015-01-27 22:24:06 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Crypto.ECC.Curve: Added LFUN::`==().

2015-01-27 22:24:06 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Crypto.ECC.Curve: Added LFUN::`==().

2015-01-25

2015-01-25 19:10:54 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher.KeyExchange: Changed API for client_key_exchange_packet().

It now returns the premaster secret, and fills in the
packet data in the provided buffer. This change allows
the corresponding function in SSL.ClientConnection to
use SSL.Connection.derive_master_secret().

2015-01-25 19:10:54 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher.KeyExchange: Changed API for client_key_exchange_packet().

It now returns the premaster secret, and fills in the
packet data in the provided buffer. This change allows
the corresponding function in SSL.ClientConnection to
use SSL.Connection.derive_master_secret().

2015-01-25 00:57:00 by Martin Nilsson <nilsson@opera.com>

Synchronize with latest FF-DHE draft.

2015-01-25 00:57:00 by Martin Nilsson <nilsson@opera.com>

Synchronize with latest FF-DHE draft.

2015-01-25 00:57:00 by Martin Nilsson <nilsson@opera.com>

Synchronize with latest FF-DHE draft.

2015-01-25 00:57:00 by Martin Nilsson <nilsson@opera.com>

Synchronize with latest FF-DHE draft.

2015-01-24

2015-01-24 10:59:03 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher.KeyExchange: Introduced got_client_key_exchange().

Renames ke->server_derive_master_secret() to
ke->got_client_key_exchange(), and changes it
to return the premaster secret.

This will reduce the amount of code duplication soon.

2015-01-24 10:59:03 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher.KeyExchange: Introduced got_client_key_exchange().

Renames ke->server_derive_master_secret() to
ke->got_client_key_exchange(), and changes it
to return the premaster secret.

This will reduce the amount of code duplication soon.

2015-01-24 10:59:03 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher.KeyExchange: Introduced got_client_key_exchange().

Renames ke->server_derive_master_secret() to
ke->got_client_key_exchange(), and changes it
to return the premaster secret.

This will reduce the amount of code duplication soon.

2015-01-24 10:59:03 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher.KeyExchange: Introduced got_client_key_exchange().

Renames ke->server_derive_master_secret() to
ke->got_client_key_exchange(), and changes it
to return the premaster secret.

This will reduce the amount of code duplication soon.

2015-01-19

2015-01-19 13:32:40 by Martin Nilsson <nilsson@opera.com>

Deprecated verify_certificates, as auth_level does the same thing. This breaks some tests that appears to be incomplete, so disable them.

2015-01-19 13:32:40 by Martin Nilsson <nilsson@opera.com>

Deprecated verify_certificates, as auth_level does the same thing. This breaks some tests that appears to be incomplete, so disable them.

2015-01-19 13:32:40 by Martin Nilsson <nilsson@opera.com>

Deprecated verify_certificates, as auth_level does the same thing. This breaks some tests that appears to be incomplete, so disable them.

2015-01-19 13:32:40 by Martin Nilsson <nilsson@opera.com>

Deprecated verify_certificates, as auth_level does the same thing. This breaks some tests that appears to be incomplete, so disable them.

2015-01-19 12:47:47 by Martin Nilsson <nilsson@opera.com>

Document AUTHLEVEL a bit.

2015-01-19 12:47:47 by Martin Nilsson <nilsson@opera.com>

Document AUTHLEVEL a bit.

2015-01-19 12:47:47 by Martin Nilsson <nilsson@opera.com>

Document AUTHLEVEL a bit.

2015-01-19 12:47:47 by Martin Nilsson <nilsson@opera.com>

Document AUTHLEVEL a bit.

2015-01-07

2015-01-07 17:06:52 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.ClientConnection: Support TLS 1.3 ClientKeyShare.

client_hello() now sends a pure TLS 1.3 hello if Context.min_version
is TLS 1.3 or later, a compat TLS 1.3 hello if Context.max_version is
TLS 1.3 or later, and a legacy TLS 1.2 or earlier handshake otherwise.

Note that SSL.ServerConnection does not yet suport pure TLS 1.3 hellos,
and that the SSL.ClientConnection won't be happy with the result from a
server that does support TLS 1.3.

2015-01-07 17:06:52 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.ClientConnection: Support TLS 1.3 ClientKeyShare.

client_hello() now sends a pure TLS 1.3 hello if Context.min_version
is TLS 1.3 or later, a compat TLS 1.3 hello if Context.max_version is
TLS 1.3 or later, and a legacy TLS 1.2 or earlier handshake otherwise.

