aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
* Merge GH #1093 In EC keys, use OID encoding if possibleJack Lloyd2017-07-031-6/+16
|\
| * ECC: use OID encoding if possiblePatrick Wildt2017-06-301-6/+16
| | | | | | | | | | | | Instead of explicitly encoding the domain, encode them with the OID if the OID is available. This makes the ecdsa_sign test run with OpenSSL, since OpenSSL needs the OID explicitly set.
| * Revert previous, we should fix it differently.Patrick Wildt2017-06-301-16/+20
| |
| * Allow ECDSA tests for OpenSSL by comparing EC GroupsPatrick Wildt2017-06-281-20/+16
| | | | | | | | | | | | | | | | The ecdsa_sign test does not work for OpenSSL since the public key that is derived from the private key does not store the OID of the curve. Thus, the OpenSSL code cannot find the proper NID for the given public key and cannot do a verification operation. We can fix this by comparing the actual groups and not using the OIDs.
* | Merge GH #1107 Improve documentation of x509_path_validateJack Lloyd2017-07-031-1/+1
|\ \
| * | Add position of end entity cert in x509_path_validate() doc [ci skip]René Korthaus2017-07-021-1/+1
| | | | | | | | | | | | | | | It's not so obvious to a user at which end of the chain the end entity certificate must be placed.
* | | Merge GH #1106 Fix sign_cert CLI incorrectly handling --ca-key-pass (GH #1104)Jack Lloyd2017-07-031-2/+4
|\ \ \
| * | | Fix sign_cert CLI incorrectly handling --ca-key-passRené Korthaus2017-07-011-2/+4
| |/ /
* / / escape \Z in doxygen comment causing doxygen warning (and in turn error), ↵Zoltan Gyarmati2017-07-011-1/+1
|/ / | | | | | | fixes #1102
* | Update modern and nist policies with recent additionsJack Lloyd2017-06-303-0/+21
| |
* | Merge GH #1082 Add support for SM2 signature schemeJack Lloyd2017-06-3016-2/+654
|\ \
| * | Remove debug printsJack Lloyd2017-06-301-17/+1
| | |
| * | Add SM2 signature schemeJack Lloyd2017-06-2916-2/+671
| | | | | | | | | | | | | | | | | | From https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02 This is a contribution from Ribose Inc (@riboseinc).
* | | Merge GH #1084 Support multiple buffer sizes in speed reportJack Lloyd2017-06-301-86/+446
|\ \ \
| * | | use buffer sizes only once in performance tests0xdefaced2017-06-261-2/+16
| | | | | | | | | | | | | | | | | | | | | | | | Remove duplicates from given buffer sizes in performance tests. Additionally, sort buffer sizes for better grouping in logs and add a colon before printing the measurements.
| * | | print a summary for performance tests0xdefaced2017-06-241-7/+306
| | | |
| * | | only speed test different msg sizes when tests require a message size0xdefaced2017-06-241-204/+222
| | | | | | | | | | | | | | | | | | | | Don't perform performance tests for different buffer sizes when the algorithm does not care about the message size.
| * | | accept multiple buffer sizes used for speed tests0xdefaced2017-06-241-141/+170
| | |/ | |/|
* | | Merge GH #1098 Cleanups in SM3Jack Lloyd2017-06-301-81/+25
|\ \ \
| * | | Cleanups in SM3 codeJack Lloyd2017-06-291-81/+25
| |/ / | | | | | | | | | | | | | | | | | | | | | T[] variable is actually a constant, so precompute it in SM3_TJ W1 expansion is very simple and can just be done inline. Somewhat faster on my machine.
* | / Update BSI module policyRené Korthaus2017-06-301-0/+3
| |/ |/| | | | | | | Prohibit SM4 block cipher, ed25519 signature scheme and NIST SP800-56A KDF.
