aboutsummaryrefslogtreecommitdiffstats
path: root/doc/news.rst
Commit message (Collapse)AuthorAgeFilesLines
* Export mgf1_mask GH #380Jack Lloyd2015-12-251-0/+2
|
* Guard all std::mem* ops against any call with zero length.Jack Lloyd2015-12-251-0/+11
| | | | | | | | | | Calling memset, memmove, memcpy with an undefined or null pointer, even with length zero, causes undefined behavior. Prevent that from happening within the functions that call these dangerous things since allowing a caller to pass length == 0 with null or just past the end and not have things explode is nice. Oh C, you so crazy.
* Add TPM v1.2 support (RSA keygen/signing, RNG)Jack Lloyd2015-12-191-1/+5
|
* Merge pull request #370 from neusdan/rdseedJack Lloyd2015-12-191-0/+2
|\ | | | | Add support for Intel RdSeed instruction
| * add support for Intel RdSeedDaniel Neus2015-12-181-0/+2
| |
* | CLI rewriteJack Lloyd2015-12-191-2/+6
|/ | | | | | | | | | | | | | | | | | The command line tools' origin as a collection of examples and test programs glued together led to some unfortunate problems; lots of hardcoded values, missing parameters, and obsolete crypto. Adds a small library for writing command line programs of the sort needed here (cli.h), which cuts the length of many of the commands in half and makes commands more pleasant to write and extend. Generalizes a lot of the commands also, eg previously only signing/verification with DSA/SHA-1 was included! Removes the fuzzer entry point since that's fairly useless outside of an instrumented build. Removes the in-library API for benchmarking.
* Enable RdRand on Windows/MSVCDaniel Neus2015-12-161-0/+2
|
* Bump version to 1.11.26-preJack Lloyd2015-12-111-0/+8
|
* 1.11.25 release1.11.25Jack Lloyd2015-12-071-4/+14
|
* Remove support for broken 112 and 128 bit SECP ECC groups.Jack Lloyd2015-12-021-0/+3
|
* Improve side channel attack resistance of table based AES implJack Lloyd2015-11-291-1/+7
|
* Updates for news, readmeJack Lloyd2015-11-241-9/+8
| | | | [ci skip]
* Fix bug causing TLS client to sometimes reject DHE server kexJack Lloyd2015-11-131-0/+4
| | | | | | Re-encoding the server key exchange meant that any leading zeros in the values for DHE (or SRP) would be stripped out. This would cause the signature check to fail.
* Add remove_all to TLS session manager interfaceJack Lloyd2015-11-131-0/+2
| | | | DB::spin now returns the number of rows affected
* Add TLS_PSK testsJack Lloyd2015-11-131-0/+8
| | | | | | | | | | | Fix a bug which rejected any short server key exchanges. These can occur with a plain PSK with short or empty identity hints. Disable SHA-224 by default. Remove some vestigal RC4 cruft. Push more on the TLS corruption tests.
* Update and consolidate the test framework.Jack Lloyd2015-11-111-2/+13
| | | | | | | | | | | The tests previously had used 4 to 6 different schemes internally (the vec file reader framework, Catch, the old InSiTo Boost.Test tests, the PK/BigInt tests which escaped the rewrite in 1.11.7, plus a number of one-offs). Converge on a design that works everywhere, and update all the things. Fix also a few bugs found by the test changes: SHA-512-256 name incorrect, OpenSSL RC4 name incorrect, signature of FFI function botan_pubkey_destroy was wrong.
* Tick version to 1.11.25Jack Lloyd2015-11-041-0/+5
|
* Correct 1.11.24 release dateJack Lloyd2015-11-041-1/+1
| | | | [ci skip]
* Add check for path validation result in Credentials_Manager. GH #324Jack Lloyd2015-11-041-0/+6
|
* Update newsJack Lloyd2015-10-271-0/+6
| | | | [ci skip]
* Tick version to 1.11.23Jack Lloyd2015-10-271-0/+7
| | | | [ci skip]
* Update for 1.11.23 release1.11.23Jack Lloyd2015-10-261-1/+6
| | | | [ci skip]
* 1.11.22 release1.11.22Jack Lloyd2015-10-261-7/+19
|
* TLS improvementsJack Lloyd2015-10-251-0/+2
| | | | | | | | | | | | | | Use constant time operations when checking CBC padding in TLS decryption Fix a bug in decoding ClientHellos that prevented DTLS rehandshakes from working: on decode the session id and hello cookie would be swapped, causing confusion between client and server. Various changes in the service of finding the above DTLS bug that should have been done before now anyway - better control of handshake timeouts (via TLS::Policy), better reporting of handshake state in the case of an error, and finally expose the facility for per-message application callbacks.