Note that SSL.ServerConnection does not yet suport pure TLS 1.3 hellos,
and that the SSL.ClientConnection won't be happy with the result from a
server that does support TLS 1.3.

2015-01-07 17:06:52 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.ClientConnection: Support TLS 1.3 ClientKeyShare.

client_hello() now sends a pure TLS 1.3 hello if Context.min_version
is TLS 1.3 or later, a compat TLS 1.3 hello if Context.max_version is
TLS 1.3 or later, and a legacy TLS 1.2 or earlier handshake otherwise.

Note that SSL.ServerConnection does not yet suport pure TLS 1.3 hellos,
and that the SSL.ClientConnection won't be happy with the result from a
server that does support TLS 1.3.

2015-01-07 17:06:52 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.ClientConnection: Support TLS 1.3 ClientKeyShare.

client_hello() now sends a pure TLS 1.3 hello if Context.min_version
is TLS 1.3 or later, a compat TLS 1.3 hello if Context.max_version is
TLS 1.3 or later, and a legacy TLS 1.2 or earlier handshake otherwise.

Note that SSL.ServerConnection does not yet suport pure TLS 1.3 hellos,
and that the SSL.ClientConnection won't be happy with the result from a
server that does support TLS 1.3.

2015-01-06

2015-01-06 13:23:21 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Connection: Added derive_master_secret().

More unification of code in client and server.

2015-01-06 13:23:21 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Connection: Added derive_master_secret().

More unification of code in client and server.

2015-01-06 13:23:21 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Connection: Added derive_master_secret().

More unification of code in client and server.

2015-01-06 13:23:21 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Connection: Added derive_master_secret().

More unification of code in client and server.

2015-01-02

2015-01-02 14:28:00 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Some more KeyShare-related API changes.

The API now seems to be usable for TLS 1.3.

2015-01-02 14:28:00 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Some more KeyShare-related API changes.

The API now seems to be usable for TLS 1.3.

2015-01-02 14:28:00 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Some more KeyShare-related API changes.

The API now seems to be usable for TLS 1.3.

2015-01-02 14:28:00 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Some more KeyShare-related API changes.

The API now seems to be usable for TLS 1.3.

2014-12-28

2014-12-28 13:53:34 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: More KeyShare{EC,}DHE fixes for TLS 1.3.

2014-12-28 13:53:34 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: More KeyShare{EC,}DHE fixes for TLS 1.3.

2014-12-28 13:53:34 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: More KeyShare{EC,}DHE fixes for TLS 1.3.

2014-12-28 13:53:34 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: More KeyShare{EC,}DHE fixes for TLS 1.3.

2014-12-27

2014-12-27 15:15:05 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added KeyShare{EC,}DHE in preparation for TLS 0.3.

2014-12-27 15:15:05 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added KeyShare{EC,}DHE in preparation for TLS 0.3.

2014-12-27 15:15:05 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added KeyShare{EC,}DHE in preparation for TLS 0.3.

2014-12-27 15:15:05 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added KeyShare{EC,}DHE in preparation for TLS 0.3.

2014-12-20

2014-12-20 18:41:10 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Added some more notes about DTLS.

2014-12-20 18:41:10 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Added some more notes about DTLS.

2014-12-20 18:41:10 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Added some more notes about DTLS.

2014-12-20 18:41:10 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Added some more notes about DTLS.

2014-12-19

2014-12-19 16:32:59 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Added some DTLS constants.

2014-12-19 16:32:59 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Added some DTLS constants.

2014-12-19 16:32:59 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Added some DTLS constants.

2014-12-19 16:32:59 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Added some DTLS constants.

2014-12-15

2014-12-15 21:10:53 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Support the Negotiated FF-DHE Parameters draft.

NB: This draft has been incorporated into the TLS 1.3 draft.

2014-12-15 21:10:53 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Support the Negotiated FF-DHE Parameters draft.

NB: This draft has been incorporated into the TLS 1.3 draft.

2014-12-15 21:10:53 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Support the Negotiated FF-DHE Parameters draft.

NB: This draft has been incorporated into the TLS 1.3 draft.

2014-12-15 21:10:53 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Support the Negotiated FF-DHE Parameters draft.

NB: This draft has been incorporated into the TLS 1.3 draft.

2014-12-13

2014-12-13 12:11:52 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL [DHE]: Validate the Ys received from the peer.

This is required by the current FFDHE draft, and is needed to protect
the connection from MITM attacks.

Also changes some alerts from unexpected_message to handshake_failure
as required by the same draft.

2014-12-13 12:11:52 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL [DHE]: Validate the Ys received from the peer.

This is required by the current FFDHE draft, and is needed to protect
the connection from MITM attacks.

