aboutsummaryrefslogtreecommitdiffstats
path: root/doc/log.txt
Commit message (Collapse)AuthorAgeFilesLines
* Document adding SSL/TLSlloyd2010-02-241-0/+1
|
* Document adding GOST 34.10-2001lloyd2010-02-241-0/+1
|
* Document removal of TR1 dependencylloyd2010-02-241-1/+1
|
* Document removing TR1 dependency for ECClloyd2010-02-231-0/+1
|
* Further passhash changes before release and things have to belloyd2010-02-051-1/+1
| | | | | | | | | | | | | | finalized. Move header to passhash9.h and rename the functions to be passhash9 specific ({generator,check}_passhash9) Add an algorithm identifer field. Currently only id 0 is defined, for HMAC(SHA-1), but this opens up for using HMAC(SHA-512) or HMAC(SHA-3) or CMAC(Blowfish) or whatever in the future if necessary. Increase the salt size to 96 bits and the PRF output size to 192 bits. Document in api.tex
* MD4's M buffer was set to be 48 words instead of 16. This had beenlloyd2010-02-031-0/+1
| | | | | | | | | | | | | | extant for a long long time and was never caught because until recently the code did not depend on M.size(). However with the recent loadstore changes that use memcpy to load the entire array in one shot, an extra 128 bytes of memory would be read (but not used) in each iteration. This probably did not cause any problems except for Valgrind warnings, though in some situations it would be possible for the M buffer and MDx_HashFunctions buffer to be close enough that memcpy would be called with overlapping regions, which could cause arbitrarily weird failures since memcpy is allowed to assume they do not overlap.
* Password hashing is a pretty useful service, really. Move the guts oflloyd2010-02-011-0/+1
| | | | | | | | the passhash example to the library. Support variable work factors; default work factor of 10 takes about half a second to do one password on my Core2. Switch to using SHA-512 instead of SHA-1 in PBKDF2. To keep the output evenly sized for base64 purposes, reduce PBKDF2 output size by one byte (to 112 bits).
* Document S2K changelloyd2010-02-011-0/+1
|
* Prevent a crash in GMP_Engine if the library is shutdown and thenlloyd2010-01-221-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | | reinitialized. It would cache an Allocator pointer on first use, and then never zero it, so after the reinit the pointer would be going to a now deallocated Allocator object. Encountered in the SoftHSM test suite, reported by Ondrej Sury. Use a simple reference counting scheme to zero the pointer, and reset the GNU MP memory functions. This also fixes a quite obscure and never reported bug, that if the GMP engine was used, and if the library was deinitialized but then the program tried to use GNU MP, the allocator functions would crash. Now after deinit the allocator funcs revert to the defaults. The reference count is not updated atomically so this is not thread safe, but seems a non-issue; the only time this could happen (especially now that the GMP engine header is internal-only) is if multiple threads were attempting to initialize / shutdown the library at once - which won't work anyway for a variety of reasons, including contention on the (unlocked) global_lib_state pointer. If at some point thread safety is useful here, the refcnt can be locked by a mutex, or kept in an atomic<unsigned int>.
* Add SQLite3 encryption codec, contributed by Olivier de Gaalon. Useslloyd2010-01-221-0/+1
| | | | Twofish in XTS mode for encryption by default, but is easily tweakable.
* Add SIMD version of Noekeon. On a Core2, about 2.7x faster using SIMD_SSE2lloyd2010-01-121-0/+1
| | | | and 1.6x faster using SIMD_Scalar.
* Add block cipher cascadelloyd2010-01-111-0/+1
|
* Document CBC/XTS parallel capabilitieslloyd2009-12-281-0/+2
|
* Document private key encryption switch from 3DES to AES-256lloyd2009-12-261-0/+1
|
* Add last nights project, an SSE2 implementation of IDEA. Right about 4xlloyd2009-12-231-2/+3
| | | | faster than the scalar version on a Core2.
* Document timer changeslloyd2009-12-221-0/+2
|
* Make many more headers internal-only.lloyd2009-12-161-0/+1
| | | | | | | | | | | | | Fixes for the amalgamation generator for internal headers. Remove BOTAN_DLL exporting macros from all internal-only headers; the classes/functions there don't need to be exported, and avoiding the PIC/GOT indirection can be a big win. Add missing BOTAN_DLLs where necessary, mostly gfpmath and cvc For GCC, use -fvisibility=hidden and set BOTAN_DLL to the visibility __attribute__ to export those classes/functions.
