aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
* Merge GH #504 Add ECKCDSAJack Lloyd2016-06-2021-26/+537
|\
| * Add ECKCDSA signature algorithmRené Korthaus2016-06-1423-26/+545
| |
* | Merge GH #483 Add ECIES and KDF1 from ISO 18033Jack Lloyd2016-06-2010-0/+1228
|\ \
| * | ecies: fix tests for ecies-iso (allow empty ciphertext)Philipp Weber2016-05-301-3/+6
| | |
| * | Merge remote-tracking branch 'remotes/origin/master' into eciesPhilipp Weber2016-05-3035-127/+206
| |\ \
| * | | ecies review change: test for exception if the ciphertext is invalidPhilipp Weber2016-05-301-0/+8
| | | |
| * | | ecies review change: decrypt only if mac is correct and catch exceptions ↵Philipp Weber2016-05-231-11/+25
| | | | | | | | | | | | | | | | during decryption
| * | | ecies review change: add missing ciphertext to test vectorsPhilipp Weber2016-05-232-6/+3
| | | |
| * | | ecies review change: make constant vector with test data const instead of staticPhilipp Weber2016-05-231-1/+1
| | | |
| * | | add ecies implementation according to iso-18033Philipp Weber2016-04-276-0/+1125
| | | |
| * | | add kdf1 implementation according to iso-18033 (preparation for ecies)Philipp Weber2016-04-274-0/+81
| | | |
* | | | Use https:// urls for randombit.net links.Jack Lloyd2016-06-191-3/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Previously avoided since many clients don't have the CACert root, but now that Let's Encrypt is used instead anyone with a recent trust root should accept the certs for botan.randombit.net and lists.randombit.net [ci skip]
* | | | Merge GH #497 Add StreamCipher::seek and implementation for ChaChaJack Lloyd2016-06-1814-5/+575
|\ \ \ \ | | | | | | | | | | | | | | | Also adds ChaCha8 support
| * | | | Adding StreamCipher::seek interface, supporting seek in ChaCha, and also ↵SimCog2016-06-1814-5/+575
| | |_|/ | |/| | | | | | | | | | adding ChaCha8 support
* | | | Merge GH #487 Remove CVC certificates and EMSA1_BSI signature encodingJack Lloyd2016-06-1727-3072/+11
|\ \ \ \
| * | | | remove the already bitrotting and probably broken CVC implementationDaniel Neus2016-05-1819-2961/+0
| | | | |
| * | | | remove all uses of EMSA1_BSIDaniel Neus2016-05-025-43/+8
| | | | |
| * | | | remove EMSA1_BSI (no longer recommended by BSI)Daniel Neus2016-04-304-70/+5
| | | | |
* | | | | Merge GH #495 Add label argument to KDF::derive_keyJack Lloyd2016-06-1727-5577/+4714
|\ \ \ \ \
| * | | | | fix python 3 bindingsKai Michaelis2016-06-011-1/+1
| | | | | |
| * | | | | fix python bindingsKai Michaelis2016-06-011-4/+4
| | | | | |
| * | | | | make sure kdf labels are always usedKai Michaelis2016-06-018-20/+41
| | | | | |
| * | | | | pycryptodome generated test vectors for SP800-56CKai Michaelis2016-05-191-120/+160
| | | | | |
| * | | | | BouncyCastle generated test vectors for SP800-108Kai Michaelis2016-05-194-5399/+4331
| | | | | |
| * | | | | add label parameter to KDF::derive_keyKai Michaelis2016-05-1922-45/+189
| | | | | |
* | | | | | Merge GH #503 Space savings for TLS::CiphersuiteJack Lloyd2016-06-174-458/+392
|\ \ \ \ \ \
| * | | | | | Save the IETF ciphersute name directly in TLS::CiphersuiteJack Lloyd2016-06-094-458/+392
| | |_|/ / / | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | instead of trying (badly) to reconstruct it in to_string Save all strings in Ciphersuite as const char*
* / | | | | fix test failures and seg faults when Botan is configured with ↵René Korthaus2016-06-1712-29/+85
|/ / / / / | | | | | | | | | | | | | | | --module-policy bsi
* | | | | Fix CircleCI buildJack Lloyd2016-06-071-2/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The LLVM apt mirror was removed due to excessive load, preventing us from installing a new enough Clang for our needs. However CircleCI also supports Ubuntu 14.04 images, instead of the Ubuntu 12 we were on. The new version has GCC 4.8 and Clang 3.4 as the base install. Removes UBSan from the CircleCI sanitizer build, since that requires at least GCC 4.9 GH #498
* | | | | Merge GH #489 Add support probabilistic DSA & ECDSAJack Lloyd2016-06-0711-13/+2703
|\ \ \ \ \
| * | | | | Add support probabilistic DSA & ECDSARené Korthaus2016-05-0811-13/+2703
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Adds support for probabilistic, aka the standard, DSA and ECDSA. Can be enabled by disabling the rfc6979 module. Includes test vectors from NIST CAVP. Adds rfc6979 to the list of prohibited modules in BSI policy.