Also changes some alerts from unexpected_message to handshake_failure
as required by the same draft.

2014-12-13 12:11:52 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL [DHE]: Validate the Ys received from the peer.

This is required by the current FFDHE draft, and is needed to protect
the connection from MITM attacks.

Also changes some alerts from unexpected_message to handshake_failure
as required by the same draft.

2014-12-13 12:11:52 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL [DHE]: Validate the Ys received from the peer.

This is required by the current FFDHE draft, and is needed to protect
the connection from MITM attacks.

Also changes some alerts from unexpected_message to handshake_failure
as required by the same draft.

2014-12-13 11:58:48 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL [DHE]: Validate the Ys received from the peer.

This is required by the current FFDHE draft, and is needed to protect
the connection from MITM attacks.

Also changes some alerts from unexpected_message to handshake_failure
as required by the same draft.

2014-12-13 11:58:48 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL [DHE]: Validate the Ys received from the peer.

This is required by the current FFDHE draft, and is needed to protect
the connection from MITM attacks.

Also changes some alerts from unexpected_message to handshake_failure
as required by the same draft.

2014-12-13 11:58:48 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL [DHE]: Validate the Ys received from the peer.

This is required by the current FFDHE draft, and is needed to protect
the connection from MITM attacks.

Also changes some alerts from unexpected_message to handshake_failure
as required by the same draft.

2014-12-13 11:58:48 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL [DHE]: Validate the Ys received from the peer.

This is required by the current FFDHE draft, and is needed to protect
the connection from MITM attacks.

Also changes some alerts from unexpected_message to handshake_failure
as required by the same draft.

2014-12-04

2014-12-04 17:40:14 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Minor code cleanup.

2014-12-04 17:40:14 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Minor code cleanup.

2014-12-04 17:40:14 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Minor code cleanup.

2014-12-04 17:40:14 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Minor code cleanup.

2014-11-29

2014-11-29 16:33:22 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Improved API for resuming sessions somewhat.

2014-11-29 16:33:22 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Improved API for resuming sessions somewhat.

2014-11-29 16:33:22 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Improved API for resuming sessions somewhat.

2014-11-29 16:33:22 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Improved API for resuming sessions somewhat.

2014-11-29 16:31:04 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: purge_session() now works client-side too.

2014-11-29 16:31:04 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: purge_session() now works client-side too.

2014-11-29 16:31:04 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: purge_session() now works client-side too.

2014-11-29 16:31:04 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: purge_session() now works client-side too.

2014-11-29 16:28:31 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added API for resuming sessions.

2014-11-29 16:28:31 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added API for resuming sessions.

2014-11-29 16:28:31 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added API for resuming sessions.

2014-11-29 16:28:31 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added API for resuming sessions.

2014-11-28

2014-11-28 21:59:22 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Improved API for resuming sessions somewhat.

2014-11-28 21:59:22 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Improved API for resuming sessions somewhat.

2014-11-28 21:59:22 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Improved API for resuming sessions somewhat.

2014-11-28 21:59:22 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Improved API for resuming sessions somewhat.

2014-11-28 17:14:44 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.LDAP: Corrected doc for client().

2014-11-28 17:14:44 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.LDAP: Corrected doc for client().

2014-11-28 17:14:44 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.LDAP: Corrected doc for client().

2014-11-28 17:14:44 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.LDAP: Corrected doc for client().

2014-11-28 17:13:36 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.LDAP: Corrected doc for client().

2014-11-28 17:13:36 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.LDAP: Corrected doc for client().

2014-11-28 17:13:36 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.LDAP: Corrected doc for client().

2014-11-28 17:13:36 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Protocols.LDAP: Corrected doc for client().

2014-11-25

2014-11-25 12:19:19 by Martin Nilsson <nilsson@opera.com>

Renamed methods for consistency with Stdio.Buffer

2014-11-25 12:19:19 by Martin Nilsson <nilsson@opera.com>

Renamed methods for consistency with Stdio.Buffer

2014-11-25 12:19:19 by Martin Nilsson <nilsson@opera.com>

Renamed methods for consistency with Stdio.Buffer

2014-11-25 12:19:19 by Martin Nilsson <nilsson@opera.com>

Renamed methods for consistency with Stdio.Buffer

2014-11-25 12:08:14 by Martin Nilsson <nilsson@opera.com>

Removed bignum functions. Using them wouldn't do much.

2014-11-25 12:08:14 by Martin Nilsson <nilsson@opera.com>

Removed bignum functions. Using them wouldn't do much.

2014-11-25 12:08:14 by Martin Nilsson <nilsson@opera.com>

Removed bignum functions. Using them wouldn't do much.