* Full working amalgamation build, plus internal-only headers concept.lloyd2009-12-161-0/+1
|
* Mention the Win32 build and installer improvementslloyd2009-11-241-0/+2
|
* Update version # to 1.9.4-devlloyd2009-11-231-0/+2
|
* Document Win32 DLL and InnoSetup changes1.9.3lloyd2009-11-201-0/+2
|
* Update log and readme for 1.9.3 release 2009-11-19lloyd2009-11-201-1/+1
|
* Document adding FPElloyd2009-11-131-0/+1
|
* Double the speed of Skipjack on my Core2, mostly due to better inlining.lloyd2009-11-111-0/+1
|
* Add AES-192 using AES-NI. Tested OK with Intel's simulator.lloyd2009-11-101-1/+1
| | | | | | | Currently requires SSE4.1 for _mm_extract_epi32 for the key schedule, it would be nice to remove this dependency, though all currently known/scheduled chips with AES-NI (Intel Westmere and Sandy Bridge, and AMD Bulldozer) are supposed to include SSE 4.1 so this is not a huge problem.
* Fix errors in the AES-256 key schedule for the AES-NI version. Now passeslloyd2009-11-101-1/+1
| | | | | | | | | tests under Intel's emulator. Document and enable in the engine. Merge both versions to aes_intel.cpp - some shared code and much similiar structure which might be sharable via macros.
* Make the AES implementation using Intel's AES instruction extension official;lloyd2009-11-101-0/+1
| | | | testing with Intel's emulator shows all green.
* In creating X.509 certificates and PKCS #10 requests, let (actually: require)lloyd2009-11-091-0/+1
| | | | | | | the user to specify the hash function to use, instead of always using SHA-1. This was a sensible default a few years ago, when there wasn't a ~2^60 attack on SHA-1 and support for SHA-2 was pretty much nil, but using something else makes a lot more sense these days.
* Tick to 1.9.3-devlloyd2009-11-061-0/+3
| | | | | Rename BOTAN_UNALIGNED_LOADSTOR_OK to BOTAN_UNALIGNED_MEMORY_ACCESS_OK which is somewhat more clear as to the point.
* propagate from branch 'net.randombit.botan.1_8' (head ↵1.9.2lloyd2009-11-031-1/+2
|\ | | | | | | | | | | a101c8c86b755a666c72baf03154230e09e0667e) to branch 'net.randombit.botan' (head 948905e3872b6f5904686533c6aa87d38ff90a71)
| * Update docs for 1.8.8 release 2009-11-031.8.8lloyd2009-11-031-1/+2
| |
* | Update for 1.9.2 release 2009-11-03lloyd2009-11-031-1/+1
| |
* | Fix cpuid with icc (tested with 11.1)lloyd2009-10-291-0/+3
| | | | | | | | | | Document SHA optimizations, AltiVec runtime checking, fixes for cpuid for both icc and msvc.
* | propagate from branch 'net.randombit.botan' (head ↵lloyd2009-10-291-0/+2
|\ \ | | | | | | | | | | | | | | | 8fb69dd1c599ada1008c4cab2a6d502cbcc468e0) to branch 'net.randombit.botan.general-simd' (head c05c9a6d398659891fb8cca170ed514ea7e6476d)
| * | Document SIMD changeslloyd2009-10-281-0/+2
| | |
* | | propagate from branch 'net.randombit.botan.1_8' (head ↵lloyd2009-10-281-0/+25
|\| | | |/ |/| | | | | | | 3158f8272a3582dd44dfb771665eb71f7d005339) to branch 'net.randombit.botan' (head bf629b13dd132b263e76a72b7eca0f7e4ab19aac)
| * Add missing log note for 1.9.1 change notes on CTR/OFB changelloyd2009-10-281-0/+1
| |
| * Tick version to 1.9.2-devlloyd2009-10-261-0/+2
| |
| * Update docs for 1.9.1 release 2009-10-231.9.1lloyd2009-10-231-1/+2
| |
| * Note removing exception specs. Reorder by interestingnesslloyd2009-10-221-2/+3
| |
| * Reset version as 1.9.1-dev instead of -rc1lloyd2009-10-211-1/+1
| |
| * Document Clang supportlloyd2009-10-191-1/+1
| |
| * Bump version to 1.9.1-rc1lloyd2009-10-091-1/+1
| |
| * Fix python install target. Add CryptoBox wrapper plus an examplelloyd2009-10-091-0/+1
| |
| * Add support for GNU/Hurdlloyd2009-10-071-0/+1
| |
| * Document other changes in 1.9.1-prelloyd2009-10-071-0/+2
| |
| * Add an implementation of threshold secret sharing from draft-mcgrew-tss-02lloyd2009-10-061-2/+3
| |
| * merge of '1efb42e84eca9e01edd7b7f1335af7011eab994c'lloyd2009-09-251-0/+1
| |\ | | | | | | | | | and 'bb55abb64b64ca63aeb361db40c6bc4692d4ce48'
| | * Add runtime cpuid support. Check in the SSE2 engine that SSE2 is actuallylloyd2009-09-251-0/+1
| | | | | | | | | | | | existing on the current CPU before returning an object.
| * | Update the implementation of Blue Midnight Wish to use the Round 2 tweakedlloyd2009-09-211-1/+1
| |/ | | | | | | version.