aboutsummaryrefslogtreecommitdiffstats
path: root/include
Commit message (Collapse)AuthorAgeFilesLines
* Remove exception specifier from RandomNumberGenerator::randomizelloyd2008-06-181-1/+1
|
* Delete the public key filter classes. Advertised on the devel list previously:lloyd2008-06-162-82/+0
| | | | http://lists.randombit.net/pipermail/botan-devel/2008-June/000559.html
* Add missing BOTAN_DLL decl to SHA1PRNG class declarationlloyd2008-06-161-1/+1
|
* Move AlgorithmIdentifier comparison ops to alg_id.hlloyd2008-06-112-5/+8
|
* Avoid -Wshadow warningslloyd2008-06-111-5/+5
|
* X509_CA::{new_crl,update_crl} take a RandomNumberGenerator referencelloyd2008-06-111-3/+6
|
* X509::create_cert_req and X509::create_self_signed_cert take an RNG reflloyd2008-06-111-3/+6
|
* Modify X509_CA::make_cert and X509_CA::sign_request to take a RNG referencelloyd2008-06-111-0/+2
| | | | argument in favor of referencing the global PRNG argument
* Move the declaration of the RandomNumberGenerator base class from base.hlloyd2008-06-1014-36/+62
| | | | to rng.h (eventually base.h will be split up entirely and go away)
* Change PK_Signer::signature to take a RandomNumberGenerator referencelloyd2008-06-103-4/+8
| | | | instead of always using the global PRNG.
* PK_Encryptor::encrypt now takes a RandomNumberGenerator reference, insteadlloyd2008-06-102-5/+12
| | | | of using the global RNG object.
* Pass a RNG reference to the EMSA encoder functionslloyd2008-06-102-6/+24
|
* Pass RandomNumberGenerator references to public key operations that needlloyd2008-06-107-9/+19
| | | | | | | them (encrypt and sign), with the intent of slowly bubbling up the access points to the API level, at which point the application handles managing the RNG. This will allow removing the compiled-in global PRNG, and make testing much simpler.
* Check in the first import from InSiTo, SHA1PRNG, which implements thelloyd2008-06-071-1/+1
| | | | | Java SecureRandom PRNG algorithm. (I accidentally checked in the header in the previous revision).
* Make the contents of Botan_types namespace be just using declarations,lloyd2008-06-072-2/+42
| | | | instead of introducing new typedefs.
* Reindentlloyd2008-05-256-21/+20
|
* Add RandomNumberGenerator::next_byte, which just returns a single bytelloyd2008-05-251-0/+2
| | | | value from the RNG. (Would an adapter class be more appropriate?)
* Make the two parameters of Randpool (which underlying block cipher and MAClloyd2008-05-251-1/+1
| | | | to use) explicit arguments to the constructor instead of being hardcoded.
* Pass an RNG reference to EME::padlloyd2008-05-242-5/+14
| | | | PK_Encryptor_MR_with_EME::enc references the global PRNG currently
* Don't use the global PRNG in implementations of PBE::new_paramslloyd2008-05-242-3/+7
|
* Remove random_integer() and replace it with a BigInt constructor taking alloyd2008-05-242-1/+1
| | | | RandomNumberGenerator reference. Update all callers.
* Pass an RNG reference to IF_Corelloyd2008-05-241-1/+3
|
* Keypair::check_key no longer references global PRNGlloyd2008-05-241-2/+2
|
* Remove version of OctetString::change that used global PRNGlloyd2008-05-241-2/+1
|
* Avoid global RNG in S2K::new_random_salt (RNG reference passed as argument ↵lloyd2008-05-241-1/+1
| | | | instead)
* Pass a RNG reference to load_check and gen_check functionslloyd2008-05-241-3/+3
|
* Avoid using the global RNG in check_key, instead pass a reference.lloyd2008-05-248-10/+12
| | | | Update the examples
* Avoid using global rng in DL_Group::generate_dsa_primeslloyd2008-05-241-2/+6
|
* Previously random_integer and friends used the global PRNG object to getlloyd2008-05-2410-22/+37
| | | | | | | | | | | | | random bits. Now they take a reference to a RandomNumberGenerator object. This was applied several times out, so now the constructors to private key objects also take a RandomNumberGenerator& argument. This is also true for a number of randomized algorithms (Miller-Rabin, for instance). You can get a reference to the global PRNG with global_state().prng_reference() This is a provisional thing: and warning: it is not thread safe! If this is a problem instead keep per-thread PRNGs and pass them were needed.