2014-11-25 12:08:14 by Martin Nilsson <nilsson@opera.com>

Removed bignum functions. Using them wouldn't do much.

2014-11-25 11:58:36 by Martin Nilsson <nilsson@opera.com>

Better use of Stdio.Buffer APIs.

2014-11-25 11:58:36 by Martin Nilsson <nilsson@opera.com>

Better use of Stdio.Buffer APIs.

2014-11-25 11:58:36 by Martin Nilsson <nilsson@opera.com>

Better use of Stdio.Buffer APIs.

2014-11-25 11:58:36 by Martin Nilsson <nilsson@opera.com>

Better use of Stdio.Buffer APIs.

2014-11-25 11:48:14 by Martin Nilsson <nilsson@opera.com>

put_fix_string() and add_data() converted to add().

2014-11-25 11:48:14 by Martin Nilsson <nilsson@opera.com>

put_fix_string() and add_data() converted to add().

2014-11-25 11:48:14 by Martin Nilsson <nilsson@opera.com>

put_fix_string() and add_data() converted to add().

2014-11-25 11:48:14 by Martin Nilsson <nilsson@opera.com>

put_fix_string() and add_data() converted to add().

2014-11-24

2014-11-24 19:02:50 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: purge_session() now works client-side too.

2014-11-24 19:02:50 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: purge_session() now works client-side too.

2014-11-24 19:02:50 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: purge_session() now works client-side too.

2014-11-24 19:02:50 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Context: purge_session() now works client-side too.

2014-11-24 17:31:49 by Martin Nilsson <nilsson@opera.com>

Rewrote get_uint, put_uint, get_var_string and get_fix_string.

2014-11-24 17:31:49 by Martin Nilsson <nilsson@opera.com>

Rewrote get_uint, put_uint, get_var_string and get_fix_string.

2014-11-24 17:31:49 by Martin Nilsson <nilsson@opera.com>

Rewrote get_uint, put_uint, get_var_string and get_fix_string.

2014-11-24 17:31:49 by Martin Nilsson <nilsson@opera.com>

Rewrote get_uint, put_uint, get_var_string and get_fix_string.

2014-11-24 17:22:30 by Martin Nilsson <nilsson@opera.com>

Replaced pop_data() with read() or direct buffer usage.

2014-11-24 17:22:30 by Martin Nilsson <nilsson@opera.com>

Replaced pop_data() with read() or direct buffer usage.

2014-11-24 17:22:30 by Martin Nilsson <nilsson@opera.com>

Replaced pop_data() with read() or direct buffer usage.

2014-11-24 17:22:30 by Martin Nilsson <nilsson@opera.com>

Replaced pop_data() with read() or direct buffer usage.

2014-11-24 17:02:08 by Martin Nilsson <nilsson@opera.com>

put_var_string -> add_hstring

2014-11-24 17:02:08 by Martin Nilsson <nilsson@opera.com>

put_var_string -> add_hstring

2014-11-24 17:02:08 by Martin Nilsson <nilsson@opera.com>

put_var_string -> add_hstring

2014-11-24 17:02:08 by Martin Nilsson <nilsson@opera.com>

put_var_string -> add_hstring

2014-11-24 16:29:55 by Martin Nilsson <nilsson@opera.com>

Use SSL.Buffer instead of ADT.struct

2014-11-24 16:29:55 by Martin Nilsson <nilsson@opera.com>

Use SSL.Buffer instead of ADT.struct

2014-11-24 16:29:55 by Martin Nilsson <nilsson@opera.com>

Use SSL.Buffer instead of ADT.struct

2014-11-24 16:29:55 by Martin Nilsson <nilsson@opera.com>

Use SSL.Buffer instead of ADT.struct

2014-11-23

2014-11-23 17:10:01 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added API for resuming sessions.

2014-11-23 17:10:01 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added API for resuming sessions.

2014-11-23 17:10:01 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added API for resuming sessions.

2014-11-23 17:10:01 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added API for resuming sessions.

2014-11-20

2014-11-20 13:48:21 by Martin Nilsson <nilsson@opera.com>

Work around a compat resolver bug.

2014-11-20 13:48:21 by Martin Nilsson <nilsson@opera.com>

Work around a compat resolver bug.

2014-11-20 13:48:21 by Martin Nilsson <nilsson@opera.com>

Work around a compat resolver bug.

2014-11-20 13:48:21 by Martin Nilsson <nilsson@opera.com>

Work around a compat resolver bug.