* Make Montgomery reduction constant time.Jack Lloyd2015-10-241-2/+6
| | | | | | | | | | | | | | It was already close, but the carry loop would break early and selecting which value to copy out was indexed on the borrow bit. Have the carry loop run through, and add a const-time conditional copy operation and use that to copy the output. Convert ct_utils to CT namespace. Templatize the utils, which I was hesitant to do initially but is pretty useful when dealing with arbitrary word sizes. Remove the poison macros, replace with inline funcs which reads cleaner at the call site.
* Make PKCS #1 and OAEP decoding constant time to avoid oracle attacksJack Lloyd2015-10-161-0/+17
| | | | | | | | via timing channels. Add annotations for checking constant-time code using ctgrind to PKCS #1 and OAEP, as well as IDEA and Curve25519 which were already written as constant time code.
* Add prime and dl_group command line tools.Jack Lloyd2015-10-151-0/+2
| | | | | | Some cleanups in random_prime. Increase probability in prime tests from 1/2**64 to 1/2**128. Also break out of the sieve loop early if it has failed.
* Prohibit creating a DL_Group smaller than 1024 bitsJack Lloyd2015-10-151-1/+3
|
* Periodically reinitialize the blinding sequence instead of alwaysJack Lloyd2015-10-151-4/+14
| | | | deriving it by squaring the previous value.
* Add support for RSA signing and verification via OpenSSLJack Lloyd2015-10-141-0/+6
|
* Add `--minimized-build` which does the same thing as `--no-autoload`Jack Lloyd2015-10-141-0/+2
| | | | | but the meaning of the option is probably easier to understand with this name.
* Tick version on trunk to 1.11.22Jack Lloyd2015-10-111-0/+4
|
* Update for 1.11.21 release1.11.21Jack Lloyd2015-10-111-1/+1
| | | | [ci skip]
* Update change notes for 1.11.21Jack Lloyd2015-09-301-0/+18
| | | | [ci skip]
* Move contrib/sqlite to github.com/randombit/botan-sqliteJack Lloyd2015-09-211-0/+3
|
* Remove the Perl XS moduleJack Lloyd2015-09-211-0/+2
|
* Remove OCaml wrapper, moved to randombit/botan-ocamlJack Lloyd2015-09-211-0/+3
|
* Bump version to 1.11.21(-pre)Jack Lloyd2015-09-101-0/+3
| | | | [ci skip]
* Update for 1.11.20 release1.11.20Jack Lloyd2015-09-071-6/+7
|
* Add release notes from Github tickets for 1.11.20Simon Warta2015-09-061-1/+23
| | | | [ci skip]
* Add missing Botan 1.11.19 release notesSimon Warta2015-09-031-1/+17
| | | | [ci skip]
* Reverse the algorithm priority orderingJack Lloyd2015-08-291-0/+7
| | | | | | Previously 0 was the highest priority and 255 was the lowest. But this is really quite confusing, instead treat 0 as lowest and 255 as highest so normal integer intuitions apply.
* Add ECDSA provider using OpenSSLJack Lloyd2015-08-281-1/+3
| | | | | Unfortunately the signer cannot be tested in current framework because OpenSSL does not use RFC 6979 deterministic signatures.
* Add soname_patternSimon Warta2015-08-241-0/+3
| | | | Fixes #241
* Bump versionJack Lloyd2015-08-211-0/+6
|
* Add CVE ids to release notesJack Lloyd2015-08-041-10/+16
|
* 1.11.19 release1.11.19Jack Lloyd2015-08-031-6/+28
|
* Fix two crashes in the BER decoder found with afl.Jack Lloyd2015-08-021-0/+10
| | | | | One a read at 0 of an empty vector, the other causing allocation of an arbitrary amount of memory.
* Put TLS heartbeat on notice. GH #187Jack Lloyd2015-07-251-0/+4
|
* Remove the x86 asm versions of MD4, MD5, SHA-1 and SerpentJack Lloyd2015-07-251-1/+7
| | | | | | | With modern compilers, all are slower than the C++ and SSE2 versions of the same algos. GH #216