* Remove both default arguments to the constructor of ANSI_X931_RNG.lloyd2008-05-241-1/+1
| | | | | | | | | | | | | | | | | | If the second argument was NULL, it would default to a new Randpool. But this introduces an annoying dependency: really it is the caller who is relying on Randpool. Make this explicit by passing a new Randpool pointer to the constructor in Library_State. This will break all callers using ANSI_X931_RNG's constructors with default arguments. To regain the previous behavior, change: ANSI_X931_RNG rng; ANSI_X931_RNG rng("/*cipher name*/"); to ANSI_X931_RNG rng(/*cipher name, default was AES-256 */, new Randpool); You are free to pass another PRNG object if you like. This make require inclusion of <botan/randpool.h>
* The BER decoder assumed that all constructed types would be tagged aslloyd2008-05-081-2/+2
| | | | | | | | | | | | universal: this prevented it from decoding application, context-specific, or private-class constructions. Add a new parameter to BER_Decoder::start_cons which specifies the expected class type (default universal). The decoder still verifies that the constructed bit is set in the class tag. This provides parity with the interface to the DER encoder. Problem was found and reported by Falko Strenzke
* Remove unused headerslloyd2008-05-041-6/+5
|
* Remove Config::option_as_time, instead call timespec_to_u32bit inlloyd2008-05-022-3/+2
| | | | each caller.
* Add a new function timespec_to_u32bit that handles a very simplisticlloyd2008-05-011-0/+2
| | | | | | time format and converts it to a duration in seconds represented as a u32bit. This is from Config::option_as_time, which is now implemented simply as: return timespec_to_u32bit(option(key))
* The ability to load ini-style files was removed almost 6 monthslloyd2008-04-301-2/+0
| | | | | ago, but the Config class still contained the declaration for load_inifile() - remove it.
* Remove unused include of <vector>lloyd2008-04-291-2/+1
|
* Instead of reading from the Config object every time to get the slack welloyd2008-04-291-0/+1
| | | | | | should allow when checking timestamps, just call it once and store the value in the X509_Store object, passing it to validity_check with a new argument for the allowed time slack.
* Move validity_check() into an anonymous namespace inside x509stor.cpp,lloyd2008-04-291-2/+0
| | | | as that was the only place it was called from.
* Move Signature_Format enum to pubkey.hlloyd2008-04-299-8/+8
| | | | | | | | Including enums.h in needed places since asn1_int.h doesn't pull it in anymore. Remove Config::choose_sig_format, and move its logic into its only caller, the (global!) choose_sig_format in x509_ca.cpp
* propagate from branch 'net.randombit.botan.remove-libstate' (head ↵lloyd2008-04-2913-191/+45
|\ | | | | | | | | | | d4d75cf4f682ec63e316b853617e7cf9ba093272) to branch 'net.randombit.botan' (head 2fac918f1a1cb77d155cf434177e443d41e9e517)
| * Move ASN1_Tag from enums.h to asn1_int.h. The enums.h header is a totallloyd2008-04-242-38/+37
| | | | | | | | | | | | grab back of stuff, most of which are not used outside of very specific contexts, and some only internally. I am thinking to remove it and put each individual enum in an appropriate header.
| * Remove stray character introduced during mergelloyd2008-04-241-1/+1
| |
| * Remove unused Pulse_Type enumlloyd2008-04-241-15/+0
| |
| * Add BOTAN_DLL to Timer class declarationlloyd2008-04-211-1/+1
| |
| * propagate from branch 'net.randombit.botan' (head ↵lloyd2008-04-2111-139/+9
| |\ | | | | | | | | | | | | | | | 51f9ee5180a5cacdfff31504266e883b7bb0eb00) to branch 'net.randombit.botan.remove-libstate' (head 636b767b9686261418b1cb45a6271edeef87501b)
| | * propagate from branch 'net.randombit.botan' (head ↵lloyd2008-04-1211-138/+8
| | |\ | | | | | | | | | | | | | | | | | | | | bcae6a19d8d96ebde33c832c76a130ea02bc923a) to branch 'net.randombit.botan.remove-libstate' (head f640991b6e433a264f5d22a08338cfc9c24c82da)
| | | * propagate from branch 'net.randombit.botan' (head ↵lloyd2008-04-1011-138/+8
| | | |\ | | | | | | | | | | | | | | | | | | | | | | | | | 6afe2db1f710f75bc27e189bb8bdb23613ce1ca3) to branch 'net.randombit.botan.remove-libstate' (head e40f0dbdfd847024c30fa0092c2acefc19a550b8)
| | | | * Remove the Global_RNG namespace, along with rng.h and rng.cpp. This waslloyd2008-04-073-33/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | essentially a facade for the RNG object living in the global library state. Rewrite all callers to directly invoke the global state object: this makes it more clear what functions are actually accessing mutable state outside of the normal reference graph (and thus, which functions will have to be altered in order to remove this dependency). Other facades remain in place for the configuration object and the memory allocator factory.
| | | | * Remove X509_GlobalState in favor of static function Extensions::get_extensionlloyd2008-04-073-40/+2
| | | | |
| | | | * propagate from branch 'net.randombit.botan' (head ↵lloyd2008-04-071-4/+2
| | | | |\ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | db3791f6bba4b57dd8aed17893565dc5bcd68f02) to branch 'net.randombit.botan.remove-libstate' (head 627d12447b2bb32aa08ff5daa499ac9580a77a05)