2014-11-15

2014-11-15 04:12:25 by Martin Nilsson <nilsson@opera.com>

ADT.struct -> Stdio.Buffer

2014-11-15 04:12:25 by Martin Nilsson <nilsson@opera.com>

ADT.struct -> Stdio.Buffer

2014-11-15 04:12:25 by Martin Nilsson <nilsson@opera.com>

ADT.struct -> Stdio.Buffer

2014-11-15 04:12:25 by Martin Nilsson <nilsson@opera.com>

ADT.struct -> Stdio.Buffer

2014-11-08

2014-11-08 11:00:56 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Added KeyExchangeKRB (experimental).

This is a tentative implementation of the RFC 2712
Kerberos-based key exchange.

No interoperation tests have been performed, and the
corresponding suites are not enabled.

2014-11-08 11:00:56 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Added KeyExchangeKRB (experimental).

This is a tentative implementation of the RFC 2712
Kerberos-based key exchange.

No interoperation tests have been performed, and the
corresponding suites are not enabled.

2014-11-08 11:00:56 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Added KeyExchangeKRB (experimental).

This is a tentative implementation of the RFC 2712
Kerberos-based key exchange.

No interoperation tests have been performed, and the
corresponding suites are not enabled.

2014-11-08 11:00:56 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Cipher: Added KeyExchangeKRB (experimental).

This is a tentative implementation of the RFC 2712
Kerberos-based key exchange.

No interoperation tests have been performed, and the
corresponding suites are not enabled.

2014-11-04

2014-11-04 14:43:57 by Martin Nilsson <nilsson@opera.com>

Move deprecated code to compat. The compat resolver is broken, so this doesn't actually work.

2014-11-04 14:43:57 by Martin Nilsson <nilsson@opera.com>

Move deprecated code to compat. The compat resolver is broken, so this doesn't actually work.

2014-11-04 14:43:57 by Martin Nilsson <nilsson@opera.com>

Move deprecated code to compat. The compat resolver is broken, so this doesn't actually work.

2014-11-04 14:43:57 by Martin Nilsson <nilsson@opera.com>

Move deprecated code to compat. The compat resolver is broken, so this doesn't actually work.

2014-11-04 14:38:27 by Martin Nilsson <nilsson@opera.com>

Moved deprecated methods to compat.

2014-11-04 14:38:27 by Martin Nilsson <nilsson@opera.com>

Moved deprecated methods to compat.

2014-11-04 14:38:27 by Martin Nilsson <nilsson@opera.com>

Moved deprecated methods to compat.

2014-11-04 14:38:27 by Martin Nilsson <nilsson@opera.com>

Moved deprecated methods to compat.

2014-11-03

2014-11-03 18:47:26 by Martin Nilsson <nilsson@opera.com>

Moved deprecated methods to compat.

2014-11-03 18:47:26 by Martin Nilsson <nilsson@opera.com>

Moved deprecated methods to compat.

2014-11-03 18:47:26 by Martin Nilsson <nilsson@opera.com>

Moved deprecated methods to compat.

2014-11-03 18:47:26 by Martin Nilsson <nilsson@opera.com>

Moved deprecated methods to compat.

2014-11-01

2014-11-01 23:05:07 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added query_version().

Added function to query the protocol version in use.

2014-11-01 23:05:07 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added query_version().

Added function to query the protocol version in use.

2014-11-01 23:05:07 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added query_version().

Added function to query the protocol version in use.

2014-11-01 23:05:07 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added query_version().

Added function to query the protocol version in use.

2014-11-01 23:03:44 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added query_version().

Added function to query the protocol version in use.

2014-11-01 23:03:44 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added query_version().

Added function to query the protocol version in use.

2014-11-01 23:03:44 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added query_version().

Added function to query the protocol version in use.

2014-11-01 23:03:44 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.File: Added query_version().

Added function to query the protocol version in use.

2014-10-23

2014-10-23 07:45:38 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Minor documentation change.

2014-10-23 07:45:38 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Minor documentation change.

2014-10-23 07:45:38 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Minor documentation change.

2014-10-23 07:45:38 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Minor documentation change.

2014-10-23 07:45:08 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Minor documentation change.

2014-10-23 07:45:08 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Minor documentation change.

2014-10-23 07:45:08 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Minor documentation change.

2014-10-23 07:45:08 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.Constants: Minor documentation change.

2014-10-22

2014-10-22 13:25:28 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added some more Autodoc.

2014-10-22 13:25:28 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added some more Autodoc.

2014-10-22 13:25:28 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added some more Autodoc.

2014-10-22 13:25:28 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Added some more Autodoc.

2014-10-22 09:07:03 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.handshake: Support setting the minimum required version.

