aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* BearSSL: move includes into extern "C"Patrick Wildt2017-07-052-3/+8
| | | | | Without the specific extern "C" declaration for the includes the C functions might get C++'d so the linking stage fails.
* BearSSL: Support for ECDSAPatrick Wildt2017-07-054-2/+242
| | | | | | This commit adds support for ECDSA using BearSSL as a backend. This means we can test BearSSL's ECDSA algorithms using the extensive Botan testsuite.
* BearSSL: Initial support and hash testsPatrick Wildt2017-07-055-2/+181
| | | | | | | | | BearSSL is an implementation of the SSL/TLS protocol in C aiming to be correct and secure, small and highly portable. Thus making it nicer to be included in a rather sparse bootloader. This commit adds support for BearSSL's hash routines only, with more stuff coming up in following commits. The goal is to be able to test BearSSL using Botan's extensive testsuite.
* Increase ABI versionJack Lloyd2017-07-031-1/+1
| | | | | | | | | Already we broke ABI in 2.1 but did not bump the soversion (see comments in https://github.com/randombit/botan/commit/7bdffd52a96e08e9452d1985258376a3925a497b) and 2.2 again changes ABI for example by adding HashFunction::copy_state function. [ci skip]
* Update newsJack Lloyd2017-07-031-0/+7
|
* Merge GH #1093 In EC keys, use OID encoding if possibleJack Lloyd2017-07-031-6/+16
|\
| * ECC: use OID encoding if possiblePatrick Wildt2017-06-301-6/+16
| | | | | | | | | | | | Instead of explicitly encoding the domain, encode them with the OID if the OID is available. This makes the ecdsa_sign test run with OpenSSL, since OpenSSL needs the OID explicitly set.
| * Revert previous, we should fix it differently.Patrick Wildt2017-06-301-16/+20
| |
| * Allow ECDSA tests for OpenSSL by comparing EC GroupsPatrick Wildt2017-06-281-20/+16
| | | | | | | | | | | | | | | | The ecdsa_sign test does not work for OpenSSL since the public key that is derived from the private key does not store the OID of the curve. Thus, the OpenSSL code cannot find the proper NID for the given public key and cannot do a verification operation. We can fix this by comparing the actual groups and not using the OIDs.
* | Merge GH #1107 Improve documentation of x509_path_validateJack Lloyd2017-07-031-1/+1
|\ \
| * | Add position of end entity cert in x509_path_validate() doc [ci skip]René Korthaus2017-07-021-1/+1
| | | | | | | | | | | | | | | It's not so obvious to a user at which end of the chain the end entity certificate must be placed.
* | | Merge GH #1106 Fix sign_cert CLI incorrectly handling --ca-key-pass (GH #1104)Jack Lloyd2017-07-031-2/+4
|\ \ \
| * | | Fix sign_cert CLI incorrectly handling --ca-key-passRené Korthaus2017-07-011-2/+4
| |/ /
* | | Merge GH #1103 Fix error in Doxygen commentJack Lloyd2017-07-031-1/+1
|\ \ \ | |/ / |/| |
| * | escape \Z in doxygen comment causing doxygen warning (and in turn error), ↵Zoltan Gyarmati2017-07-011-1/+1
|/ / | | | | | | fixes #1102
* | Update newsJack Lloyd2017-06-302-1/+5
| |
* | Update modern and nist policies with recent additionsJack Lloyd2017-06-303-0/+21
| |
* | Merge GH #1082 Add support for SM2 signature schemeJack Lloyd2017-06-3016-2/+654
|\ \
| * | Remove debug printsJack Lloyd2017-06-301-17/+1
| | |
| * | Add SM2 signature schemeJack Lloyd2017-06-2916-2/+671
| | | | | | | | | | | | | | | | | | From https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02 This is a contribution from Ribose Inc (@riboseinc).
