Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Update news | Jack Lloyd | 2017-09-08 | 1 | -0/+22 |
| | | | | [ci skip] | ||||
* | Update news | Jack Lloyd | 2017-09-03 | 1 | -1/+11 |
| | |||||
* | Update news | Jack Lloyd | 2017-08-31 | 1 | -2/+11 |
| | |||||
* | Update news | Jack Lloyd | 2017-08-29 | 1 | -0/+5 |
| | |||||
* | Update docs | Jack Lloyd | 2017-08-23 | 1 | -0/+2 |
| | |||||
* | Fix bug affecting AltiVec on ppc64le processors | Jack Lloyd | 2017-08-23 | 1 | -0/+3 |
| | |||||
* | Fix Altivec detection | Jack Lloyd | 2017-08-22 | 1 | -0/+2 |
| | | | | Broken in c3ae43c04c | ||||
* | Add support for ECDHE_PSK AEAD ciphersuites | Jack Lloyd | 2017-08-22 | 1 | -0/+3 |
| | | | | From draft-ietf-tls-ecdhe-psk-aead-05, now with official codepoints. | ||||
* | Update news | Jack Lloyd | 2017-08-22 | 1 | -0/+5 |
| | |||||
* | Update news | Jack Lloyd | 2017-08-16 | 1 | -7/+19 |
| | |||||
* | Update FFI version | Jack Lloyd | 2017-08-15 | 1 | -0/+3 |
| | | | | | | | Also fix botan_ffi_supports_api to return true for any supported version (2.0, 2.1/2.2, and 2.3). Really 2.2 should have had its own FFI version code since there were already many FFI API additions in that release. | ||||
* | Update version to 2.3.0, add release notes | Jack Lloyd | 2017-08-15 | 1 | -0/+16 |
| | |||||
* | Update for 2.2.0 release2.2.0 | Jack Lloyd | 2017-08-07 | 1 | -1/+1 |
| | |||||
* | Update news | Jack Lloyd | 2017-08-07 | 1 | -2/+14 |
| | |||||
* | Update news and todo | Jack Lloyd | 2017-08-04 | 1 | -0/+6 |
| | | | | [ci skip] | ||||
* | Additional news entries | Jack Lloyd | 2017-07-31 | 1 | -0/+4 |
| | |||||
* | Fix failure to fully zero memory before free | Jack Lloyd | 2017-07-16 | 1 | -0/+3 |
| | | | | | | Introduced in 455bd2557cbb1343e59eefd97cb449f06a702c28 Found and reported by Roman Pozlevich | ||||
* | Update news | Jack Lloyd | 2017-07-03 | 1 | -0/+7 |
| | |||||
* | Update news | Jack Lloyd | 2017-06-30 | 1 | -0/+4 |
| | |||||
* | Update news | Jack Lloyd | 2017-06-21 | 1 | -0/+5 |
| | |||||
* | Update news | Jack Lloyd | 2017-06-09 | 1 | -6/+8 |
| | |||||
* | Update news | Jack Lloyd | 2017-05-22 | 1 | -1/+23 |
| | | | | [ci skip] | ||||
* | Update 2.2.0 news entry | Jack Lloyd | 2017-05-18 | 1 | -2/+21 |
| | | | | [ci skip] | ||||
* | Merge GH #1000 Support seeking in CTR mode | Jack Lloyd | 2017-04-27 | 1 | -0/+2 |
|\ | |||||
| * | add a line to news.rst | René Meusel | 2017-04-13 | 1 | -0/+2 |
| | | |||||
* | | Remove bogus news entry | Jack Lloyd | 2017-04-13 | 1 | -2/+0 |
| | | | | | | | | The bug mentioned never affected any released version. | ||||
* | | Update 2.2 release notes | Jack Lloyd | 2017-04-13 | 1 | -1/+15 |
|/ | |||||
* | fix missing flush in DataSink_Stream::end_msg | Philippe Lieser | 2017-04-10 | 1 | -0/+2 |
| | |||||
* | Tick version on master to 2.2-pre | Jack Lloyd | 2017-04-05 | 1 | -4/+8 |
| | | | | Create new release note block | ||||
* | Merge GH #966 Add SM3 hash function | Jack Lloyd | 2017-04-05 | 1 | -0/+2 |
|\ | |||||
| * | Add SM3 hash function | Daniel Wyatt | 2017-04-03 | 1 | -0/+2 |
| | | |||||
* | | Update for 2.1.0 and 1.10.16 releases | Jack Lloyd | 2017-04-04 | 1 | -1/+1 |
