aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Merge GH #546 Add OID testsJack Lloyd2016-07-211-0/+115
|\
| * add oid testsDaniel Neus2016-07-201-0/+115
| |
* | Merge GH #545 OctetString testsJack Lloyd2016-07-213-0/+190
|\ \
| * | add OctetString unit testsDaniel Neus2016-07-203-0/+190
| |/ | | | | | | and add the possibility to compare OctetStrings with the botan test-framework
* | Merge GH #544 Make StreamCipher::set_iv pure virtualJack Lloyd2016-07-215-7/+15
|\ \ | |/ |/|
| * Make Stream_Cipher::set_iv() pure virtualRené Korthaus2016-07-205-7/+15
|/ | | | | | | | | | It provided a default implementation that only checked that the length was correct, but ignored the actual data and did not notify the caller, which seemed like a rather odd behaviour. The only implementation that used this default implementation, RC4, now throws an exception.
* Merge GH #541 More ECIES testsJack Lloyd2016-07-193-30/+385
|\
| * add more ECIES testsDaniel Neus2016-07-193-30/+385
| |
* | Update newsJack Lloyd2016-07-181-2/+5
| | | | | | | | [ci skip]
* | Compile fixJack Lloyd2016-07-181-1/+1
| |
* | Fix proc_walk - would always return 0 entropy collected.Jack Lloyd2016-07-183-43/+13
| | | | | | | | | | | | Fix BeOS stat reader - was calling wrong function on the rng. Remove entropy estimate defines from build.h, no longer used.
* | Merge GH #520 RNG changesJack Lloyd2016-07-1857-1442/+7023
|\ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Adds Stateful_RNG base class which handles reseeding after some amount of output (configurable at instantiation time, defaults to the build.h value) as well as detecting forks (just using pid comparisons, so still vulnerable to pid wraparound). Implemented by HMAC_RNG and HMAC_DRBG. I did not update X9.31 since its underlying RNG should already be fork safe and handle reseeding at the appropriate time, since a new block is taken from the underlying RNG (for the datetime vector) for each block of output. Adds RNG::randomize_with_input which for most PRNGs is just a call to add_entropy followed by randomize. However for HMAC_DRBG it is used for additional input. Adds tests for HMAC_DRBG with AD from the CAVS file. RNG::add_entropy is implemented by System_RNG now, as both CryptGenRandom and /dev/urandom support receiving application provided data. The AutoSeeded_RNG underlying type is currently selectable in build.h and defaults to HMAC_DRBG(SHA-256). AutoSeeded_RNG provides additional input with each output request, consisting of the current pid, a counter, and timestamp (unless the application explicitly calls randomize_with_input, in which case we just take what they provided). This is the same hedge used in HMAC_RNGs output PRF. AutoSeeded_RNG is part of the base library now and cannot be compiled out. Removes Entropy_Accumulator type (which just served to bridge between the RNG and the entropy source), instead the Entropy_Source is passed a reference to the RNG being reseeded, and it can call add_entropy on whatever it can come up with.
| * | Address some review comments from @cordneyJack Lloyd2016-07-1710-28/+30
| | | | | | | | | | | | | | | | | | | | | | | | | | | Use consistent naming for the max output before reseed parameter. The constant (default) value is renamed to BOTAN_RNG_DEFAULT_MAX_OUTPUT_BEFORE_RESEED, since without the DEFAULT_ it reads like a compile time maximum instead. Use uint8_t instead of byte.
| * | Fix assignmentJack Lloyd2016-07-171-1/+1
| | |
| * | Revamp entropy pollingJack Lloyd2016-07-1733-433/+344
| | | | | | | | | | | | | | | Remove Entropy_Accumulator, instead have entropy sources directly add entropy to the RNG.
| * | HMAC_RNG not always in buildJack Lloyd2016-07-171-2/+7
| | |
| * | Move poll logic to Entropy_SourcesJack Lloyd2016-07-173-18/+27
| | |
| * | Update rng cli - can make multiple requestsJack Lloyd2016-07-171-5/+10
| | |
| * | Remove useless L param from X9.31 test vector fileJack Lloyd2016-07-172-548/+14
| | | | | | | | | | | | Clean up test code
| * | Add Stateful_RNGJack Lloyd2016-07-1720-298/+281
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Handles fork checking for HMAC_RNG and HMAC_DRBG AutoSeeded_RNG change - switch to HMAC_DRBG as default. Start removing the io buffer from entropy poller. Update default RNG poll bits to 256. Fix McEliece test, was using wrong RNG API. Update docs.
| * | Make the DRBG hash selectable in build.h with BOTAN_AUTO_RNG_DRBG_HASH_FUNCTIONJack Lloyd2016-07-173-3/+4
| | | | | | | | | | | | Add some missing overrides
| * | If EPERM when writing to the random device, return silently.Jack Lloyd2016-07-171-1/+13
| | | | | | | | | | | | | | | | | | | | | | | | | | | That failure seems like an explicit system policy decision, so accept it as such. Versus say EBADF or EFAULT which would instead suggest a library bug. This return is seen on OS X Travis CI, unclear if this is a problem with OS X or with how Travis does OS X containers.
| * | Switch to HMAC_DRBG for all RNG generation.Jack Lloyd2016-07-1715-252/+6439
| | | | | | | | | | | | | | | | | | | | | | | | Add support and tests for additional_data param to HMAC_DRBG Add Stateful_RNG class which has fork detection and periodic reseeding. AutoSeeded_RNG passes the current pid and time as additional_data
* | | Merge GH #538 Add RSA-KEM testsJack Lloyd2016-07-182-3/+130
|\ \ \ | |_|/ |/| |
| * | Add test vectors for RSA-KEM/KDF1René Korthaus2016-07-182-3/+130
|/ / | | | | | | | | Adds test vectors for RSA-KEM with KDF1 from ISO 18033-2 and test vectors for KDF1 and KDF2 generated with BouncyCastle.
