Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Merge GH #1006 Fix FFI cipher interface (see also GH #1003) | Jack Lloyd | 2017-04-15 | 1 | -65/+205 |
|\ | |||||
| * | Add tests of GCM and CTR mode | Jack Lloyd | 2017-04-14 | 1 | -64/+205 |
| | | |||||
| * | Fix FFI cipher interface | Jack Lloyd | 2017-04-14 | 1 | -11/+10 |
| | | | | | | | | | | | | Was totally broken, when not encrypting in one shot. (GH #1003) Enable the test, which had been commented out :( | ||||
* | | Support for ElGamal in FFI interface | Krzysztof Kwiatkowski | 2017-04-14 | 1 | -0/+76 |
|/ | | | | | | * Adds `botan_pubkey_load_elgamal' and `botan_privkey_load_elgamal' functions to FFI interface. * Adds test `ffi_test_elgamal' | ||||
* | Merge GH #989 Avoid recursion in BER_Decoder::get_next_object | Jack Lloyd | 2017-04-13 | 1 | -0/+67 |
|\ | |||||
| * | Add test for OSS-Fuzz 813 | Jack Lloyd | 2017-04-13 | 1 | -0/+67 |
| | | |||||
* | | fix missing flush in DataSink_Stream::end_msg | Philippe Lieser | 2017-04-10 | 1 | -0/+27 |
|/ | |||||
* | Add another AES-128 CFB test | Jack Lloyd | 2017-04-08 | 1 | -0/+6 |
| | | | | | Generated by OpenSSL, I needed this to help test https://github.com/riboseinc/rnp/pull/48 | ||||
* | Merge GH #966 Add SM3 hash function | Jack Lloyd | 2017-04-05 | 1 | -0/+423 |
|\ | |||||
| * | Add more SM3 hash test data. | Daniel Wyatt | 2017-04-03 | 1 | -0/+417 |
| | | |||||
| * | Add SM3 hash function | Daniel Wyatt | 2017-04-03 | 1 | -0/+6 |
| | | |||||
* | | Merge GH #978 Fix bad read in X509 DN comparisons (CVE-2017-2801) | Jack Lloyd | 2017-04-04 | 3 | -0/+70 |
|\ \ | |||||
| * | | Fix X509 DN comparisons | Jack Lloyd | 2017-04-04 | 3 | -0/+70 |
| | | | | | | | | | | | | CVE-2017-2801 | ||||
* | | | Merge GH #900 Add ability to search by X509 DN hash | Jack Lloyd | 2017-04-04 | 2 | -193/+328 |
|\ \ \ | |||||
| * | | | Add tests for find_cert_by_raw_subject_dn_sha256 | Nuno Goncalves | 2017-04-04 | 1 | -1/+43 |
| | | | | | | | | | | | | | | | | Signed-off-by: Nuno Goncalves <[email protected]> | ||||
| * | | | Refactor test_certstor.cpp to prepare for adding tests | Nuno Goncalves | 2017-04-04 | 1 | -147/+181 |
| | | | | | | | | | | | | | | | | Signed-off-by: Nuno Goncalves <[email protected]> | ||||
| * | | | Format with astyle before major changes | Nuno Goncalves | 2017-04-03 | 1 | -30/+32 |
| | | | | | | | | | | | | | | | | Signed-off-by: Nuno Goncalves <[email protected]> | ||||
| * | | | Add unit tests for X509 hash methods: | Nuno Goncalves | 2017-04-03 | 1 | -0/+56 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | X509_Certificate::raw_issuer_dn_sha256() X509_Certificate::raw_subject_dn_sha256() Signed-off-by: Nuno Goncalves <[email protected]> | ||||
| * | | | Refactor and modernize files to be edited | Nuno Goncalves | 2017-04-03 | 1 | -45/+46 |
| | |/ | |/| | | | | | | | Signed-off-by: Nuno Goncalves <[email protected]> | ||||
* | | | Add block cipher interface to C API | Jack Lloyd | 2017-04-04 | 1 | -0/+37 |
| |/ |/| | |||||
* | | Merge GH #885 Change HMAC_DRBG::security_level to match NIST SP800-90A | Jack Lloyd | 2017-04-04 | 1 | -8/+36 |
|\ \ | |||||
| * | | Follow NIST SP 800-57 for HMAC_DRBG security level | René Korthaus | 2017-04-03 | 1 | -0/+26 |
| | | | |||||
| * | | Change security_strength of HMAC_DRBG | René Korthaus | 2017-04-03 | 1 | -8/+10 |
| |/ | | | | | | | | | | | | | | | | | | | | | | | | | | | Looking into SP808-90A, it mentions that the max security strength is the security strength of the hash function for pre-image resistance. The current implementation however always only uses half of the output length, therefore only providing half of the security strength possible. However, SP800-90A supports only up to 256 bit security strength, so we fix it to this upper limit. In a second change, add_entropy() now also resets the reseed counter if enough entropy input provided. | ||||
* | | Merge GH #965 Various code cleanups | Jack Lloyd | 2017-04-04 | 5 | -9/+6 |
|\ \ | |||||
| * | | Content: | Tomasz Frydrych | 2017-04-03 | 5 | -9/+6 |
| |/ | | | | | | | | | | | | | | | | | * fixes for deprecated constructions in c++11 and later (explicit rule of 3/5 or implicit rule of 0 and other violations) * `default` specifier instead of `{}` in some places(probably all) * removal of unreachable code (for example `return` after `throw`) * removal of compilation unit only visible, but not used functions * fix for `throw()` specifier - used instead `BOTAN_NOEXCEPT` * removed not needed semicolons | ||||
