aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* install.py: disable two pylint warnings locallySimon Warta2017-07-301-2/+2
|
* install.py: fix whitespace issues found by pylintSimon Warta2017-07-301-6/+6
|
* Merge GH #1123 Add OCSP::Response::certificates APIJack Lloyd2017-07-242-0/+36
|\
| * add OCSP::Response::certificates() + unit testRené Meusel2017-07-212-0/+36
| |
* | Change arbitrary privkey size to a smaller arbitrary number.Jack Lloyd2017-07-241-1/+1
| | | | | | | | | | | | GH #1122 [ci skip]
* | Revert GH #1119 90e8cbbc02 Causes irregular timeouts on TravisJack Lloyd2017-07-241-1/+1
|/ | | | [ci skip]
* Merge GH #1119 Run full tests on big-endian ppc qemuJack Lloyd2017-07-171-1/+1
|\
| * Enable all tests on ppc32 cross buildJack Lloyd2017-07-161-1/+1
| | | | | | | | Ensures big-endian gets tested
* | Appease shellcheckJack Lloyd2017-07-171-3/+3
|/
* Merge GH #1112 Cleanup in configureJack Lloyd2017-07-161-5/+6
|\
| * configure: explicitly concatenate stdout+stdderr for cc_putputSimon Warta2017-07-051-5/+6
| | | | | | | | | | | | This prevents a lint error in newer pylint versions ("R:2600, 8: Redefinition of cc_output type from tuple to str (redefined-variable-type)") and makes code clearer.
* | Merge GH #1110 Fix documentation of PKCS11 moduleJack Lloyd2017-07-162-12/+12
|\ \
| * | Remove "pkcs11" provider paramater for pk ops in handbook and testsRené Korthaus2017-07-042-12/+12
| |/ | | | | | | | | | | | | | | | | We have special key types for PKCS#11 public and private keys. When using the PK ops classes, passing the "pkcs11" provider parameter is not necessary, as the PK ops is internally chosen by the PKCS#11 key class, in contrast to other providers such as openssl, which don't have special key classes. Updates the handbook code examples and the tests.
* | Merge GH #1116 Fix loading of unencrypted PKCS#8 key via CLIJack Lloyd2017-07-161-10/+16
|\ \
| * | Fix loading of unencrypted PKCS#8 key via CLIRené Korthaus2017-07-111-10/+16
| |/ | | | | | | | | | | | | CLI passed an emtpy password to PKCS8::load_key(), even if --pass-in was not given, which caused loading of unencrypted private keys to fail. Fixed by calling the corresponding flavour of load_key().
* / Fix failure to fully zero memory before freeJack Lloyd2017-07-163-1/+17
|/ | | | | | Introduced in 455bd2557cbb1343e59eefd97cb449f06a702c28 Found and reported by Roman Pozlevich
* Increase ABI versionJack Lloyd2017-07-031-1/+1
| | | | | | | | | Already we broke ABI in 2.1 but did not bump the soversion (see comments in https://github.com/randombit/botan/commit/7bdffd52a96e08e9452d1985258376a3925a497b) and 2.2 again changes ABI for example by adding HashFunction::copy_state function. [ci skip]
* Update newsJack Lloyd2017-07-031-0/+7
|
* Merge GH #1093 In EC keys, use OID encoding if possibleJack Lloyd2017-07-031-6/+16
|\
| * ECC: use OID encoding if possiblePatrick Wildt2017-06-301-6/+16
| | | | | | | | | | | | Instead of explicitly encoding the domain, encode them with the OID if the OID is available. This makes the ecdsa_sign test run with OpenSSL, since OpenSSL needs the OID explicitly set.
| * Revert previous, we should fix it differently.Patrick Wildt2017-06-301-16/+20
| |
| * Allow ECDSA tests for OpenSSL by comparing EC GroupsPatrick Wildt2017-06-281-20/+16
| | | | | | | | | | | | | | | | The ecdsa_sign test does not work for OpenSSL since the public key that is derived from the private key does not store the OID of the curve. Thus, the OpenSSL code cannot find the proper NID for the given public key and cannot do a verification operation. We can fix this by comparing the actual groups and not using the OIDs.
* | Merge GH #1107 Improve documentation of x509_path_validateJack Lloyd2017-07-031-1/+1
|\ \
| * | Add position of end entity cert in x509_path_validate() doc [ci skip]René Korthaus2017-07-021-1/+1
| | | | | | | | | | | | | | | It's not so obvious to a user at which end of the chain the end entity certificate must be placed.
