aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
* Use new APIs in path validation and name constraint handlingJack Lloyd2017-11-142-6/+14
|
* Store CRL_Entry data in shared_ptrJack Lloyd2017-11-142-41/+81
|
* Store X509_CRL data in shared_ptrJack Lloyd2017-11-142-69/+102
|
* Store PKCS10 request data in structureJack Lloyd2017-11-142-65/+85
|
* Refactor certificate extension handlingJack Lloyd2017-11-142-274/+441
|
* Store all data of an X509 certificate in a shared_ptr data struct.Jack Lloyd2017-11-144-364/+567
|
* Use new Decoding_Error constructorJack Lloyd2017-11-141-4/+2
|
* Require SHA-2 for X.509 moduleJack Lloyd2017-11-141-0/+1
| | | | The certstore interface assumes it and it's probably not unreasonable...
* In X509_CA save the hash function usedJack Lloyd2017-11-142-2/+11
|
* Move X509_DN and AlternativeName from asn1 to x509Jack Lloyd2017-11-148-81/+118
|
* Fix seek test with OpenSSL RC4Jack Lloyd2017-11-141-1/+1
|
* Support seeking in Salsa20Jack Lloyd2017-11-148-9/+61
| | | | Add a test that StreamCipher::seek throws if not keyed.
* Add OIDS::oid2str and str2oidJack Lloyd2017-11-141-0/+10
| | | | Using the name "lookup" for both directions is confusing.
* Add a second constructor to Decoding_Error which takes an exception string.Jack Lloyd2017-11-142-0/+5
|
* Add <functional> include to TLS headers which use std::functionJack Lloyd2017-11-142-0/+2
|
* Compile fixJack Lloyd2017-11-141-2/+2
|
* Correct issuer field of created CRLsJack Lloyd2017-11-142-6/+6
| | | | Fixes GH #1242
* Use jom via botan-ci-tools repoJack Lloyd2017-11-131-2/+2
| | | | download.qt.io seems to be down ...
* Remove duplicated includeJack Lloyd2017-11-131-1/+0
|
* Remove final on TLS policy objects (GH #1292)Jack Lloyd2017-11-131-4/+4
|
* Missing include: #include <cstdlib> is needed for std::free.Yuri2017-11-111-0/+1
|
* rename cert containing UTF8String consistentlyRené Meusel2017-11-102-1/+1
|
* TEST: read (self signed) cert containing BMPString fieldsRené Meusel2017-11-102-0/+52
|
* Switch test code to use big-endian UCS2/UCS4Jack Lloyd2017-11-091-13/+11
| | | | | | Specifications are somewhat unclear but as best I can tell only big-endian codepoints are allowed and that follows OpenSSL and GnuTLS behavior.
* Remove use of transcodeJack Lloyd2017-11-0911-196/+140
|
* FIX: linker error on windows (VSO#143857)René Meusel2017-11-091-2/+14
|
* FIX: test method namespacingRené Meusel2017-11-091-2/+2
|
* FIX: coding styleRene Meusel2017-11-091-94/+92
|
* add tests for UCS-2/4 parsingRene Meusel2017-11-091-0/+65
|
* add conversion from UCS-2/4 to UTF-8Rene Meusel2017-11-092-13/+47
|
* introduce UNIVERSAL_STRING (UCS-4)Rene Meusel2017-11-092-1/+3
|
* add coding clarificationsRene Meusel2017-11-091-2/+6
|
* add test reading UTF-8 X509 certRene Meusel2017-11-093-2/+61
|
* allow encoding of UTF-8 stringsRene Meusel2017-11-092-8/+70
|
* switch to default utf-8 string in ASN1_StringRene Meusel2017-11-092-8/+8
|
* add a failing test for an UTF-8 string and a successful test for ASCIIRene Meusel2017-11-091-0/+57
|
* Add UCS-2 and UCS-4 to UTF-8 conversion functionsJack Lloyd2017-11-094-5/+131
| | | | | | Crosschecked by fuzzing and comparing with iconv Needed in #1250
* Add SHACAL2 test from Bouncy CastleJack Lloyd2017-11-051-0/+5
| | | | [ci skip]
* Fix shadow warningJack Lloyd2017-11-051-2/+3
| | | | [ci skip]
* Add support for ARIA GCM ciphersuitesJack Lloyd2017-11-034-7/+30
| | | | Tested against OpenSSL master
* Add some KDF2 values from Bouncy CastleJack Lloyd2017-11-021-0/+19
|
* Format tweaksJack Lloyd2017-11-021-2/+2
|
* Avoid using semicolon at and of do { } while(0) macro block.Jack Lloyd2017-11-022-19/+19
| | | | Clearly I have a tic for this.
* Avoid saving a session to SQL database with empty hostnameJack Lloyd2017-11-021-0/+3
| | | | This happens if the hostname is unknown or specified as an IP.
* Minor SIV/CMAC optimizationsJack Lloyd2017-11-022-13/+17
|
* speed: simplify some codeJack Lloyd2017-11-021-167/+60
|
* Use a simple PRNG for the testsJack Lloyd2017-10-294-123/+114
| | | | | | | | | | | Not cryptographically secure, but fast! Cuts several seconds off the test suite even on a very fast machine. Probably even more effective for 32-bit systems since the default for HMAC_DRBG is SHA-384. Also it means deterministic tests are used regardless of build configuration which is nice. Improve output for --test-runs which was useful for me when debugging SM2 encryption issue.
* Merge GH #1281 CRC24 optimizationsJack Lloyd2017-10-292-67/+213
|\
| * CRC24 performance improvement (32 bits in parallel)Krzysztof Kwiatkowski2017-10-292-67/+213
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Algorithm uses 4 tables of precalculated CRC24 values, thanks to which it can process in parallel 32 bits of data. This tric doubles performance Further improvements are possible. Results - (tested with RNP) processing 1GB armor data ``` OLD: rnp --enarmor=msg /tmp/1gb.rnd --output 4.48s user 0.89s system 98% cpu 5.429 total NEW: rnp --enarmor=msg /tmp/1gb.rnd --output 2.38s user 0.86s system 79% cpu 4.089 total OLD: rnp --dearmor out.xxx --output out.d 5.58s user 0.65s system 98% cpu 6.338 total NEW: rnp --dearmor out.xxx --output out.d 3.28s user 0.84s system 96% cpu 4.275 total ```
* | Include <memory> in base type headersJack Lloyd2017-10-294-0/+4
|/ | | | Needed for the create calls