The data contained in this repository can be downloaded to your computer using one of several clients.
Please see the documentation of your version control software client for more information.

Please select the desired protocol below to get the URL.

This URL has Read-Only access.

Statistics
| Branch: | Revision:

main_repo / src / node_crypto.h @ 6f92da2d

History | View | Annotate | Download (14.5 KB)

# Date Author Comment
8e28193c 08/06/2013 08:13 AM Fedor Indutny

tls_wrap: DRY ClientHelloParser

Share ClientHelloParser code between `tls_wrap.cc` and `node_crypto.cc`.

fix #5959

02cab974 07/31/2013 05:16 PM Ben Noordhuis

src: more lint after cpplint tightening

Commit 847c6d9 adds a 'project headers before system headers' check
to cpplint. Update the files in src/ to make the linter pass again.

8e29ce9f 07/31/2013 02:12 PM Fedor Indutny

src: lint c++ code

8111ca2f 07/30/2013 04:03 PM Ben Noordhuis

src: const-ify variables in src/node_crypto*

No functional changes, just some code tightening. Clean up some style
inconsistencies while we are here.

d62c2d97 07/24/2013 05:16 PM Fedor Indutny

tls: share tls tickets key between cluster workers

fix #5871

110a9cd8 07/06/2013 11:44 AM Ben Noordhuis

lib, src: upgrade after v8 api change

This is a big commit that touches just about every file in the src/
directory. The V8 API has changed in significant ways. The most
important changes are:

  • Binding functions take a const v8::FunctionCallbackInfo<T>& argument...
212e9cd8 06/17/2013 08:00 AM Fedor Indutny

tls: session API returns

28659aba 05/29/2013 05:12 PM Ben Noordhuis

Merge remote-tracking branch 'origin/v0.10'

Conflicts:
deps/uv/ChangeLog
deps/uv/src/unix/stream.c
deps/uv/src/version.c
lib/tls.js

fa170dd2 05/28/2013 12:14 PM Fedor Indutny

tls: ignore .shutdown() syscall error

Quote from SSL_shutdown man page:

The output of SSL_get_error(3) may be misleading,
as an erroneous SSL_ERROR_SYSCALL may be flagged even though
no error occurred.

Also, handle all other errors to prevent assertion in `ClearError()`.

0a4ebc3d 04/19/2013 09:24 AM Trevor Norris

src: replace Holder() with This()

Switch to always use args.This() to retrieve object instance.

259839fe 04/12/2013 11:30 AM Fedor Indutny

Merge branch 'v0.10'

Conflicts:
ChangeLog
deps/uv/src/version.c
src/node.h
src/node_crypto.cc
src/node_crypto_bio.cc
src/node_crypto_bio.h
src/node_object_wrap.h
src/node_version.h

eeb4c321 04/09/2013 07:39 PM Ben Noordhuis

crypto: remove unused ClientHelloParser field

d2057616 03/25/2013 08:37 PM Manav Rathi

tls: expose SSL_CTX_set_timeout via tls.createServer

Add the `sessionTimeout` integral value to the list of options
recognized by `tls.createServer`.

This option will be useful for applications which need frequently
establish short-lived TLS connections to the same endpoint. The TLS...

0bba5902 03/19/2013 08:11 PM Trevor Norris

bindings: update api

All compile time warnings about using deprecated APIs have been
suppressed by updating node's API. Though there are still many function
calls that can accept Isolate, and still need to be updated.

node_isolate had to be added as an extern variable in node.h and...

78459182 03/12/2013 04:23 PM Fedor Indutny

crypto: refactor crypto classes

83d17e50 03/12/2013 04:23 PM Fedor Indutny

crypto: merge Cipher and Decipher

a15cc93a 03/12/2013 04:23 PM Fedor Indutny

crypto: split crypto classes

019ad346 11/16/2012 06:52 PM Sergey Kholodilov

crypto: fix ssl error handling

Make HandleSSLError() correctly process a zero status code: sometimes it
indicates an error and sometimes it doesn't.

8e0c830c 09/04/2012 06:01 PM Fedor Indutny

tls: async session storage

7dfa587d 09/03/2012 05:33 PM Ben Noordhuis

crypto, tls: make setSNICallback() compatible with domains

5164ae38 05/15/2012 02:37 PM isaacs

Merge remote-tracking branch 'ry/v0.6' into v0.6-merge

Conflicts:
ChangeLog
deps/uv/include/uv-private/uv-unix.h
deps/uv/src/unix/core.c
deps/uv/src/unix/sunos.c
deps/v8/src/runtime.cc
doc/api/crypto.markdown
lib/http.js
src/node_version.h
test/gc/test-http-client-timeout.js...

fb7348ae 05/14/2012 11:12 AM ssuda

crypto: add PKCS12/PFX support

Fixes #2845.

ff4a9d38 03/09/2012 06:14 PM Ben Noordhuis

core: use proper #include directives

3415427d 02/16/2012 12:15 PM Ben Noordhuis

tls: mitigate session renegotiation attacks

The TLS protocol allows (and sometimes requires) clients to renegotiate the
session. However, renegotiation requires a disproportional amount of server-side
resources, particularly CPU time, which makes it a potential vector for...

be67fa7e 01/06/2012 03:01 PM Ryan Dahl

Revert "crypto: add SecureContext.clearOptions() method"

API addition needs to go in master. Also openssl-0.9.8k doesn't have
SSL_CTX_clear_options().

