aboutsummaryrefslogtreecommitdiffstats
path: root/include
Commit message (Collapse)AuthorAgeFilesLines
* Missing BOTAN_DLL for XTEA, noted by Joel Lowlloyd2008-07-031-1/+1
|
* Remove the free-standing function deref_alias. It only served as a forwarderlloyd2008-06-301-5/+0
| | | | | | for the implementation in Library_State. Instead explicitly call deref_alias on global_state() wherever the old freestanding version was used. This serves to make (more) uses of the global state explicit rather than implicit.
* Remove unnecessary include of rng.hlloyd2008-06-301-1/+0
|
* Previously X509_Store took two configuration values from the librarylloyd2008-06-301-1/+3
| | | | | | | | | config state: how long successful validations should be cached, and the amount of slack to allow on time boundary checks. Now these are passed as arguments to the constructor, as a pair of 32-bit integers representing the number of seconds to allow as slack and the number of seconds to cache validations for. They default to the same compiled in defaults as before, 24 hours (86400 seconds) and 30 minutes (1800 seconds), respectively.
* Remove the Config class.lloyd2008-06-303-51/+14
| | | | | | | | In reality, Config was a singleton, with the only owner being the Library_State object. Theoretically one could create and use another Config instance, but in practice it was never done. Reflect the reality and inline the members and public functions of Config in Library_State, removing Config entirely.
* Remove global_config() - replace by direct calls to global_state()lloyd2008-06-302-5/+1
|
* Add interfaces for add_entropy_source and add_entropy tolloyd2008-06-282-1/+17
| | | | | | | | | | | RandomNumberGenerator, and make ANSI_X931_PRNG's implementations just forward the arguments to the underlying RNG. This allows seeding the RNG even if no entropy modules are loaded into the library. Also it allows actually adding user-specified data; to do it otherwise would require creating the RNG objects yourself and retaining a pointer to the Randpool, which is pretty bogus. Move Null_RNG to rng.h
* Change make_rng to be a static member of RandomNumberGeneratorlloyd2008-06-281-5/+2
|
* Include rng.h in botan.hlloyd2008-06-271-0/+1
|
* New structure for entropy sources + RNGs. The entropy sources are owned bylloyd2008-06-274-11/+17
| | | | | | | Randpool, it will query them as needed (or if asked to do so). New function make_rng() that creates an RNG (X9.31 backed by a Randpool) and seeds it. Remove the entropy source related code from the Modules/Builtin_Modules classes.
* Remove the global PRNG object as well as the global list of entropy sources.lloyd2008-06-272-17/+0
|
* Remove PRNG_Unseeded throw() specifies from the RNG randomize() functions.lloyd2008-06-272-2/+2
| | | | | | They were probably not a good idea. If nothing else, these functions might throw bad_alloc, and possibly other errors. Something broad like std::exception might be applicable, but that seems pointlessly broad.
* OctetString now requires a RandomNumberGenerator& to create a randomlloyd2008-06-271-1/+1
| | | | key or IV; it does not reference the global RNG.
* Reorganize the EMSA classes, and remove the last references to prng_referencelloyd2008-06-272-2/+12
| | | | in the library ccode.
* Remove load checking, as it requires an RNG (at least at the moment).lloyd2008-06-2710-19/+25
| | | | | | | | | Probably some variation of it will be added back in later, at least to do basic checks like that primes are really odd (and we can do basic primality checks, etc, even with an RNG). Alternative: call check_key() manually on public keys you load with an RNG object.
* Split IF_Core constructor into two, one for public keys and one for private.lloyd2008-06-271-2/+5
| | | | Public version doesn't need an RNG argument.
* Remove SHA1PRNG for the moment, untillloyd2008-06-231-41/+0
| | | | | | | | | a) I am sure we really want to include this (proprietary, unanalyzed?) PRNG in Botan b) I have a chance to add test cases and clean up the code. Also note a few more changes in the changelog, and set a provisial release date for sometime in July.
* Similiar combining transform for the ElGamal, DSA, and NR private keylloyd2008-06-203-6/+7
| | | | constructors.
* Consolidate the two DH_PrivateKey constructors into a single one takinglloyd2008-06-201-2/+2
| | | | | a RNG reference, a group, and an (optional) private key. The public key is now always rederived from the private.