* | Merge GH #535 Use Cipher_Mode instead of Pipe in ECIESJack Lloyd2016-07-174-23/+20
|\ \
| * | replace (deprecated) Pipe API with Cipher_Mode in ECIESDaniel Neus2016-07-134-23/+20
| | |
* | | Merge GH #533 DLIES changesJack Lloyd2016-07-178-149/+1381
|\ \ \
| * | | DLIES reworkDaniel Neus2016-07-138-149/+1381
| |/ / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | With these fixes the implementation is now compatible with bouncycastle and it should operate as it is specified in "DHIES: An encryption scheme based on Diffie-Hellman Problem" or in BSI technical guideline TR-02102-1. In addition to the already present XOR-encrypion/decryption mode it's now possible to use DLIES with a block cipher. Previously the input to the KDF was the concatenation of the (ephemeral) public key and the secret value derived by the key agreement operation: ``` secure_vector<byte> vz(m_my_key.begin(), m_my_key.end()); vz += m_ka.derive_key(0, m_other_key).bits_of(); const size_t K_LENGTH = length + m_mac_keylen; secure_vector<byte> K = m_kdf->derive_key(K_LENGTH, vz); ``` I don't know why this was implemented like this. But now the input to the KDF is only the secret value obtained by the key agreement operation. Furthermore the order of the output was changed from {public key, tag, ciphertext} to {public key, ciphertext, tag}. Multiple test vectors added that were generated with bouncycastle and some with botan itself.
* | | Merge GH #536 Disable optimizations when doing a coverage buildJack Lloyd2016-07-171-0/+3
|\ \ \
| * | | coverage should be checked without optimizationsDaniel Neus2016-07-141-0/+3
| |/ /
* | | Merge GH #537 Add test vectors for KDF1/ISO18033Jack Lloyd2016-07-173-3/+27
|\ \ \
| * | | Add test vectors for KDF1/ISO18033René Korthaus2016-07-153-3/+27
| |/ /
* | | Merge GH #534 Update changelog with X9.23 bug fixJack Lloyd2016-07-171-0/+3
|\ \ \ | |_|/ |/| |
| * | Update changelog with ANSI X9.23 padding bugfixRené Korthaus2016-07-131-0/+3
| |/
* | Fix SecRandomCopyBytes call with older OS X SDKsJack Lloyd2016-07-151-0/+1
| | | | | | | | | | | | | | | | | | | | In 10.8 (and presumably older) versions, the header for SecRandomCopyBytes is SecRandom.h, and Security.h does not include SecRandom.h With this change, the include of Security.h may be redundant for all versions, but I have no way to test this. GH #528
* | Fix undefined behavior in donna128 typeJack Lloyd2016-07-152-6/+16
|/ | | | | | | Caused Curve25519 tests to fail when compiled by Clang on ARM, may have affected other 32-bit platforms. GH #532
* Deprecate EGDJack Lloyd2016-07-111-0/+4
|
* Rename policy 'sane' to 'modern' which better reflects intent.Jack Lloyd2016-07-111-29/+36
| | | | | Add RFC 6979 which became optional along the line. Also add bcrypt and compression, and add TLS by default. Prohibit EGD.
* Merge GH #531 Add AES/CBC/CTS tests from RFC 3962Jack Lloyd2016-07-112-0/+37
|\
| * Add test vectors for AES-CBC-CS3 aka AES/CBC/CTS from RFC 3962René Korthaus2016-07-112-0/+37
| | | | | | | | | | | | Previously, CBC-CS3 only had tests with DES, but if DES is not enabled in the module policy, then CBC-CS3 is not tested at all.
* | Merge GH #530 Remove egd from BSI policyJack Lloyd2016-07-111-1/+1
|\ \
| * | Remove egd entropy sources from BSI module policyRené Korthaus2016-07-111-1/+1
| |/
* | Merge GH #529 Add block cipher padding tests, fix off by one in X9.23 paddingJack Lloyd2016-07-114-2/+147
|\ \ | |/ |/|
| * Add test vectors for block cipher padding modesRené Korthaus2016-07-114-2/+147
|/ | | | | | | | | | | Exports get_bc_pad() to be used from tests. Adds separate handcrafted tests for block cipher padding modes. They were previously only tested implicitly during the block cipher modes of operation tests, though not all padding modes were covered. And in case a mode of operation is not part of the enabled modules, the previously tested padding modes are not covered at all. Fixes an off-by-one bug in the previously untested ANSI X9.23 padding mode, where the number of zero bytes in the pad was one more than allowed by the standard.
* Merge GH #526 Some PKCS #11 fixes when used with BSI policyJack Lloyd2016-07-052-1/+3
|\
| * PKCS11 tests: run ECDSA software verification only if emsa_raw module is ↵Daniel Neus2016-07-051-0/+3
| | | | | | | | available
| * remove rfc6979 module dependency for pkcs11Daniel Neus2016-07-051-1/+0
| | | | | | | | no longer needed since hash_for_emsa() is now in emsa.h
* | Merge GH #525 Avoid MSVC C4100 warningJack Lloyd2016-07-051-0/+5
|\ \ | |/ |/|
| * prevent massive amount of MSVC C4100 warningsDaniel Neus2016-07-051-0/+5
|/