* | Merge GH #1095 Catch exceptions in botan_mp_initJack Lloyd2017-06-291-3/+23
|\ \
| * | ffi: Catch exceptions in botan_mp_initDaniel Wyatt2017-06-281-3/+23
| |/
* | Merge GH #1092 Correct printing of UTF-8 strings in asn1print cliJack Lloyd2017-06-291-2/+2
|\ \
| * | Fix transcoding of asn1print strings to UTF-8René Korthaus2017-06-281-2/+2
| |/ | | | | | | | | | | | | | | When the terminal used supports UTF-8, asn1print should convert strings from internal Latin1 to UTF-8 encoding for printing to terminal. However, it previously tried to convert in the opposite direction, probably because of the misconception that Charset::transcode() expects the two encodings as "from, to" instead of "to, from".
* | Merge GH #1096 Avoid undefined behavior in rotation operationsJack Lloyd2017-06-291-0/+2
|\ \
| * | Allow bit rotation by more than sizeof(T)*8 bits.Daniel Wyatt2017-06-281-0/+2
| |/ | | | | | | | | | | | | | | | | Currently these functions will happily bit shift by >= sizeof(T)*8 bits. However, this is undefined behavior, and results in unexpected results (0) on at least one platform I've tested. With this update, you can expect that rotate_left<uint32_t>(1, 32)==1 and rotate_right<uint32_t>(1, 32)==1.
* / Add a check in EC_Group encoding for OID being setJack Lloyd2017-06-291-0/+6
|/ | | | Otherwise encoding would fail with an obtuse error message.
* Update Doxygen for X509_Certificate::subject_infoDaniel Neus2017-06-231-2/+4
|
* Bump x25519 version in light of GH #1076 format changeJack Lloyd2017-06-211-1/+1
|
* Add test for CURDLE format Ed25519 keysJack Lloyd2017-06-211-0/+40
|
* Merge GH #1076 Change x25519 and Ed25519 key formats to match IETF standardJack Lloyd2017-06-217-53/+46
|\
| * Replaced USE_NULL_PARAM (0x05 0x00) by an empty vector (nothing)Francis Dupont2017-06-122-2/+8
| |
| * Fixed private key codeFrancis Dupont2017-06-124-25/+14
| |
| * Fixed public key code for *25519Francis Dupont2017-06-122-18/+4
| |
| * Moved to draft-ietf-curdle-pkix assigned OIDsFrancis Dupont2017-06-122-7/+7
| |
| * Added Curve25519_PrivateKey constructor from secret_keyFrancis Dupont2017-06-121-0/+12
| |
| * Addressed #1071 (unfinished change in master cipher_filter.cpp)Francis Dupont2017-06-121-1/+1
| |
* | Merge GH #1080 Add SM4 block cipherJack Lloyd2017-06-206-3/+228
|\ \
| * | Add SM4 block cipherJack Lloyd2017-06-166-3/+228
| | | | | | | | | | | | This work was sponsored by Ribose Inc
* | | Fix for #1078Baruch2017-06-191-1/+1
|/ /
* | Merge GH #1074 Add ability to load ECDSA/ECDH via FFIJack Lloyd2017-06-123-55/+265
|\ \ | |/ |/|
| * FFI: Comments from code review #1074Krzysztof Kwiatkowski2017-06-121-28/+65
| |
| * FFI: privkey_load_ec and pubkey_load_ec should be available only if ECDSA or ↵Krzysztof Kwiatkowski2017-06-101-2/+2
| | | | | | | | ECDH is compiled
| * FFI: ECDSA an ECDH keys loading from mpi. CleanupKrzysztof Kwiatkowski2017-06-102-83/+116
| | | | | | | | | | * Be more C++ and use templates instead of string comparision * Move private functions to namespace at the top of the file
| * FFI: Add functions specific to ECDSA and ECDHKrzysztof Kwiatkowski2017-06-103-15/+76
| |
| * FFI: Posibility to load EC pubkeyKrzysztof Kwiatkowski2017-06-103-8/+50
| |
| * FFI: Posibility to load EC privkeyKrzysztof Kwiatkowski2017-06-103-47/+84
| |
* | Update OCB ref to RFC, and add new test vectorsJack Lloyd2017-06-122-2/+100
|/
* Merge GH #1066 Add Ed25519 signature schemeJack Lloyd2017-06-0920-1/+8322
|\