Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Support PSSR_Raw | Jack Lloyd | 2017-09-16 | 7 | -140/+803 |
| | | | | | | | Allows PSS-signing a raw hash while also still specifying the salt length. GH #1211 | ||||
* | Merge duplicated logic for clearing CPUID bits | Jack Lloyd | 2017-09-16 | 1 | -40/+1 |
| | |||||
* | Update Wycheproof GCM tests | Jack Lloyd | 2017-09-15 | 1 | -6/+38 |
| | |||||
* | some formatting | Atanas Filyanov | 2017-09-15 | 1 | -1/+5 |
| | |||||
* | reenable 8 byte gcm tags | Atanas Filyanov | 2017-09-15 | 1 | -0/+9 |
| | |||||
* | Allow GCM tag size in the range 96..128 bits | Atanas Filyanov | 2017-09-14 | 1 | -15/+43 |
| | |||||
* | Merge GH #1208 Fix decoding of RFC 5915 ECC keys | Jack Lloyd | 2017-09-13 | 2 | -2/+31 |
|\ | |||||
| * | Remove inner/outer OID check in EC_PrivateKey ctor | René Korthaus | 2017-09-13 | 2 | -2/+31 |
| | | | | | | | | | | | | | | | | RFC 5915 mandates that the OID of an ECDSA ECPrivateKey shall be id-ecPublicKey with the named curve as the parameters. ECPrivateKey may contain the named curve OID, too, which is compared to id-ecPublicKey. Such keys could not be loaded. We remove this check and add a test vector from strongswan. | ||||
* | | allow 12 byte GCM tags and add test vectors | Atanas Filyanov | 2017-09-13 | 1 | -0/+48 |
|/ | |||||
* | Reference the right pipe | Jack Lloyd | 2017-09-11 | 1 | -1/+1 |
| | | | | This didn't affect the results [ci skip] | ||||
* | Merge GH #1202 Fix CFB IV carryover closes #1200 | Jack Lloyd | 2017-09-11 | 1 | -0/+71 |
|\ | |||||
| * | Address CFB carryover bug | Jack Lloyd | 2017-09-10 | 1 | -0/+71 |
| | | | | | | | | | | | | Test data generated by 1.10 so hopefully no further issues here. GH #1200 | ||||
* | | Change SM2 encryption to match updated standard. | Jack Lloyd | 2017-09-10 | 1 | -1/+2 |
| | | | | | | | | | | | | | | | | Unfortunately it seems the SM2 format changed between 2010 and 2012, now the ciphertext is C1 || C3 || C2. Unfortunate no matter how you slice it, but at least it's easy to convert from one form to another. | ||||
* | | Fix a couple more VC warnings | Jack Lloyd | 2017-09-10 | 2 | -3/+3 |
| | | |||||
* | | Fix bogus ffi test | Jack Lloyd | 2017-09-10 | 1 | -1/+1 |
|/ | | | | Caught by a warning from VC | ||||
* | Fix loading of plaintext PKCS#8 private keys | René Korthaus | 2017-09-08 | 1 | -3/+10 |
| | | | | | We fixed this in the C++ API in GH #381, but apparently not in ffi. Also adds the missing tests. | ||||
* | Merge GH #1189 Correct return value of botan_pk_op_verify_finish | Jack Lloyd | 2017-09-07 | 1 | -9/+9 |
|\ | |||||
| * | Correct return value of botan_pk_op_verify_finish | Jack Lloyd | 2017-09-06 | 1 | -9/+9 |
| | | | | | | | | | | | | | | This function changed behavior in 0d403a3 see also GH #1187 Add new return code BOTAN_FFI_INVALID_VERIFIER and use it for both signature and bcrypt verification functions. | ||||
* | | Add support for computing SM2 ZA field to FFI | Jack Lloyd | 2017-09-06 | 1 | -0/+8 |
| | | | | | | | | This is a contribution from Ribose Inc. | ||||
* | | Support arbitrary hashes for SM2 signatures | Jack Lloyd | 2017-09-06 | 2 | -2/+3 |
| | | | | | | | | This is a contribution from Ribose Inc | ||||
* | | Support arbitrary hashes for SM2 encryption | Jack Lloyd | 2017-09-05 | 1 | -3/+3 |
|/ | | | | This is a contribution from Ribose Inc. | ||||
* | Simplify polynomial doubling code | Jack Lloyd | 2017-09-05 | 1 | -0/+13 |
| | | | | | | | | | | GCC and Clang generate effectively identical code for a template with parameters, vs completely unrolled code as was used previously. Add a little-endian variant so XTS can use it. This extends XTS support to cover 256 and 512-bit ciphers. I was not able to find another implementation that supports both XTS and ciphers with large blocks, so the XTS test vectors are self-generated. | ||||
* | Output errors to cerr | Jack Lloyd | 2017-09-02 | 1 | -4/+4 |
| | |||||
* | Support a negative base in power_mod | Jack Lloyd | 2017-09-02 | 2 | -0/+28 |
| | | | | Closes #1168 | ||||
* | Add a script for running TLS-Attacker, remove old shell scripts | Jack Lloyd | 2017-09-02 | 1 | -0/+29 |