* Use RNG& argument for PKCS8::encrypt_key and PKCS8::PEM_encodelloyd2008-06-201-5/+12
|
* Convert pkcs8_decoder() and x509_decoder() to take a RandomNumberGenerator&lloyd2008-06-204-16/+27
| | | | | | | | reference, along with PKCS8::load_key get_pbe no longer calls new_params() on the newly instantiated instance, which is not backwards compatible (you have to either call new_params yourself, or explicitly set the iteration count, salt, etc)
* Pass RNG& to IF (RSA/RW) load hookslloyd2008-06-201-2/+2
|
* Pass a RandomNumberGenerator& to the PK_Core constructors and the variouslloyd2008-06-206-12/+16
| | | | public key object loading hooks.
* Remove exception specifier from RandomNumberGenerator::randomizelloyd2008-06-181-1/+1
|
* Delete the public key filter classes. Advertised on the devel list previously:lloyd2008-06-162-82/+0
| | | | http://lists.randombit.net/pipermail/botan-devel/2008-June/000559.html
* Add missing BOTAN_DLL decl to SHA1PRNG class declarationlloyd2008-06-161-1/+1
|
* Move AlgorithmIdentifier comparison ops to alg_id.hlloyd2008-06-112-5/+8
|
* Avoid -Wshadow warningslloyd2008-06-111-5/+5
|
* X509_CA::{new_crl,update_crl} take a RandomNumberGenerator referencelloyd2008-06-111-3/+6
|
* X509::create_cert_req and X509::create_self_signed_cert take an RNG reflloyd2008-06-111-3/+6
|
* Modify X509_CA::make_cert and X509_CA::sign_request to take a RNG referencelloyd2008-06-111-0/+2
| | | | argument in favor of referencing the global PRNG argument
* Move the declaration of the RandomNumberGenerator base class from base.hlloyd2008-06-1014-36/+62
| | | | to rng.h (eventually base.h will be split up entirely and go away)
* Change PK_Signer::signature to take a RandomNumberGenerator referencelloyd2008-06-103-4/+8
| | | | instead of always using the global PRNG.
* PK_Encryptor::encrypt now takes a RandomNumberGenerator reference, insteadlloyd2008-06-102-5/+12
| | | | of using the global RNG object.
* Pass a RNG reference to the EMSA encoder functionslloyd2008-06-102-6/+24
|
* Pass RandomNumberGenerator references to public key operations that needlloyd2008-06-107-9/+19
| | | | | | | them (encrypt and sign), with the intent of slowly bubbling up the access points to the API level, at which point the application handles managing the RNG. This will allow removing the compiled-in global PRNG, and make testing much simpler.
* Check in the first import from InSiTo, SHA1PRNG, which implements thelloyd2008-06-071-1/+1
| | | | | Java SecureRandom PRNG algorithm. (I accidentally checked in the header in the previous revision).
* Make the contents of Botan_types namespace be just using declarations,lloyd2008-06-072-2/+42
| | | | instead of introducing new typedefs.
* Reindentlloyd2008-05-256-21/+20
|
* Add RandomNumberGenerator::next_byte, which just returns a single bytelloyd2008-05-251-0/+2
| | | | value from the RNG. (Would an adapter class be more appropriate?)
* Make the two parameters of Randpool (which underlying block cipher and MAClloyd2008-05-251-1/+1
| | | | to use) explicit arguments to the constructor instead of being hardcoded.
* Pass an RNG reference to EME::padlloyd2008-05-242-5/+14
| | | | PK_Encryptor_MR_with_EME::enc references the global PRNG currently
* Don't use the global PRNG in implementations of PBE::new_paramslloyd2008-05-242-3/+7
|
* Remove random_integer() and replace it with a BigInt constructor taking alloyd2008-05-242-1/+1
| | | | RandomNumberGenerator reference. Update all callers.
* Pass an RNG reference to IF_Corelloyd2008-05-241-1/+3
|
* Keypair::check_key no longer references global PRNGlloyd2008-05-241-2/+2
|
* Remove version of OctetString::change that used global PRNGlloyd2008-05-241-2/+1
|
* Avoid global RNG in S2K::new_random_salt (RNG reference passed as argument ↵lloyd2008-05-241-1/+1
| | | | instead)
* Pass a RNG reference to load_check and gen_check functionslloyd2008-05-241-3/+3
|
* Avoid using the global RNG in check_key, instead pass a reference.lloyd2008-05-248-10/+12
| | | | Update the examples