aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
* Fix sign_cert CLI incorrectly handling --ca-key-passRené Korthaus2017-07-011-2/+4
|
* Update modern and nist policies with recent additionsJack Lloyd2017-06-303-0/+21
|
* Merge GH #1082 Add support for SM2 signature schemeJack Lloyd2017-06-3016-2/+654
|\
| * Remove debug printsJack Lloyd2017-06-301-17/+1
| |
| * Add SM2 signature schemeJack Lloyd2017-06-2916-2/+671
| | | | | | | | | | | | From https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02 This is a contribution from Ribose Inc (@riboseinc).
* | Merge GH #1084 Support multiple buffer sizes in speed reportJack Lloyd2017-06-301-86/+446
|\ \
| * | use buffer sizes only once in performance tests0xdefaced2017-06-261-2/+16
| | | | | | | | | | | | | | | | | | Remove duplicates from given buffer sizes in performance tests. Additionally, sort buffer sizes for better grouping in logs and add a colon before printing the measurements.
| * | print a summary for performance tests0xdefaced2017-06-241-7/+306
| | |
| * | only speed test different msg sizes when tests require a message size0xdefaced2017-06-241-204/+222
| | | | | | | | | | | | | | | Don't perform performance tests for different buffer sizes when the algorithm does not care about the message size.
| * | accept multiple buffer sizes used for speed tests0xdefaced2017-06-241-141/+170
| | |
* | | Merge GH #1098 Cleanups in SM3Jack Lloyd2017-06-301-81/+25
|\ \ \
| * | | Cleanups in SM3 codeJack Lloyd2017-06-291-81/+25
| |/ / | | | | | | | | | | | | | | | | | | | | | T[] variable is actually a constant, so precompute it in SM3_TJ W1 expansion is very simple and can just be done inline. Somewhat faster on my machine.
* | / Update BSI module policyRené Korthaus2017-06-301-0/+3
| |/ |/| | | | | | | Prohibit SM4 block cipher, ed25519 signature scheme and NIST SP800-56A KDF.
* | Merge GH #1095 Catch exceptions in botan_mp_initJack Lloyd2017-06-291-3/+23
|\ \
| * | ffi: Catch exceptions in botan_mp_initDaniel Wyatt2017-06-281-3/+23
| |/
* | Merge GH #1092 Correct printing of UTF-8 strings in asn1print cliJack Lloyd2017-06-291-2/+2
|\ \
| * | Fix transcoding of asn1print strings to UTF-8René Korthaus2017-06-281-2/+2
| |/ | | | | | | | | | | | | | | When the terminal used supports UTF-8, asn1print should convert strings from internal Latin1 to UTF-8 encoding for printing to terminal. However, it previously tried to convert in the opposite direction, probably because of the misconception that Charset::transcode() expects the two encodings as "from, to" instead of "to, from".
* | Merge GH #1096 Avoid undefined behavior in rotation operationsJack Lloyd2017-06-291-0/+2
|\ \
| * | Allow bit rotation by more than sizeof(T)*8 bits.Daniel Wyatt2017-06-281-0/+2
| |/ | | | | | | | | | | | | | | | | Currently these functions will happily bit shift by >= sizeof(T)*8 bits. However, this is undefined behavior, and results in unexpected results (0) on at least one platform I've tested. With this update, you can expect that rotate_left<uint32_t>(1, 32)==1 and rotate_right<uint32_t>(1, 32)==1.
* / Add a check in EC_Group encoding for OID being setJack Lloyd2017-06-291-0/+6
|/ | | | Otherwise encoding would fail with an obtuse error message.
* Update Doxygen for X509_Certificate::subject_infoDaniel Neus2017-06-231-2/+4
|
* Bump x25519 version in light of GH #1076 format changeJack Lloyd2017-06-211-1/+1
|
* Add test for CURDLE format Ed25519 keysJack Lloyd2017-06-211-0/+40
|
* Merge GH #1076 Change x25519 and Ed25519 key formats to match IETF standardJack Lloyd2017-06-217-53/+46
|\
| * Replaced USE_NULL_PARAM (0x05 0x00) by an empty vector (nothing)Francis Dupont2017-06-122-2/+8
| |
| * Fixed private key codeFrancis Dupont2017-06-124-25/+14
| |
| * Fixed public key code for *25519Francis Dupont2017-06-122-18/+4
| |
| * Moved to draft-ietf-curdle-pkix assigned OIDsFrancis Dupont2017-06-122-7/+7
| |
| * Added Curve25519_PrivateKey constructor from secret_keyFrancis Dupont2017-06-121-0/+12
| |
| * Addressed #1071 (unfinished change in master cipher_filter.cpp)Francis Dupont2017-06-121-1/+1
| |
* | Merge GH #1080 Add SM4 block cipherJack Lloyd2017-06-206-3/+228
|\ \
| * | Add SM4 block cipherJack Lloyd2017-06-166-3/+228
| | | | | | | | | | | | This work was sponsored by Ribose Inc
* | | Fix for #1078Baruch2017-06-191-1/+1
|/ /
* | Merge GH #1074 Add ability to load ECDSA/ECDH via FFIJack Lloyd2017-06-123-55/+265
|\ \ | |/ |/|
| * FFI: Comments from code review #1074Krzysztof Kwiatkowski2017-06-121-28/+65
| |
| * FFI: privkey_load_ec and pubkey_load_ec should be available only if ECDSA or ↵Krzysztof Kwiatkowski2017-06-101-2/+2
| | | | | | | | ECDH is compiled
| * FFI: ECDSA an ECDH keys loading from mpi. CleanupKrzysztof Kwiatkowski2017-06-102-83/+116
| | | | | | | | | | * Be more C++ and use templates instead of string comparision * Move private functions to namespace at the top of the file
| * FFI: Add functions specific to ECDSA and ECDHKrzysztof Kwiatkowski2017-06-103-15/+76
| |
| * FFI: Posibility to load EC pubkeyKrzysztof Kwiatkowski2017-06-103-8/+50
| |
| * FFI: Posibility to load EC privkeyKrzysztof Kwiatkowski2017-06-103-47/+84
| |
* | Update OCB ref to RFC, and add new test vectorsJack Lloyd2017-06-122-2/+100
|/
* Merge GH #1066 Add Ed25519 signature schemeJack Lloyd2017-06-0920-1/+8322
|\
| * Fix 32-bit error in Ed25519Jack Lloyd2017-06-093-24/+21
| | | | | | | | Blamed VC miscompilation but actually a bug on my part.
| * Enable Ed25519 in 'modern' policyJack Lloyd2017-06-091-0/+1
| |
| * Fix FFI build when Ed25519 disabledJack Lloyd2017-06-091-1/+11
| |
| * Add FFI test and test data from PGP draftJack Lloyd2017-06-083-2/+84
| |
| * Add missing overridesJack Lloyd2017-06-081-2/+2
| |
| * Ed25519 FFIJack Lloyd2017-06-082-0/+104
| |
| * Disable Ed25519 under Visual C++Jack Lloyd2017-06-081-0/+7
| | | | | | | | Miscompiles on x86-32, even with VS2017
| * Fix inverted conditionalJack Lloyd2017-06-081-1/+1
| |