aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
* Fix bad deref when ciphersuite value is larger than largest known idJack Lloyd2016-12-052-1/+26
| | | | Reported by @neverhub in GH #758 found by libFuzzer
* Skip OpenSSL on OS X Travis builds.Jack Lloyd2016-12-051-2/+3
| | | | | | OpenSSL library suddenly became unavailable on Travis OS X images causing build fauilres. Not clear if we should install it via homebrew instead, or what. For now disabling it to get CI green.
* Fix CircleCI buildJack Lloyd2016-12-041-1/+1
|
* Skip trying to install Python2 on OS X Travis imagesJack Lloyd2016-12-041-1/+1
|
* Merge GH #745 Make --via-amalgamation an error. Improve quoting in Travis ↵Jack Lloyd2016-12-041-20/+22
|\ | | | | | | build script
| * travis/build.sh: Convert TEST_FLAGS to Bash arraySimon Warta2016-12-031-3/+3
| |
| * Make shellcheck happy with travis/build.shSimon Warta2016-12-021-17/+19
| | | | | | | | | | | | This fixes some SC2086 (Double quote to prevent globbing and word splitting.) cases. See also https://github.com/koalaman/shellcheck/wiki/SC2086
| * Use new --amalgamation flag for TravisSimon Warta2016-12-021-1/+1
| |
* | Expose pk_ops.h as public interface againJack Lloyd2016-12-0416-16/+26
|/ | | | | | | | | | | | I was initially thinking of Botan as somewhat closed system, but @cordney has a legit use case of wanting to expose a TPM sign operation, but using their internal TPM library and TPM key type. This requires the API be exposed so the derivation can occur. Add a comment in the header explaining that the header is not for normal application use and directing them to pubkey.h This basically reverts 2747e8e23aec43162
* Merge GH #749 Prohibit SHAKE in BSI mode. Avoid XMSS test fails if SHAKE ↵Jack Lloyd2016-12-012-2/+12
|\ | | | | | | disabled.
| * Updates module policy, fixes test suite errorsMatthias Gierlings2016-12-012-2/+12
| | | | | | | | | | | | | | - Moves SHAKE to prohibited algorithms - Catches an error during XMSS private key generation when SHAKE is disabled. This should not be reported as error by the test bench since [SHAKE is optional in XMSS](https://tools.ietf.org/html/draft-irtf-cfrg-xmss-hash-based-signatures-07#section-5)
* | system_rng: workaround read only urandomAlon Bar-Lev2016-12-011-1/+4
|/ | | | | | | | botan_rng_reseed: System_RNG write failed error 9 FFI ran 252 tests 1 FAILED Failure 1: FFI botan_rng_reseed unexpectedly failed with error code -1 Signed-off-by: Alon Bar-Lev <[email protected]>
* Fix missing include in kdf.cppJack Lloyd2016-11-291-0/+1
| | | | | | Showed up when compiling kdf.cpp with no KDFs enabled in build. [ci skip]
* Add note on rfc6979 signatures to manual [ci skip]René Korthaus2016-11-281-3/+3
|
* Fix BER decoder integer overflowJack Lloyd2016-11-283-2/+45
|\
| * Check for overflow in BER decoder EOC scanningJack Lloyd2016-11-273-2/+45
| |
* | Document TLS::Policy::require_cert_revocation_infoJack Lloyd2016-11-281-1/+2
| |
* | Add TLS::Policy::require_cert_revocation_infoJack Lloyd2016-11-283-1/+14
| |
* | Merge GH #738 Add OCSP stapling to TLS clientJack Lloyd2016-11-2817-63/+347
|\ \
| * | Add OCSP stapling support to TLS clientJack Lloyd2016-11-2617-63/+347
| | |
* | | define NOMINMAX 1 before every include of windows.hBaruch Burstein2016-11-286-4/+6
| |/ |/|
* | Compile fixJack Lloyd2016-11-271-2/+2
| |
* | Tweak lcov script [ci skip]Jack Lloyd2016-11-271-1/+2
| |
* | Avoid unused variable warning if compression disabledJack Lloyd2016-11-271-2/+2
| | | | | | | | [ci skip]
* | Add BOTAN_UNUSED when relevant OS support is missingJack Lloyd2016-11-272-0/+2
| |
* | Fix amalgamation for IncludeOS - avoid having <thread> pulled inJack Lloyd2016-11-271-1/+1
| |
* | Merge GH #590 Initial Cilk/OpenMP supportJack Lloyd2016-11-2717-391/+425
|\ \
| * | Fix amalgamationJack Lloyd2016-11-271-2/+2
| | |
| * | Add compiler.h macro header extracted from build.hJack Lloyd2016-11-264-186/+216
| | | | | | | | | | | | | | | | | | | | | | | | All this is just standard C that the user should not touch, so it doesn't really make sense to have it in the build.h template file. Remove BOTAN_TARGET_CPU_HAS_KNOWN_ENDIANESS - only used twice (in loadstor.h) and that code is clearer without it.