* | | Merge GH #964 Add various useful FFI functions for public key crypto | Jack Lloyd | 2017-04-04 | 2 | -0/+130 |
|\ \ | |/ |/| | |||||
| * | Implement botan_pubkey_load | Jack Lloyd | 2017-04-03 | 1 | -1/+6 |
| | | | | | | | | Declared in header, but was not defined. :( | ||||
| * | Fix botan_privkey_create if the desired algorithm was not available in build | Jack Lloyd | 2017-04-03 | 2 | -1/+20 |
| | | | | | | | | | | | | If DSA was disabled, caused memory corruption/crashes due to combination of uninitialized object and the tests not checking return values as carefully as they should. | ||||
| * | Add generic getters for PK parameters in C interface | Jack Lloyd | 2017-04-02 | 1 | -0/+106 |
| | | | | | | | | Supporting RSA, DSA, and ECC. Add also DSA specific loading functions. | ||||
* | | Merge GH #961 Add some more BigInt functions to C API | Jack Lloyd | 2017-04-02 | 1 | -0/+50 |
|\ \ | |/ |/| | |||||
| * | Add some more useful bigint functions to C interface | Jack Lloyd | 2017-03-31 | 1 | -0/+50 |
| | | |||||
* | | Merge GH #960 Check name of test suite. | Jack Lloyd | 2017-04-02 | 1 | -0/+11 |
|\ \ | |||||
| * | | Check name of test suite. | Alexander Bluhm | 2017-03-31 | 1 | -0/+11 |
| |/ | | | | | | | | | If botan-test is invoked with an invalid test name, fail with a usage error. This is more obvious than not running the test. | ||||
* / | Print test name before running test. | Alexander Bluhm | 2017-03-31 | 1 | -0/+1 |
|/ | | | | | | To make it easy to repeat classes of tests, print the name of the test suite before starting it. This name can be used on the botan-test command line. If a test hangs, it is also obvious which. | ||||
* | Build fix | Jack Lloyd | 2017-03-29 | 1 | -1/+1 |
| | |||||
* | Fix RSA blinding test | Jack Lloyd | 2017-03-29 | 1 | -5/+7 |
| | | | | | | Failed if OpenSSL was used since OpenSSL does (whatever it does). GH #879 | ||||
* | Fix final RSA blinding test | Jack Lloyd | 2017-03-29 | 1 | -4/+5 |
| | | | | See GH #879 | ||||
* | Add missing override annotation | Jack Lloyd | 2017-03-29 | 1 | -1/+1 |
| | |||||
* | Add --test-runs option to test binary | Jack Lloyd | 2017-03-29 | 1 | -5/+9 |
| | | | | Just runs the specified test several times, or until first failure. | ||||
* | Merge GH #879 Fix rsa_blinding tests and add one more test | Jack Lloyd | 2017-03-29 | 1 | -3/+46 |
|\ | |||||
| * | Fix rsa_blinding tests if emsa_raw is missing and add tests for rsa_blinding ↵ | Daniel Neus | 2017-02-16 | 1 | -3/+46 |
| | | | | | | | | while encrypting/decrypting | ||||
* | | Merge GH #899 Add ability to specify iterations when encrypting a private key | Jack Lloyd | 2017-03-29 | 1 | -20/+8 |
|\ \ | |||||
| * | | Add ability to specify iterations when encrypting a private key | Jack Lloyd | 2017-02-26 | 1 | -20/+8 |
| | | | | | | | | | | | | GH #896 | ||||
* | | | Merge GH #946 Expose multiple precision integers in C interface | Jack Lloyd | 2017-03-29 | 1 | -7/+226 |
|\ \ \ | |||||
| * | | | Expose BigInt API subset to C API | Jack Lloyd | 2017-03-28 | 1 | -7/+226 |
| | | | | | | | | | | | | | | | | Also adds RSA key constructors using BN | ||||
* | | | | Remove old timing test suite | Jack Lloyd | 2017-03-28 | 7 | -0/+51 |
|/ / / | | | | | | | | | | Replaced by version in cli added in #894 | ||||
* | | | Merge GH #944 Add check_key to C API | Jack Lloyd | 2017-03-28 | 1 | -0/+3 |
|\ \ \ | |||||
| * | | | Expose PK::check_key functions in C interface | Jack Lloyd | 2017-03-27 | 1 | -0/+3 |
| | | | | |||||
* | | | | Avoid long tests for each bcrypt password | Jack Lloyd | 2017-03-24 | 1 | -2/+22 |
| | | | | |||||
* | | | | Fix incorrect password truncation in bcrypt password hashing. | Jack Lloyd | 2017-03-24 | 2 | -3/+273 |
|/ / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | The 56 char bound is bogus; Blowfish itself allows at most 448 bits in the key schedule, but Bcrypt's modification allows up to 72 chars for the password. Bug pointed out by Solar Designer. Also reject work factors 0...3 since all other extant bcrypt implementations require at least work factor 4. Adds more bcrypt tests generated by crypt_bcrypt and OpenBSD's version. |