aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Reverse the algorithm priority orderingJack Lloyd2015-08-2915-25/+57
| | | | | | Previously 0 was the highest priority and 255 was the lowest. But this is really quite confusing, instead treat 0 as lowest and 255 as highest so normal integer intuitions apply.
* Remove unneeded includes and clean up socket feature testJack Lloyd2015-08-294-12/+8
|
* Remove duplicated ABI flags, and treat user-set flags as a single stringJack Lloyd2015-08-291-8/+6
|
* Fix minimized builds and amalgamation buildsJack Lloyd2015-08-294-21/+35
| | | | | | | | No need to include the pk_utils.h header until we know ECDSA is enabled in the build. Move OpenSSL_Error to an internal header, was previously defined twice when all sources were combined.
* Merge pull request #236 from bogiord/add-alloc-constructorJack Lloyd2015-08-291-4/+7
|\ | | | | | | | | Make secure_allocator conforming with C++11 allocator concept. Add a template constructor and make the equality operators standard-compliant. Missing this broke iterator debugging with MSVC 2015.
| * Make the equality operators standard-compliant.bogdan2015-08-291-4/+4
| | | | | | The equality operators need to support different specializations as well; this is also part of the standard allocator requirements.
| * Add template constructor to secure_allocatorbogdan2015-08-051-0/+3
| | | | | | This is required by the Standard for an allocator. As far as I can tell, not having it breaks compilation in MSVC 2015, at least when iterator debugging is enabled. More details here: http://stackoverflow.com/q/31802806/4326278.
* | Avoid a crash in the TLS server if the client sends ALPN but no nextJack Lloyd2015-08-281-1/+1
| | | | | | | | protocol handler was specified to the Server constructor. GH #252
* | Reorganize todoJack Lloyd2015-08-281-43/+39
| |
* | Add ECDSA provider using OpenSSLJack Lloyd2015-08-282-1/+220
| | | | | | | | | | Unfortunately the signer cannot be tested in current framework because OpenSSL does not use RFC 6979 deterministic signatures.
* | Remove unused variableJack Lloyd2015-08-281-3/+0
| |
* | Ignore logs and cachegrind/callgrind outputsJack Lloyd2015-08-281-0/+7
| |
* | Fix pk signature test framework bug.Jack Lloyd2015-08-281-5/+5
| | | | | | | | | | | | | | | | Was attempting to test that the all-zero signature is invalid, then tested some mutated signatures. Unfortunately it zeroed out the signature before doing the mutation tests, so the mutated signatures were all very-low Hamming weight strings instead of being close to the original valid signature.
* | PK speed reporting improvements.Jack Lloyd2015-08-281-4/+9
| | | | | | | | | | | | | | | | | | | | Increment the input message so each value is different rather than repeatedly hashing the same message until we regen a new random one. In ECDSA speed test be explicit about what group is being used. Remove 160 bit groups from ECC benchmarking; 80 bits is not enough anymore so doesn't much matter.
* | Move GF(p) side channel countermeasure toggles to build.hJack Lloyd2015-08-283-28/+59
| | | | | | | | Some tweaks for point multiplication using fixed windows.
* | Use 16 byte alignment for all allocations in the mlock allocatorJack Lloyd2015-08-281-7/+1
| |
* | Add override specifiers to zlib.hJack Lloyd2015-08-281-6/+6
| |
* | Gzip_Decompression should be a subclass of Stream_DecompressionJack Lloyd2015-08-281-1/+1
| | | | | | | | GH #264
* | Merge pull request #266 from cordney/fix-multiple-abi-link-flagsJack Lloyd2015-08-281-4/+4
|\ \ | | | | | | Allow multiple abi link flags with the same name
| * | Allow multiple abi link flags with the same nameRené Korthaus2015-08-281-4/+4
| | | | | | | | | | | | | | | | | | Allow multiple ABI link flags with the same name, e.g., -arch armv7 -arch armv7s when cross-compiling for iOS. This is the first fix necessary for fixing #188.
* | | Merge pull request #265 from tiwoc/compress-empty-bufferJack Lloyd2015-08-282-7/+22
|\ \ \ | | | | | | | | Fix zlib error when compressing an empty buffer
| * | | Compression: Fix zlib failure on compression of empty inputDaniel Seither2015-08-281-0/+8
| | | | | | | | | | | | | | | | | | | | zlib treats a nullptr output buffer as an error. This commit fixes the failing compression tests.
| * | | Compression: Prevent undefined behavior when feeding empty inputDaniel Seither2015-08-281-7/+7
| | | | | | | | | | | | | | | | | | | | | | | | &emptyVector[n] triggers undefined behavior because it is an out-of- bounds access, even if n == 0. emptyVector.data() does not (but may return nullptr).
