aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Allow tag sizes other than 128 bits in GCM and OCBlloyd2013-03-273-34/+46
|
* Rename script and add headerlloyd2013-03-271-4/+10
|
* Basic docs for AEAD_Modelloyd2013-03-273-3/+80
|
* propagate from branch 'net.randombit.botan' (head ↵lloyd2013-03-2715-56/+109
|\ | | | | | | | | | | b7ac11f48ca4fe8e5aafa01979c5bf087b156d77) to branch 'net.randombit.botan.aead-modes' (head 061b249cd586d4ff849aaa48c3ec8cf7587acc56)
| * Avoid warninglloyd2013-03-231-1/+1
| |
| * Alias mips64el to mips64, from Brad Smithlloyd2013-03-211-0/+4
| |
| * merge of '767ce7b733ad25a056a4609645dbb0418fed5c91'lloyd2013-03-2132-2487/+70
| |\ | | | | | | | | | and '8795500927af6dc6c8a74d6868d002712f971a2f'
| * | Fix error if we asked for nonexistent branch or versionlloyd2013-03-211-1/+1
| | |
| * | Move Monotone info to vcs.rstlloyd2013-03-217-47/+49
| | | | | | | | | | | | | | | | | | Fix some syntax errors in misc docs. Use mtn.randombit.net hostname
| * | Add TLS::Policy::server_uses_own_ciphersuite_preferences()lloyd2013-03-216-7/+54
| | | | | | | | | | | | | | | | | | Previously the server always took its most-preferred cipher out of the client's list, but this policy allows telling a server to follow the client's preferences insetad.
* | | Resize each time in the looplloyd2013-03-271-2/+2
| | |
* | | In AEAD_Filter consume input in pieceslloyd2013-03-271-3/+16
| | |
* | | Report results from all providers if more than one failurelloyd2013-03-271-3/+4
| | |
* | | Fix macro check in selftestlloyd2013-03-272-10/+9
| | |
* | | Add an AEAD_Filter that wraps an AEAD_Mode, plus various bug fixes.lloyd2013-03-278-51/+210
| | |
* | | Convert OCB to new AEAD interfacelloyd2013-03-275-163/+174
| | |
* | | Move GCM to new AEAD interfacelloyd2013-03-2713-193/+188
| | |
* | | Avoid silly warning under GCClloyd2013-03-271-1/+1
| | |
* | | Move EAX to new AEAD_Mode interfacelloyd2013-03-207-313/+327
| |/ |/|
* | In examples makefile, trust that g++ is C++11 capablelloyd2013-03-201-1/+1
| |
* | Update callerslloyd2013-03-203-7/+7
| |
* | Rename AEAD_Mode to AEAD_Filterlloyd2013-03-204-7/+7
| |
* | Missing BOTAN_DLL on AEAD_Modelloyd2013-03-191-1/+1
| |
* | Finish the note on removing Turing+WiderWAKElloyd2013-03-191-1/+2
| |
* | Remove the Turing and WiderWAKE4+1 stream cipher implementations.lloyd2013-03-1912-2408/+6
| | | | | | | | Both never saw much deployment or analysis.
* | Use env to work around Arch sillinesslloyd2013-03-191-1/+1
| |
* | merge of '507b3e6cace11c83363cfa3d9b9698930740311b'lloyd2013-03-192-9/+8
|\| | | | | | | and '5634ca1b4973ae922d693de7edd0f3f966ad72d5'
| * Make more links httpslloyd2013-03-182-9/+8
| |
* | Add an interface to Keyed_Filter returning a Key_Length_Specificationlloyd2013-03-1715-63/+47
|/ | | | | so the full details of what keylength(s) the filter supports are now available.
* Move ghash functions to anon namespacelloyd2013-03-171-0/+4
|
* Move all AEAD modes to src/filters/aeadlloyd2013-03-1711-1/+0
|
* Move compression filters to subfolderlloyd2013-03-179-0/+0
|
* Support for non-CBC modes in ciphersuite list genlloyd2013-03-161-4/+23
|
* Add get_aead in lookup.hlloyd2013-03-163-0/+27
|
* Relnote GCM supportlloyd2013-03-162-4/+4
|
* propagate from branch 'net.randombit.botan.aead-modes' (head ↵lloyd2013-03-169-35/+505
|\ | | | | | | | | | | 9f75a9bcacc77447b2916104f0ccbabd2c93b516) to branch 'net.randombit.botan' (head 9e94d89357c08ffc5f7cb5cc3e86c755da96ca8e)
| * Working GCM. Add support for AEAD modes in self testslloyd2013-03-167-114/+172
| |
| * Some work towards a (very slow) GCM implementationlloyd2013-03-165-0/+412
| | | | | | | | | | Does not currently work due to some error in ghash, likely a misunderstanding of the field representation.
* | Add the script that generates the switch in tls_suite_info.cpplloyd2013-03-162-1/+126
| |
* | Relnote adding OCBlloyd2013-03-162-5/+8
|/
* Convert EAX to using Buffered_Filter and new AEAD interfacelloyd2013-03-164-205/+114
|
* Save most of the block cipher calls used when setting the nonce in OCBlloyd2013-03-162-37/+59
| | | | | | by avoiding recomputing stretch if the previous value works. This greatly reduces the cost of using OCB when only the lowest bits of the nonce value are changing (as when using a counter).
* Parallel OCB decryptionlloyd2013-03-161-10/+34
|
* Avoid really needless allocationslloyd2013-03-161-2/+1
|
* OCB encryption can encrypt blocks in parallel nowlloyd2013-03-161-11/+11
|
* propagate from branch 'net.randombit.botan' (head ↵lloyd2013-03-1612-3/+845
|\ | | | | | | | | | | 039c91aa543bad85f227e8127ed048f9005e2fa0) to branch 'net.randombit.botan.aead-modes' (head 97d8d24b545f18084e39bf928c174c45efbb63bd)
| * In OCB encrypt, XOR multiple plaintext blocks and fold at the endlloyd2013-03-161-17/+30
| |
| * Make OCB_Base constructor privatelloyd2013-03-161-10/+11
| |
| * Move std::vector operator^= to xor_buflloyd2013-03-152-41/+43
| | | | | | | | Some prep work for parallel encrypt
| * Make parallel processing possible by buffering more than one blocklloyd2013-03-152-41/+64
| | | | | | | | | | | | and handling possible extra full blocks in end_msg Add a constant OCB_Mode::BS == 16 for readability.