| * | Add Cilk/OpenMP supportJack Lloyd2016-11-2614-251/+255
| |/
* | No reason to deprecate this (only internally called) constructorJack Lloyd2016-11-261-1/+2
| |
* | Correct output_length bug in SIV and ChaCha20Poly1305 alsoJack Lloyd2016-11-262-2/+2
| |
* | Add tests for TLS policy valuesJack Lloyd2016-11-265-5/+159
| |
* | Add TLS::Policy::to_stringJack Lloyd2016-11-262-0/+13
| |
* | Simple tests for AutoSeeded_RNGJack Lloyd2016-11-263-1/+97
|/
* Fix OpenSSL RC4 clone - ignored skip paramJack Lloyd2016-11-261-1/+1
|
* Tweak lcov scriptJack Lloyd2016-11-261-6/+9
|
* Add test for various functions previously missed (T::clone, PBKDF::name, ↵Jack Lloyd2016-11-2616-18/+79
| | | | | | | AEAD::output_length) Fix a bug in CCM, GCM, and OCB decryption which caused `output_length(tag_size())` to fail even though empty plaintexts are certainly defined for all three modes.
* Add script for running lcov reportJack Lloyd2016-11-262-1/+11
| | | | | | | | | Add configure.py option --with-coverage-info which enables coverage but does not disable optimizations. Changes the scripts to use --with-coverage-info --no-optimization which is the same behavior as --with-coverage except explicit about what is happening. [ci skip]
* When fuzzing verify/decrypt, choose a new value each time through loopJack Lloyd2016-11-261-8/+2
|
* Avoid recreating PK_Verifiers/PK_Decryptors multiple times in testJack Lloyd2016-11-261-45/+61
| | | | | | | All these tests ran once for each signing provider, instead of just once with all fixed data and then checking on the results of the encrypt/sign operations as needed. Speeds up `ecdsa_sign` by 11x, `rsa_encrypt` by 8x on my machine!
* Merge GH #739 Update docs and BSI policyJack Lloyd2016-11-261-0/+1
|\
| * Updates docs & module policyMatthias Gierlings2016-11-261-0/+1
| | | | | | | | | | | | - Added GMAC to list of supported MAC algorithms in readme.rst - Updated module policy to prevent CI crash - Added myself to credits.rst
* | Merge GH #718 Add XMSS WOTS schemeJack Lloyd2016-11-2616-43/+563
|\ \ | |/ |/|
| * Adds changes from XMSS Review & resolves conflictsMatthias Gierlings2016-11-1210-120/+32
| |
| * Adds optional XMSS WOTS stand-alone componentsMatthias Gierlings2016-11-1214-12/+566
| | | | | | | | | | | | | | | | | | | | | | The main XMSS implementation does not expose stand-alone access to XMSS Winternitz One Time Signatures through the Botan::PK_Ops interfaces. XMSS WOTS is used by XMSS internally though. This PR implements a possible XMSS WOTS interface for stand-alone use. XMSS WOTS is tested through the XMSS tests, therefore there are no dedicated XMSS WOTS test vectors and test bench components implemented in this PR.
| * Added Extended Hash-Based Signatures (XMSS)Matthias Gierlings2016-11-126-3/+57
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | [1] XMSS: Extended Hash-Based Signatures, draft-itrf-cfrg-xmss-hash-based-signatures-06 Release: July 2016. https://datatracker.ietf.org/doc/ draft-irtf-cfrg-xmss-hash-based-signatures/?include_text=1 Provides XMSS_PublicKey and XMSS_PrivateKey classes as well as implementations for the Botan interfaces PK_Ops::Signature and PK_Ops::Verification. XMSS has been integrated into the Botan test bench, signature generation and verification can be tested independently by invoking "botan-test xmss_sign" and "botan-test xmss_verify" - Some headers that are not required to be exposed to users of the library have to be declared as public in `info.txt`. Declaring those headers private will cause the amalgamation build to fail. The following headers have been declared public inside `info.txt`, even though they are only intended for internal use: * atomic.h * xmss_hash.h * xmss_index_registry.h * xmss_address.h * xmss_common_ops.h * xmss_tools.h * xmss_wots_parameters.h * xmss_wots_privatekey.h * xmss_wots_publickey.h - XMSS_Verification_Operation Requires the "randomness" parameter out of the XMSS signature. "Randomness" is part of the prefix that is hashed *before* the message. Since the signature is unknown till sign() is called, all message content has to be buffered. For large messages this can be inconvenient or impossible. **Possible solution**: Change PK_Ops::Verification interface to take the signature as constructor argument, and provide a setter method to be able to update reuse the instance on multiple signatures. Make sign a parameterless member call. This solution requires interface changes in botan. **Suggested workaround** for signing large messages is to not sign the message itself, but to precompute the message hash manually using Botan::HashFunctio and sign the message hash instead of the message itself. - Some of the available test vectors for the XMSS signature verification have been commented out in order to reduce testbench runtime.
* | Merge GH #653 OCSP and X.509 path validation refactorJack Lloyd2016-11-2548-599/+1850
|\ \ | | | | | | | | | | | | | | | Splits up path validation into several sub-functions for easier testing and creating customized validation code. Much improved OCSP handling and OCSP tests.
| * | Account for new string in test dataJack Lloyd2016-11-251-2/+2
| | |
| * | Fix TLS tests wrt validation changesJack Lloyd2016-11-252-14/+27
| | | | | | | | | | | | Create empty CRLs so that revocation information is available.