The SSL 3.0 protocol can now be disabled by setting min_version in
the context to SSL.Constants.PROTOCOL_TLS_1_0.

Backported API from Pike 8.0. Note that the constants differ
from Pike 8.0 and later, so use the provided symbolic values.

2014-10-22 09:07:03 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.handshake: Support setting the minimum required version.

The SSL 3.0 protocol can now be disabled by setting min_version in
the context to SSL.Constants.PROTOCOL_TLS_1_0.

Backported API from Pike 8.0. Note that the constants differ
from Pike 8.0 and later, so use the provided symbolic values.

2014-10-22 09:07:03 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.handshake: Support setting the minimum required version.

The SSL 3.0 protocol can now be disabled by setting min_version in
the context to SSL.Constants.PROTOCOL_TLS_1_0.

Backported API from Pike 8.0. Note that the constants differ
from Pike 8.0 and later, so use the provided symbolic values.

2014-10-22 09:07:03 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL.handshake: Support setting the minimum required version.

The SSL 3.0 protocol can now be disabled by setting min_version in
the context to SSL.Constants.PROTOCOL_TLS_1_0.

Backported API from Pike 8.0. Note that the constants differ
from Pike 8.0 and later, so use the provided symbolic values.

2014-10-14

2014-10-14 12:48:39 by Martin Nilsson <nilsson@opera.com>

Make TLS 1.0 loweset default TLS in Pike 8.0 too.

2014-10-14 12:48:39 by Martin Nilsson <nilsson@opera.com>

Make TLS 1.0 loweset default TLS in Pike 8.0 too.

2014-10-14 12:48:39 by Martin Nilsson <nilsson@opera.com>

Make TLS 1.0 loweset default TLS in Pike 8.0 too.

2014-10-14 12:48:39 by Martin Nilsson <nilsson@opera.com>

Make TLS 1.0 loweset default TLS in Pike 8.0 too.

2014-10-14 12:48:39 by Martin Nilsson <nilsson@opera.com>

Make TLS 1.0 loweset default TLS in Pike 8.0 too.

2014-10-13

2014-10-13 17:02:42 by Martin Nilsson <nilsson@opera.com>

Some trivial TLS 1.3 changes.

2014-10-13 17:02:42 by Martin Nilsson <nilsson@opera.com>

Some trivial TLS 1.3 changes.

2014-10-13 17:02:42 by Martin Nilsson <nilsson@opera.com>

Some trivial TLS 1.3 changes.

2014-10-13 17:02:42 by Martin Nilsson <nilsson@opera.com>

Some trivial TLS 1.3 changes.

2014-10-13 17:02:42 by Martin Nilsson <nilsson@opera.com>

Some trivial TLS 1.3 changes.

2014-10-13 16:36:21 by Martin Nilsson <nilsson@opera.com>

TLS 1.3 renames NamedCurve into NamedGroup

2014-10-13 16:36:21 by Martin Nilsson <nilsson@opera.com>

TLS 1.3 renames NamedCurve into NamedGroup

2014-10-13 16:36:21 by Martin Nilsson <nilsson@opera.com>

TLS 1.3 renames NamedCurve into NamedGroup

2014-10-13 16:36:21 by Martin Nilsson <nilsson@opera.com>

TLS 1.3 renames NamedCurve into NamedGroup

2014-10-13 16:36:21 by Martin Nilsson <nilsson@opera.com>

TLS 1.3 renames NamedCurve into NamedGroup

2014-10-12

2014-10-12 23:48:17 by Martin Nilsson <nilsson@opera.com>

Put the default lower version at TLS 1.0. IE users on pre XP need to upgrade.

2014-10-12 23:48:17 by Martin Nilsson <nilsson@opera.com>

Put the default lower version at TLS 1.0. IE users on pre XP need to upgrade.

2014-10-12 23:48:17 by Martin Nilsson <nilsson@opera.com>

Put the default lower version at TLS 1.0. IE users on pre XP need to upgrade.

2014-10-12 23:48:17 by Martin Nilsson <nilsson@opera.com>

Put the default lower version at TLS 1.0. IE users on pre XP need to upgrade.

2014-10-12 23:48:17 by Martin Nilsson <nilsson@opera.com>

Put the default lower version at TLS 1.0. IE users on pre XP need to upgrade.