* | | Merge GH #1106 Fix sign_cert CLI incorrectly handling --ca-key-pass (GH #1104)Jack Lloyd2017-07-031-2/+4
|\ \ \
| * | | Fix sign_cert CLI incorrectly handling --ca-key-passRené Korthaus2017-07-011-2/+4
| |/ /
* | | Merge GH #1103 Fix error in Doxygen commentJack Lloyd2017-07-031-1/+1
|\ \ \ | |/ / |/| |
| * | escape \Z in doxygen comment causing doxygen warning (and in turn error), ↵Zoltan Gyarmati2017-07-011-1/+1
|/ / | | | | | | fixes #1102
* | Update newsJack Lloyd2017-06-302-1/+5
| |
* | Update modern and nist policies with recent additionsJack Lloyd2017-06-303-0/+21
| |
* | Merge GH #1082 Add support for SM2 signature schemeJack Lloyd2017-06-3016-2/+654
|\ \
| * | Remove debug printsJack Lloyd2017-06-301-17/+1
| | |
| * | Add SM2 signature schemeJack Lloyd2017-06-2916-2/+671
| | | | | | | | | | | | | | | | | | From https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02 This is a contribution from Ribose Inc (@riboseinc).
* | | Merge GH #1084 Support multiple buffer sizes in speed reportJack Lloyd2017-06-301-86/+446
|\ \ \
| * | | use buffer sizes only once in performance tests0xdefaced2017-06-261-2/+16
| | | | | | | | | | | | | | | | | | | | | | | | Remove duplicates from given buffer sizes in performance tests. Additionally, sort buffer sizes for better grouping in logs and add a colon before printing the measurements.
| * | | print a summary for performance tests0xdefaced2017-06-241-7/+306
| | | |
| * | | only speed test different msg sizes when tests require a message size0xdefaced2017-06-241-204/+222
| | | | | | | | | | | | | | | | | | | | Don't perform performance tests for different buffer sizes when the algorithm does not care about the message size.
| * | | accept multiple buffer sizes used for speed tests0xdefaced2017-06-241-141/+170
| | |/ | |/|
* | | Merge GH #1098 Cleanups in SM3Jack Lloyd2017-06-301-81/+25
|\ \ \
| * | | Cleanups in SM3 codeJack Lloyd2017-06-291-81/+25
| |/ / | | | | | | | | | | | | | | | | | | | | | T[] variable is actually a constant, so precompute it in SM3_TJ W1 expansion is very simple and can just be done inline. Somewhat faster on my machine.
* | | Merge GH #1099 Update BSI policyJack Lloyd2017-06-301-0/+3
|\ \ \ | |_|/ |/| |
| * | Update BSI module policyRené Korthaus2017-06-301-0/+3
|/ / | | | | | | | | Prohibit SM4 block cipher, ed25519 signature scheme and NIST SP800-56A KDF.
* | Merge GH #1095 Catch exceptions in botan_mp_initJack Lloyd2017-06-291-3/+23
|\ \
| * | ffi: Catch exceptions in botan_mp_initDaniel Wyatt2017-06-281-3/+23
| |/
* | Merge GH #1092 Correct printing of UTF-8 strings in asn1print cliJack Lloyd2017-06-291-2/+2
|\ \
| * | Fix transcoding of asn1print strings to UTF-8René Korthaus2017-06-281-2/+2
| |/ | | | | | | | | | | | | | | When the terminal used supports UTF-8, asn1print should convert strings from internal Latin1 to UTF-8 encoding for printing to terminal. However, it previously tried to convert in the opposite direction, probably because of the misconception that Charset::transcode() expects the two encodings as "from, to" instead of "to, from".
* | Merge GH #1096 Avoid undefined behavior in rotation operationsJack Lloyd2017-06-291-0/+2
|\ \
| * | Allow bit rotation by more than sizeof(T)*8 bits.Daniel Wyatt2017-06-281-0/+2
| |/ | | | | | | | | | | | | | | | | Currently these functions will happily bit shift by >= sizeof(T)*8 bits. However, this is undefined behavior, and results in unexpected results (0) on at least one platform I've tested. With this update, you can expect that rotate_left<uint32_t>(1, 32)==1 and rotate_right<uint32_t>(1, 32)==1.
* / Add a check in EC_Group encoding for OID being setJack Lloyd2017-06-291-0/+6
|/ | | | Otherwise encoding would fail with an obtuse error message.
* Merge GH #1087 Update Doxygen comment for X509_Certificate::subject_info [ci ↵Jack Lloyd2017-06-231-2/+4
|\ | | | | | | skip]