* | | | | | Add Not_Implemented exceptionJack Lloyd2016-06-074-7/+17
| | | | | |
* | | | | | Tweak for readability in McEliece testsJack Lloyd2016-06-071-15/+10
| | | | | | | | | | | | | | | | | | | | | | | | Using a struct here seems cleaner
* | | | | | Clean symlinks to shared libraries properlyLauri Nurmi2016-06-071-1/+1
| |_|_|_|/ |/| | | | | | | | | | | | | | The 'clean' target left dangling symlinks because undefined variables were used in Makefile.
* | | | | Remove DN field requirements on generating certs and PKCS #10Jack Lloyd2016-05-233-22/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | I have no idea why this is requiring the country code be set, but for many applications a country is not even meaningful. This change also allows CN to be empty/unset on the request or cert, since there is no actual requirement for any specific DN entry type and RFC 5280 specifically allows even an completely empty DN, with name information only in the subjectAltName extension. This change also allows generating a self-signed cert or cert request that expires before it starts. That could only happen with an explicit decision by the application to set it that way, and there is no harm in returning these non-secret bits. They will probably notice their problem as soon as the cert is rejected by any receiving system.
* | | | | Fix GCM counter incrementJack Lloyd2016-05-234-3/+42
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | GCM is defined as having a 32-bit counter, but CTR_BE incremented the counter across the entire block. This caused incorrect results if a very large message (2**39 bits) was processed, or if the GHASH derived nonce ended up having a counter field near to 2**32 Thanks to Juraj Somorovsky for the bug report and repro.
* | | | | Add FPE_FE1 runtime metricsJack Lloyd2016-05-231-0/+47
| | | | |
* | | | | Fix for GCC 6Jack Lloyd2016-05-231-0/+1
| |/ / / |/| | |
* | | | Merge GH #484 use explicit casts to avoids MSVC warning C4267Jack Lloyd2016-05-0921-64/+62
|\ \ \ \ | |/ / / |/| | |
| * | | Add explicit static_cast operations to eliminate implicit cast compiler ↵Dan Brown2016-04-2718-36/+34
| | | | | | | | | | | | | | | | warnings.
| * | | Change calls to 'get_byte' to explicitly cast parameters and eliminate ↵Dan Brown2016-04-277-28/+28
| | |/ | |/| | | | | | | compiler warnings
* | | Turn MSVC warnings to /W4 and enable C4267Jack Lloyd2016-05-063-8/+1
| | | | | | | | | | | | | | | | | | Move disabling C4250 and C4251 to cmd line instead of header pragma. This means these warnings will show up in application code. But disabling warnings inside a library header is probably not good form.
* | | AppVeyor used amalgamation build due to strict build time restrictionsJack Lloyd2016-05-061-1/+1
| | | | | | | | | | | | Now allows up to 60 minute builds, so build normally.
* | | Somewhat more helpful helpJack Lloyd2016-04-281-5/+7
| |/ |/|
* | Add missing overrideJack Lloyd2016-04-281-1/+1
| |
* | Check that the version in botan_version.py matches the tagged versionJack Lloyd2016-04-281-23/+44
|/
* Merge GH #469 Generate error on unknown critical extension during path ↵Jack Lloyd2016-04-239-78/+241
|\ | | | | | | | | | | | | validation Previously an unknown extension would be rejected during parsing, which prevents examining such a cert at all
| * Move name constraints validation code to extension classRené Korthaus2016-04-173-101/+111
| |
| * Add Unknown_Critical_Extension typeRené Korthaus2016-04-103-16/+43
| |
| * Generate error on unknown critical extension during path validationRené Korthaus2016-04-069-19/+145
| | | | | | | | | | | | | | | | | | | | | | | | Previously unknown critical extensions were rejected during X509_Certificate constructor, which inhibited inspecting other parts of such a certificate. Refactored the certificate extensions code so that the path validation routine performs this check only. Additionally, added an interface for extensions to inspect the path during path validation. TODOs were added in places where existing path validation code can use the new interface. Fixes GH #449.