| * | | Add test for compression of an empty bufferDaniel Seither2015-08-281-0/+7
| |/ / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This test currently fails: $ ./botan-test compression Failure testing zlib - zlib deflate error -2 Failure testing deflate - zlib deflate error -2 Failure testing gzip - zlib deflate error -2 Compression 3 tests 3 FAILs =============== Tests 3 FAILs
* | | Merge pull request #247 from mouse07410/masterJack Lloyd2015-08-281-69/+174
|\ \ \ | | | | | | | | Improve readability and usability of test-output of botan.py GH #247
| * | | Update readme.rst, removing fork-specific stuff.Mouse2015-08-141-6/+0
| | | |
| * | | Changed tabs to 4 spacesMouse2015-08-141-5/+5
| | | |
| * | | Merge pull request #1 from randombit/masterMouse2015-08-1418-66/+15
| |\ \ \ | | | | | | | | | | Merging mainstream updates
| * | | | Update readme.rstMouse2015-08-141-1/+1
| | | | | | | | | | | | | | | Described what this fork is for.
| * | | | Update readme.rstMouse2015-08-141-0/+6
| | | | |
| * | | | Restored Darwin compatibilityUri Blumenthal2015-08-141-1/+4
| | | | |
| * | | | Ported python demo script to python-3Uri Blumenthal2015-08-141-61/+129
| | | | |
| * | | | Fixing platform independence that previous patch brokeMouse2015-08-121-1/+1
| | | | |
| * | | | Made output prettier and more understandableUri Blumenthal2015-08-111-31/+65
| | | | |
* | | | | Merge pull request #163 from cordney/add-pkcs8-cmdJack Lloyd2015-08-281-0/+77
|\ \ \ \ \ | |_|_|/ / |/| | | | Add PKCS#8 private/public key processing tool GH #163
| * | | | Don't register PKCS8 cmdline app when build without pubkey moduleRené Korthaus2015-07-171-0/+4
| | | | |
| * | | | Check minimum arguments and print helpRené Korthaus2015-07-151-1/+7
| | | | |
| * | | | Return !=0 on errorRené Korthaus2015-07-151-0/+1
| | | | |
| * | | | Add PKCS#8 private/public key processing toolRené Korthaus2015-07-011-0/+66
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This tool works similar to 'openssl pkey' in that it allows to read a private key from file and output the private or corresponding public key to file. It also allows changing a private key passphrase this way. This tool comes in handy when replacing use of openssl in scripts. The syntax is: botan pkcs8 --in=private.pem --out=key_out.pem [--pubout] [--passin=] [--passout=] [--pbe=]
* | | | | Merge pull request #260 from webmaster128/sonameSimon Warta2015-08-2417-53/+81
|\ \ \ \ \ | | | | | | | | | | | | Add soname_pattern
| * | | | | Add soname_patternSimon Warta2015-08-2417-53/+81
|/ / / / / | | | | | | | | | | | | | | | Fixes #241
* | | | | Guard rlimit reset with a defined check for RLIMIT_MEMLOCK as it isJack Lloyd2015-08-241-0/+5
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | missing on Solaris at least. On such systems it's probably safe to assume that no amount of memory can be mlock'ed from userspace, so just return zero to disable the allocator entirely. GH #262
* | | | | On x86-32, anything using the simd wrapper needs to be pushed to the SSE2 objJack Lloyd2015-08-221-4/+8
| | | | |
* | | | | Remove high bit set char from comment as it broke amalgamation generationJack Lloyd2015-08-221-4/+8
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | under Python3. Ironically there doesn't seem to be any way to portably handle non-ASCII in a way that is compatible with Python 2.7 and 3 at the same time.
* | | | | Fix for minimized buildsJack Lloyd2015-08-211-0/+1
| | | | |
* | | | | Missing addJack Lloyd2015-08-211-0/+1
| | | | |
* | | | | Bump versionJack Lloyd2015-08-212-1/+7
| | | | |
* | | | | In RSA, check that the input is less than the modulus n before blindingJack Lloyd2015-08-211-5/+7
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | rather than after. After blinding the value is always reduced mod n so the condition is never met. This may be the cause of RSA test failures described in GH #174 The scenario was that during randomized corruption tests we occasionally provide an input which was greater than the modulus. When that happened the value was effectively reduced mod n, so the self-check would later fail, because the decrypted result (reduced mod n) would be compared with the original (larger than n) input.
* | | | | Add power analysis countermeasures for ECC point multiplications.Jack Lloyd2015-08-2110-242/+411
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The plain PointGFp operator* now uses Montgomery ladder exclusively. Adds a blinded point multiply algorithm which uses exponent and point randomization, as well as a Montgomery ladder technique that takes a random walk of the possible addition chains for k.
* | | | | Merge pull request #258 from webmaster128/reactivate-ffi-testSimon Warta2015-08-211-3/+2
|\ \ \ \ \ | | | | | | | | | | | | Reactivate FFI PBKDF minimum iterations test