index
:
botan.git
master
Unnamed repository; edit this file 'description' to name the repository.
about
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
src
/
tests
/
data
Commit message (
Expand
)
Author
Age
Files
Lines
*
Handle PPC crypto bit in tests [ci skip]
Jack Lloyd
2018-10-01
1
-1
/
+1
*
Add more tests for CBC, CFB, OFB, CTR and GCM
Jack Lloyd
2018-09-29
5
-0
/
+617
*
Refactor mode tests, and correct bugs found
Jack Lloyd
2018-09-29
1
-7
/
+5
*
Spell check the documentation
Jack Lloyd
2018-09-28
1
-1
/
+1
*
Fix a crash in the mode padding fuzzer
Jack Lloyd
2018-09-23
1
-0
/
+3
*
Add fuzzer for mode unpadding, and fix bugs found thereby
Jack Lloyd
2018-09-22
1
-0
/
+89
*
Create proper KATs for cryptobox function
Jack Lloyd
2018-09-12
1
-0
/
+92
*
Support SM2 raw signatures
Jack Lloyd
2018-09-09
1
-0
/
+9
*
Merge GH #1678 Add read_kv utility function
Jack Lloyd
2018-09-09
1
-0
/
+50
|
\
|
*
Add read_kv for parsing strings with key/value pairs
Jack Lloyd
2018-09-09
1
-0
/
+50
*
|
Increase minimum Blowfish key length to 64 bits
Jack Lloyd
2018-09-07
1
-6
/
+10
|
/
*
Check PSS salt length during verification
Jack Lloyd
2018-08-30
1
-1
/
+1
*
Correct order of CPUID bit clearings
Jack Lloyd
2018-08-26
5
-5
/
+5
*
Add AVX2 version of ChaCha
Jack Lloyd
2018-08-26
1
-1
/
+1
*
Add avx2 tag to Serpent test data
Jack Lloyd
2018-08-24
1
-1
/
+1
*
If cert extension parsing fails, replace the object with Unknown
Jack Lloyd
2018-08-23
1
-1
/
+1
*
Merge GH #1651 Default disable TLS v1.0/v1.1 and CBC+CCM suites
Jack Lloyd
2018-08-23
2
-4
/
+4
|
\
|
*
Default disable support for TLS v1.0/v1.1 and all CBC and CCM suites
Jack Lloyd
2018-08-22
2
-4
/
+4
*
|
Simplify exception messages
Jack Lloyd
2018-08-22
9
-36
/
+36
|
/
*
Regenerate xchacha20poly1305-testvectors
Simon Warta
2018-08-19
1
-676
/
+676
*
Add some tests of HMAC with SHA-3
Jack Lloyd
2018-08-17
1
-0
/
+134
*
Add XChaCha20Poly1305 test vectors generated by libsodium
Simon Warta
2018-08-13
1
-0
/
+9362
*
Optimize computation of CTR input blocks
Jack Lloyd
2018-08-10
1
-1
/
+1
*
Add a test of Threefish-512 tweak functionality
Jack Lloyd
2018-08-08
1
-0
/
+5
*
Add support for XChaCha20Poly1305
Jack Lloyd
2018-08-07
1
-0
/
+47
*
Add support for XChaCha
Jack Lloyd
2018-08-07
1
-0
/
+19
*
Fix a bug in XSalsa20
Jack Lloyd
2018-08-07
1
-1
/
+0
*
Accept PKCS1v15 as an alias for EMSA3
Jack Lloyd
2018-08-02
1
-1
/
+1
*
Add a couple HMAC(SHA-512-256) test vectors
Jack Lloyd
2018-08-01
1
-0
/
+11
*
Add Lucas test from FIPS 186-4
Jack Lloyd
2018-07-31
2
-0
/
+33
*
Add additional HMAC tests from RFC 4231
Jack Lloyd
2018-07-24
1
-0
/
+81
*
Fix error in CCM when L=8
Jack Lloyd
2018-07-18
1
-0
/
+124
*
Support salts other than exactly 16 bytes for Blowfish key setup
Jack Lloyd
2018-07-18
1
-0
/
+46
*
Add support for ARMv8 SM4 instructions
Jack Lloyd
2018-07-09
1
-0
/
+12
*
Add a timing check for modular exponentiation
Jack Lloyd
2018-06-30
1
-0
/
+3
*
Support bcrypt 2b and 2y
Jack Lloyd
2018-06-29
1
-0
/
+11
*
Fix handling of SHA instructions in tests
Jack Lloyd
2018-06-29
3
-2
/
+4
*
Fix error in 1024-bit polynomial double
Jack Lloyd
2018-06-25
1
-0
/
+5
*
TLS would try to negotiate x25519 even if disabled
Jack Lloyd
2018-06-15
3
-3
/
+3
*
Add 192-bit Suite B policy
Jack Lloyd
2018-06-14
2
-0
/
+22
*
Improve error reporting on unexpected EOF when decoding ASN
Jack Lloyd
2018-06-08
1
-1
/
+1
*
Remove stray header in vector file [ci skip]
Jack Lloyd
2018-06-01
1
-2
/
+0
*
Merge GH #1594 Add EdDSA/X25519 Wycheproof tests
Jack Lloyd
2018-05-31
3
-1
/
+793
|
\
|
*
Add EdDSA and X25519 tests from Wycheproof
Jack Lloyd
2018-05-31
3
-1
/
+793
*
|
Merge GH #1594 Add ECDSA Wycheproof tests
Jack Lloyd
2018-05-31
1
-0
/
+13649
|
\
\
|
*
|
Add ECDSA tests from Wycheproof
Jack Lloyd
2018-05-31
1
-0
/
+13649
|
|
/
*
/
Create unit tests for Base32 encoding
Wambou
2018-05-31
1
-0
/
+79
|
/
*
Add BMI2-specific SHA-256
Jack Lloyd
2018-05-27
1
-1
/
+1
*
Improve error message on BER decoding error
Jack Lloyd
2018-05-24
1
-2
/
+2
*
Fixes for DES/3DES
Jack Lloyd
2018-05-16
1
-16
/
+4
[next]