* | | Merge GH #1084 Support multiple buffer sizes in speed reportJack Lloyd2017-06-301-86/+446
|\ \ \
| * | | use buffer sizes only once in performance tests0xdefaced2017-06-261-2/+16
| | | | | | | | | | | | | | | | | | | | | | | | Remove duplicates from given buffer sizes in performance tests. Additionally, sort buffer sizes for better grouping in logs and add a colon before printing the measurements.
| * | | print a summary for performance tests0xdefaced2017-06-241-7/+306
| | | |
| * | | only speed test different msg sizes when tests require a message size0xdefaced2017-06-241-204/+222
| | | | | | | | | | | | | | | | | | | | Don't perform performance tests for different buffer sizes when the algorithm does not care about the message size.
| * | | accept multiple buffer sizes used for speed tests0xdefaced2017-06-241-141/+170
| | |/ | |/|
* | | Merge GH #1098 Cleanups in SM3Jack Lloyd2017-06-301-81/+25
|\ \ \
| * | | Cleanups in SM3 codeJack Lloyd2017-06-291-81/+25
| |/ / | | | | | | | | | | | | | | | | | | | | | T[] variable is actually a constant, so precompute it in SM3_TJ W1 expansion is very simple and can just be done inline. Somewhat faster on my machine.
* | | Merge GH #1099 Update BSI policyJack Lloyd2017-06-301-0/+3
|\ \ \ | |_|/ |/| |
| * | Update BSI module policyRené Korthaus2017-06-301-0/+3
|/ / | | | | | | | | Prohibit SM4 block cipher, ed25519 signature scheme and NIST SP800-56A KDF.
* | Merge GH #1095 Catch exceptions in botan_mp_initJack Lloyd2017-06-291-3/+23
|\ \
| * | ffi: Catch exceptions in botan_mp_initDaniel Wyatt2017-06-281-3/+23
| |/
* | Merge GH #1092 Correct printing of UTF-8 strings in asn1print cliJack Lloyd2017-06-291-2/+2
|\ \
| * | Fix transcoding of asn1print strings to UTF-8René Korthaus2017-06-281-2/+2
| |/ | | | | | | | | | | | | | | When the terminal used supports UTF-8, asn1print should convert strings from internal Latin1 to UTF-8 encoding for printing to terminal. However, it previously tried to convert in the opposite direction, probably because of the misconception that Charset::transcode() expects the two encodings as "from, to" instead of "to, from".
* | Merge GH #1096 Avoid undefined behavior in rotation operationsJack Lloyd2017-06-291-0/+2
|\ \
| * | Allow bit rotation by more than sizeof(T)*8 bits.Daniel Wyatt2017-06-281-0/+2
| |/ | | | | | | | | | | | | | | | | Currently these functions will happily bit shift by >= sizeof(T)*8 bits. However, this is undefined behavior, and results in unexpected results (0) on at least one platform I've tested. With this update, you can expect that rotate_left<uint32_t>(1, 32)==1 and rotate_right<uint32_t>(1, 32)==1.
* / Add a check in EC_Group encoding for OID being setJack Lloyd2017-06-291-0/+6
|/ | | | Otherwise encoding would fail with an obtuse error message.
* Merge GH #1087 Update Doxygen comment for X509_Certificate::subject_info [ci ↵Jack Lloyd2017-06-231-2/+4
|\ | | | | | | skip]
| * Update Doxygen for X509_Certificate::subject_infoDaniel Neus2017-06-231-2/+4
|/
* Update newsJack Lloyd2017-06-211-0/+5
|
* Bump x25519 version in light of GH #1076 format changeJack Lloyd2017-06-211-1/+1
|
* Add test for CURDLE format Ed25519 keysJack Lloyd2017-06-211-0/+40
|
* Merge GH #1076 Change x25519 and Ed25519 key formats to match IETF standardJack Lloyd2017-06-217-53/+46
|\
| * Replaced USE_NULL_PARAM (0x05 0x00) by an empty vector (nothing)Francis Dupont2017-06-122-2/+8
| |
| * Fixed private key codeFrancis Dupont2017-06-124-25/+14
| |
| * Fixed public key code for *25519Francis Dupont2017-06-122-18/+4
| |
| * Moved to draft-ietf-curdle-pkix assigned OIDsFrancis Dupont2017-06-122-7/+7
| |
| * Added Curve25519_PrivateKey constructor from secret_keyFrancis Dupont2017-06-121-0/+12
| |
| * Addressed #1071 (unfinished change in master cipher_filter.cpp)Francis Dupont2017-06-121-1/+1
| |
* | Update readme with recently added algosJack Lloyd2017-06-201-3/+4
| |
* | Merge GH #1080 Add SM4 block cipherJack Lloyd2017-06-206-3/+228
|\ \