| | | |||||
* | | More news updates | Jack Lloyd | 2017-04-04 | 1 | -2/+11 |
| | | |||||
* | | Update release notes | Jack Lloyd | 2017-04-04 | 1 | -15/+38 |
|/ | | | | [ci skip] | ||||
* | Update releases notes for 2.1.0 | Daniel Neus | 2017-03-29 | 1 | -0/+14 |
| | |||||
* | Update release notes | Jack Lloyd | 2017-03-28 | 1 | -0/+15 |
| | | | | [ci skip] | ||||
* | Add relnotes and CVE | Jack Lloyd | 2017-03-24 | 1 | -0/+4 |
| | |||||
* | Release notes for Botan 2.1 | Jack Lloyd | 2017-03-23 | 1 | -0/+50 |
| | | | | | | GH #866 [ci skip] | ||||
* | Update news for 1.10.15 release | Jack Lloyd | 2017-01-12 | 1 | -0/+9 |
| | | | | [ci skip] | ||||
* | Update news for 2.0.1 release2.0.1 | Jack Lloyd | 2017-01-09 | 1 | -0/+19 |
| | |||||
* | Update for 2.0.0 release2.0.0 | Jack Lloyd | 2017-01-06 | 1 | -1/+1 |
| | |||||
* | Update release notes | Jack Lloyd | 2017-01-06 | 1 | -0/+22 |
| | | | | [ci skip] | ||||
* | Update roadmap, add support and versioning info | Jack Lloyd | 2017-01-03 | 1 | -1/+1 |
| | | | | [ci skip] | ||||
* | Remove SRP6 file support | Jack Lloyd | 2016-12-31 | 1 | -0/+6 |
| | | | | | | | | | | | | | It turns out SRP6 files use a different base64 alphabet than standard, and additionally Botan's decoding of the group id seems wrong though I haven't verified this second was a bug. In any case this code couldn't parse anything it was supposed to and never could. I had already planned on adding a database backed SRP store and removing this code but the fact that it's actually not functional for purpose suggests it's best to remove this now rather than let someone chance upon it and be endlessly frustrated that it doesn't seem to work because all the verifiers are garbled. | ||||
* | Increase default TLS DH min to 2048 bits, and add BSI policy class. | Jack Lloyd | 2016-12-30 | 1 | -0/+4 |
| | | | | | Moves BSI policy file to test data dir where it can be compared with what the hardcoded class outputs. | ||||
* | Increase Path_Validation_Restrictions default min strength to 110 | Jack Lloyd | 2016-12-27 | 1 | -0/+6 |
| | | | | | Effectively disables 1024 bit RSA as well as SHA-1. Edit the tests where required to enable it again. | ||||
* | Add DL_Group tests | Jack Lloyd | 2016-12-23 | 1 | -11/+16 |
| | | | | | | | | | Fix a bug in how the 6144 and 8192 IETF MODP groups were encoded; they have g and q values switched. Fixed by just switching the PEM header to match the actual encoded format. Rename DL_Group::X942_DH_PARAMETERS to ANSI_X9_42_DH_PARAMETERS to avoid a macro conflict with Windows cryptography headers (GH #482) | ||||
* | Update release notes | Jack Lloyd | 2016-12-14 | 1 | -0/+8 |
| | | | | [ci skip] | ||||
* | Update 1.11.35 relnotes [ci skip] | Jack Lloyd | 2016-12-11 | 1 | -2/+6 |
| | |||||
* | Public_Key derived class ctors take an std::vector<byte> | René Korthaus | 2016-12-11 | 1 | -0/+4 |
| | | | | | | | Changes all the Public_Key derived classes ctors to take a std::vector instead of a secure_vector for the DER encoded public key bits. There is no point in transporting a public key in secure storage. (GH #768) |