2014-10-01

2014-10-01 14:34:26 by Martin Nilsson <nilsson@opera.com>

Stdio.IOBuffer -> Stdio.Buffer (part 1)

2014-10-01 14:34:26 by Martin Nilsson <nilsson@opera.com>

Stdio.IOBuffer -> Stdio.Buffer (part 1)

2014-10-01 14:34:26 by Martin Nilsson <nilsson@opera.com>

Stdio.IOBuffer -> Stdio.Buffer (part 1)

2014-10-01 14:34:26 by Martin Nilsson <nilsson@opera.com>

Stdio.IOBuffer -> Stdio.Buffer (part 1)

2014-10-01 14:34:26 by Martin Nilsson <nilsson@opera.com>

Stdio.IOBuffer -> Stdio.Buffer (part 1)

2014-09-30

2014-09-30 16:20:55 by Martin Nilsson <nilsson@opera.com>

this_program:: -> this::

2014-09-30 16:20:55 by Martin Nilsson <nilsson@opera.com>

this_program:: -> this::

2014-09-30 16:20:55 by Martin Nilsson <nilsson@opera.com>

this_program:: -> this::

2014-09-30 16:20:55 by Martin Nilsson <nilsson@opera.com>

this_program:: -> this::

2014-09-30 16:20:55 by Martin Nilsson <nilsson@opera.com>

this_program:: -> this::

2014-09-29

2014-09-29 00:08:09 by Martin Nilsson <nilsson@opera.com>

Removed one level of indirection and inherit SSL.Port directly into SSLPort.

2014-09-29 00:08:09 by Martin Nilsson <nilsson@opera.com>

Removed one level of indirection and inherit SSL.Port directly into SSLPort.

2014-09-29 00:08:09 by Martin Nilsson <nilsson@opera.com>

Removed one level of indirection and inherit SSL.Port directly into SSLPort.

2014-09-29 00:08:09 by Martin Nilsson <nilsson@opera.com>

Removed one level of indirection and inherit SSL.Port directly into SSLPort.

2014-09-29 00:08:09 by Martin Nilsson <nilsson@opera.com>

Removed one level of indirection and inherit SSL.Port directly into SSLPort.

2014-09-23

2014-09-23 16:31:16 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Stdio.File: Some minor documentation updates.

2014-09-23 16:31:16 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Stdio.File: Some minor documentation updates.

2014-09-23 16:31:16 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Stdio.File: Some minor documentation updates.

2014-09-23 16:31:16 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Stdio.File: Some minor documentation updates.

2014-09-23 16:31:16 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Stdio.File: Some minor documentation updates.

2014-09-05

2014-09-05 00:34:55 by Martin Nilsson <nilsson@opera.com>

Added get_certificates().

2014-09-05 00:34:55 by Martin Nilsson <nilsson@opera.com>

Added get_certificates().

2014-09-05 00:34:55 by Martin Nilsson <nilsson@opera.com>

Added get_certificates().

2014-09-05 00:34:55 by Martin Nilsson <nilsson@opera.com>

Added get_certificates().

2014-09-05 00:34:55 by Martin Nilsson <nilsson@opera.com>

Added get_certificates().

2014-09-04

2014-09-04 15:57:43 by Arne Goedeke <el@laramies.com>

Merge remote-tracking branch 'origin/8.0' into string_alloc

Conflicts:
src/stralloc.c

2014-09-04 15:57:43 by Arne Goedeke <el@laramies.com>

Merge remote-tracking branch 'origin/8.0' into string_alloc

Conflicts:
src/stralloc.c

2014-09-04 15:57:43 by Arne Goedeke <el@laramies.com>

Merge remote-tracking branch 'origin/8.0' into string_alloc

Conflicts:
src/stralloc.c

2014-09-04 15:41:34 by Per Hedbor <ph@opera.com>

Removed stdin/stderr/stdout variables in the 7.8 compat stdio.

Keeping them generates about 100 lines of warnings when the file is compiled due to
incompatible types for everything different between Fd_ref and Fd, more or less

2014-09-04 15:41:34 by Per Hedbor <ph@opera.com>

Removed stdin/stderr/stdout variables in the 7.8 compat stdio.

Keeping them generates about 100 lines of warnings when the file is compiled due to
incompatible types for everything different between Fd_ref and Fd, more or less

2014-09-04 15:41:34 by Per Hedbor <ph@opera.com>

Fixed autodoc syntax error

2014-09-04 15:41:34 by Per Hedbor <ph@opera.com>

Removed stdin/stderr/stdout variables in the 7.8 compat stdio.

Keeping them generates about 100 lines of warnings when the file is compiled due to
incompatible types for everything different between Fd_ref and Fd, more or less

2014-09-04 15:41:34 by Per Hedbor <ph@opera.com>

Removed stdin/stderr/stdout variables in the 7.8 compat stdio.