| | | | | [ci skip] | ||||
* | Change http://botan.randombit.net to https URIs | Jack Lloyd | 2017-09-01 | 1 | -3/+3 |
| | | | | | | Not a big deal since the site already uses HSTS, but whatever. [ci skip] | ||||
* | Merge GH #1169 Add LLVM bitcode target | Jack Lloyd | 2017-08-31 | 1 | -2/+15 |
|\ | |||||
| * | Add support for LLVM bitcode target | Jack Lloyd | 2017-08-30 | 1 | -2/+15 |
| | | |||||
* | | Fix a few more MSVC warnings | Jack Lloyd | 2017-08-31 | 3 | -5/+5 |
| | | |||||
* | | More MSVC warnings fixes | Jack Lloyd | 2017-08-31 | 2 | -3/+3 |
| | | |||||
* | | Fix various MSVC warnings | Jack Lloyd | 2017-08-31 | 2 | -3/+3 |
|/ | | | | Based on VC2017 output | ||||
* | Remove hard-coded fuzz tests | Jack Lloyd | 2017-08-25 | 56 | -455/+0 |
| | | | | All of these values were imported into crypto-corpus repo | ||||
* | Use correct padding mode in ARIA CBC test | Jack Lloyd | 2017-08-23 | 1 | -1/+1 |
| | |||||
* | Cleanup ARIA | Jack Lloyd | 2017-08-23 | 1 | -3/+10 |
| | | | | Remove NEON support, replace macros with inlines | ||||
* | Add missing ARIA test vectors (GH #1004) | Jeffrey Walton | 2017-08-23 | 1 | -0/+35 |
| | |||||
* | Simplify botan_privkey_create_XXX | Jack Lloyd | 2017-08-22 | 1 | -2/+2 |
| | | | | All of these can just forward to botan_privkey_create | ||||
* | Add dh functions in ffi | Konstantinos Kolelis | 2017-08-22 | 1 | -7/+128 |
| | |||||
* | Add is_passhash9_alg_supported() | René Korthaus | 2017-08-19 | 2 | -24/+22 |
| | |||||
* | Add guards for MAC and hash algo used in passhash9 tests | René Korthaus | 2017-08-18 | 1 | -1/+16 |
| | | | | | | | | Previously, passhash9 tests would fail if for example blowfish was not part of the build. Adds guards for the different MAC and hash algorithms used in passhash9 for calls to generate_passhash9(). For check_passhash9(), there is no way to know that an algorithm is not supported, but at least we improve the situation a bit here. | ||||
* | More ECDSA Raw(hash) tests | Jack Lloyd | 2017-08-16 | 1 | -0/+17 |
| | |||||
* | Allow signature using `Raw(hashname)` | Jack Lloyd | 2017-08-15 | 3 | -1/+41 |
| | | | | | | This confirms the message is exactly the size of the expected hash, and also causes RFC 6979 nonces to be generated using the specified hash. See also https://github.com/riboseinc/rnp/issues/367 | ||||
* | Add botan_hex_decode, botan_base64_encode, botan_base64_decode FFI funcs | Jack Lloyd | 2017-08-15 | 1 | -0/+30 |
| | |||||
* | Merge GH #1151 Add SHACAL2 | Jack Lloyd | 2017-08-15 | 1 | -0/+4097 |
|\ | |||||
| * | Add SHACAL2 in generic SIMD | Jack Lloyd | 2017-08-13 | 1 | -0/+14 |
| | | | | | | | | Bit over 2x faster on my desktop | ||||
| * | Add SHACAL2 | Jack Lloyd | 2017-08-13 | 1 | -0/+4083 |
| | | | | | | | | 256 bit ARX block cipher with hardware support, what's not to love. | ||||
* | | Improve polynomial doubling code, move to util | Jack Lloyd | 2017-08-15 | 2 | -0/+262 |
| | | | | | | | | | | | | | | | | | | Now does 64-bits at a time instead of 8 bits, and avoids conditional timing channel on the XOR carry. Confirmed that at least GCC 7 and Clang 4 on x86-64 compile the functions without conditional jumps. Also removes CMAC as a dependency of OCB, which only needed it in order to call CMAC::poly_double | ||||
* | | Unused variable warning [ci skip] | Jack Lloyd | 2017-08-14 | 1 | -1/+1 |
|/ | |||||
* | FFI test must search test data relative to data dir. | Alexander Bluhm | 2017-08-13 | 1 | -1/+1 |
| | | | | | | | The Test::data_file() method adds the current data dir prefix to the test data path so that it can be overwritten with the --data-dir option. This was missing in the ffi test and could result in a botan_x509_cert_load_file exception. | ||||
* | Merge GH #1144 Fix bug for ECDSA signing an all-zero hash | Jack Lloyd | 2017-08-07 | 3 | -1/+35 |
|\ | |||||
| * | Fix issue signing an ECDSA hash of all-zeros (GH #1143) | Jack Lloyd | 2017-08-07 | 3 | -1/+35 |
| | | | | | | | | | | The tests were generated by Botan but I was able to verify the resulting signatures using Golang's ecdsa module. |