This reverts commit 6f8839d2ac362ced42235a34a023af5e2c656501.

6f8839d2 01/02/2012 06:02 AM Ben Noordhuis

crypto: add SecureContext.clearOptions() method

SecureContext.setOptions() is backed by SSL_CTX_set_options() which, contrary to
what the name suggests, is additive: it doesn't set options, it adds them to the
already active options.

Hence the need for SecureContext.clearOptions(), which lets you unset active...

189dd8f8 11/04/2011 11:24 AM Bert Belder

Fix line endings and trailing whitespace

19a85538 10/14/2011 11:54 AM koichik

tls: requestCert unusable with Firefox and Chrome

Fixes #1516.

c4eaf7e5 09/27/2011 02:27 PM Ben Noordhuis

crypto: implement randomBytes() and pseudoRandomBytes()

eb99083d 09/07/2011 02:01 PM Sean Cunningham

tls: add client-side session resumption support

7b2536a1 09/02/2011 11:49 AM Niclas Hoyer

Added additional properties to getPeerCertificate, now includes subjectAltName, Exponent and Modulus (FOAF+SSL friendly).

Patch written by Nathan,
http://groups.google.com/group/nodejs/browse_thread/thread/1d42da4cb2e51536

9010f5fb 07/29/2011 07:57 PM Fedor Indutny

Add support for TLS SNI

Fixes #1411

759fb36d 07/28/2011 09:16 AM Fedor Indutny

crypto: dispose persistent properties on class destruction

c9b40da3 04/19/2011 02:32 PM Fedor Indutny

OpenSSL NPN in node.js

closes #926.

2a88dd3b 04/13/2011 09:25 PM Theo Schlossnagle

TLS: Add secureOptions flag

Also, secureOptions flag was added (and passed through) and allows
the context to have all supported SSL_OP_* set via createCredentials.
All SSL_OP_ flags (outside of ALL) have been added to constants.

5c35dff4 04/01/2011 02:40 AM Ryan Dahl

Don't load root certs for each SSL context

55048cdf 03/14/2011 08:37 PM Ryan Dahl

Update copyright headers

01a864a2 02/10/2011 03:49 AM Theo Schlossnagle

TLS: CRL support

Needs more tests.

56ab929c 02/09/2011 04:30 AM Ryan Dahl

Remove unused parameter from crypto::Handle*Error

519dc2c1 02/09/2011 12:15 AM Ryan Dahl

tls: split bio errors from ssl errors

807fca68 02/01/2011 05:40 PM Ryan Dahl

TLS: Set ssl.receivedShutdown after each read

Closes GH-613.

2ff593ad 02/01/2011 05:14 PM Ryan Dahl

TLS: better error reporting at binding layer

Closes GH-612.

e3d1808e 12/11/2010 05:13 AM Ryan Dahl

Rename node::SecureStream to node::crypto::Connection

node::SecureStream is definitely not a "stream" in the Node sense. Renaming
it to avoid ambiguity. (Adding namespace to not confuse with some other
Connection object.)

70baeba8 12/11/2010 01:09 AM Ryan Dahl

Add receivedShutdown() binding

127f17a0 12/01/2010 03:47 PM Ryan Dahl

Remove should_verify from C++ - to handle in JS land

28a86c3e 12/01/2010 12:27 PM Ryan Dahl

Remove unnecessary call to X509_STORE_free

504a80dc 12/01/2010 12:26 PM Ryan Dahl

Rename VerifyPeerError to VerifyError

355936dc 11/30/2010 09:19 PM Ryan Dahl

Implement SecureContext destructor

ea540c94 11/30/2010 09:19 PM Ryan Dahl

Better verify info

4b947310 11/30/2010 09:19 PM Ryan Dahl

Move root certs out of JavaScript

1ce4684a 10/25/2010 08:26 PM Paul Querna

Centralize error handling in SecureStream

and add a start method, to kick off SSL handshaking, without writing a zero
byte buffer

9911629d 09/28/2010 10:17 PM Ryan Dahl

Fix style in node_crypto.cc

163485c8 09/28/2010 02:38 PM Ryan Dahl

Rename some SecureStream methods

792c7caf 07/12/2010 04:20 PM Peter Griess

Coverity fixes: src/node_crypto

afce4c3a 05/04/2010 05:12 PM Rhys Jones

Added default CAs, updated openssl verify behaviour, added crypto and https documentation

430cfd18 05/03/2010 07:11 PM Paulo Matias

Read all records to always empty the OpenSSL reading buffer.

80174392 04/12/2010 04:25 PM Rhys Jones

Moved Credentials into crypto module. Added node_crypto into crypto module

fb3a9cd0 04/02/2010 08:13 PM Rhys Jones

Initial openssl support for net2