Keeping them generates about 100 lines of warnings when the file is compiled due to
incompatible types for everything different between Fd_ref and Fd, more or less

2014-09-04 15:41:34 by Per Hedbor <ph@opera.com>

Fixed autodoc syntax error

2014-09-04 15:41:34 by Per Hedbor <ph@opera.com>

Fixed autodoc syntax error

2014-09-04 15:41:34 by Per Hedbor <ph@opera.com>

Fixed autodoc syntax error

2014-09-04 15:41:34 by Per Hedbor <ph@opera.com>

Fixed autodoc syntax error

2014-09-04 15:41:34 by Per Hedbor <ph@opera.com>

Removed stdin/stderr/stdout variables in the 7.8 compat stdio.

Keeping them generates about 100 lines of warnings when the file is compiled due to
incompatible types for everything different between Fd_ref and Fd, more or less

2014-09-03

2014-09-03 18:30:32 by Per Hedbor <ph@opera.com>

Added buffered asynchronous I/O mode to Stdio.File

In this mode the input and output is kept in buffers in the file object.
Adding data to the output buffer will write it to the filedescriptor, and
the read callback will receive the input buffer as its argument.

The write callback will have the output buffer as a second argument,
but most of the time this can be ignored since you keep the buffer
object around.

The write callback will only be called if the buffer needs more data,
so if you implement a range_error function in the buffer that refills
the buffer it will only be called once that callback returns 0.

2014-09-03 15:09:08 by Per Hedbor <ph@opera.com>

Added share option to SSLPort as well

2014-09-03 15:09:08 by Per Hedbor <ph@opera.com>

Added share option to SSLPort as well

2014-09-03 15:09:08 by Per Hedbor <ph@opera.com>

Added share option to SSLPort as well

2014-09-03 15:09:08 by Per Hedbor <ph@opera.com>

Added share option to SSLPort as well

2014-09-03 15:09:08 by Per Hedbor <ph@opera.com>

Added share option to SSLPort as well

2014-09-01

2014-09-01 13:04:14 by Martin Nilsson <nilsson@opera.com>

Select DH group based on symmetric key strength.

2014-09-01 13:04:14 by Martin Nilsson <nilsson@opera.com>

Select DH group based on symmetric key strength.

2014-09-01 13:04:14 by Martin Nilsson <nilsson@opera.com>

Select DH group based on symmetric key strength.

2014-09-01 13:04:14 by Martin Nilsson <nilsson@opera.com>

Select DH group based on symmetric key strength.

2014-09-01 13:04:14 by Martin Nilsson <nilsson@opera.com>

Select DH group based on symmetric key strength.

2014-08-28

2014-08-28 13:54:23 by Chris Angelico <rosuav@gmail.com>

GTK2: Update Scale docs based on source file

2014-08-25

2014-08-25 15:10:38 by Per Hedbor <ph@opera.com>

Some minor documentation tweaks.

It has been a while since the classes were called Gz_deflate and Gz_inflate.

2014-08-25 12:39:37 by Per Hedbor <ph@opera.com>

Fixed a few autodoc syntax errors.

2014-08-25 12:39:37 by Per Hedbor <ph@opera.com>

Fixed a few autodoc syntax errors.

2014-08-25 12:39:37 by Per Hedbor <ph@opera.com>

Fixed a few autodoc syntax errors.

2014-08-25 12:39:37 by Per Hedbor <ph@opera.com>

Fixed a few autodoc syntax errors.

2014-08-25 12:39:37 by Per Hedbor <ph@opera.com>

Fixed a few autodoc syntax errors.

2014-08-24

2014-08-24 12:11:46 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Improved support for renegotiation.

2014-08-24 12:11:46 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Improved support for renegotiation.

2014-08-24 12:11:46 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Improved support for renegotiation.

2014-08-24 12:11:46 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Improved support for renegotiation.

2014-08-24 12:11:46 by Henrik Grubbström (Grubba) <grubba@grubba.org>

SSL: Improved support for renegotiation.

2014-08-23

2014-08-23 16:31:17 by Martin Nilsson <nilsson@opera.com>

Wrap some comments.

2014-08-23 16:31:17 by Martin Nilsson <nilsson@opera.com>

Wrap some comments.

2014-08-23 16:31:17 by Martin Nilsson <nilsson@opera.com>

Wrap some comments.

2014-08-23 16:31:17 by Martin Nilsson <nilsson@opera.com>

Wrap some comments.

2014-08-23 16:31:17 by Martin Nilsson <nilsson@opera.com>

Wrap some comments.

2014-08-22

2014-08-22 18:02:24 by Arne Goedeke <el@laramies.com>

Merge remote-tracking branch 'origin/8.0' into string_alloc

2014-08-22 14:47:02 by Martin Nilsson <nilsson@opera.com>