aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
* Add an offset to ignore at the start of the buffer in AEAD processinglloyd2013-03-287-67/+117
| | | | | | which makes more complicated packet building easier to do in-place. For instance now update can take a buffer that contains a header and be told to ignore the header.
* Have tls_suite_info.py generate the entire source filelloyd2013-03-282-6/+37
| | | | | | | instead of just the switch. Next step should be having it be run by configure at build time and a copy of the the params included in build-data
* Add nonce length checks to EAX and GCMlloyd2013-03-282-0/+6
|
* Compile fixlloyd2013-03-271-1/+1
|
* Allow tag sizes other than 128 bits in GCM and OCBlloyd2013-03-272-34/+42
|
* Rename script and add headerlloyd2013-03-271-4/+10
|
* propagate from branch 'net.randombit.botan' (head ↵lloyd2013-03-277-7/+39
|\ | | | | | | | | | | b7ac11f48ca4fe8e5aafa01979c5bf087b156d77) to branch 'net.randombit.botan.aead-modes' (head 061b249cd586d4ff849aaa48c3ec8cf7587acc56)
| * Avoid warninglloyd2013-03-231-1/+1
| |
| * Alias mips64el to mips64, from Brad Smithlloyd2013-03-211-0/+4
| |
| * merge of '767ce7b733ad25a056a4609645dbb0418fed5c91'lloyd2013-03-2127-777/+58
| |\ | | | | | | | | | and '8795500927af6dc6c8a74d6868d002712f971a2f'
| * | Fix error if we asked for nonexistent branch or versionlloyd2013-03-211-1/+1
| | |
| * | Add TLS::Policy::server_uses_own_ciphersuite_preferences()lloyd2013-03-214-5/+33
| | | | | | | | | | | | | | | | | | Previously the server always took its most-preferred cipher out of the client's list, but this policy allows telling a server to follow the client's preferences insetad.
* | | Resize each time in the looplloyd2013-03-271-2/+2
| | |
* | | In AEAD_Filter consume input in pieceslloyd2013-03-271-3/+16
| | |
* | | Fix macro check in selftestlloyd2013-03-272-10/+9
| | |
* | | Add an AEAD_Filter that wraps an AEAD_Mode, plus various bug fixes.lloyd2013-03-278-51/+210
| | |
* | | Convert OCB to new AEAD interfacelloyd2013-03-274-136/+143
| | |
* | | Move GCM to new AEAD interfacelloyd2013-03-2713-193/+188
| | |
* | | Avoid silly warning under GCClloyd2013-03-271-1/+1
| | |
* | | Move EAX to new AEAD_Mode interfacelloyd2013-03-207-313/+327
| |/ |/|
* | Update callerslloyd2013-03-203-7/+7
| |
* | Rename AEAD_Mode to AEAD_Filterlloyd2013-03-204-7/+7
| |
* | Missing BOTAN_DLL on AEAD_Modelloyd2013-03-191-1/+1
| |
* | Remove the Turing and WiderWAKE4+1 stream cipher implementations.lloyd2013-03-198-699/+0
| | | | | | | | Both never saw much deployment or analysis.
* | Use env to work around Arch sillinesslloyd2013-03-191-1/+1
| |
* | Add an interface to Keyed_Filter returning a Key_Length_Specificationlloyd2013-03-1714-63/+43
|/ | | | | so the full details of what keylength(s) the filter supports are now available.
* Move ghash functions to anon namespacelloyd2013-03-171-0/+4
|
* Move all AEAD modes to src/filters/aeadlloyd2013-03-1711-1/+0
|
* Move compression filters to subfolderlloyd2013-03-179-0/+0
|
* Support for non-CBC modes in ciphersuite list genlloyd2013-03-161-4/+23
|
* Add get_aead in lookup.hlloyd2013-03-163-0/+27
|
* propagate from branch 'net.randombit.botan.aead-modes' (head ↵lloyd2013-03-166-9/+409
|\ | | | | | | | | | | 9f75a9bcacc77447b2916104f0ccbabd2c93b516) to branch 'net.randombit.botan' (head 9e94d89357c08ffc5f7cb5cc3e86c755da96ca8e)
| * Working GCM. Add support for AEAD modes in self testslloyd2013-03-164-80/+83
| |
| * Some work towards a (very slow) GCM implementationlloyd2013-03-164-0/+397
| | | | | | | | | | Does not currently work due to some error in ghash, likely a misunderstanding of the field representation.
* | Add the script that generates the switch in tls_suite_info.cpplloyd2013-03-162-1/+126
|/
* Convert EAX to using Buffered_Filter and new AEAD interfacelloyd2013-03-164-205/+114
|
* Save most of the block cipher calls used when setting the nonce in OCBlloyd2013-03-162-37/+59
| | | | | | by avoiding recomputing stretch if the previous value works. This greatly reduces the cost of using OCB when only the lowest bits of the nonce value are changing (as when using a counter).
* Parallel OCB decryptionlloyd2013-03-161-10/+34
|
* Avoid really needless allocationslloyd2013-03-161-2/+1
|
* OCB encryption can encrypt blocks in parallel nowlloyd2013-03-161-11/+11
|
* propagate from branch 'net.randombit.botan' (head ↵lloyd2013-03-167-1/+567
|\ | | | | | | | | | | 039c91aa543bad85f227e8127ed048f9005e2fa0) to branch 'net.randombit.botan.aead-modes' (head 97d8d24b545f18084e39bf928c174c45efbb63bd)
| * In OCB encrypt, XOR multiple plaintext blocks and fold at the endlloyd2013-03-161-17/+30
| |
| * Make OCB_Base constructor privatelloyd2013-03-161-10/+11
| |
| * Move std::vector operator^= to xor_buflloyd2013-03-152-41/+43
| | | | | | | | Some prep work for parallel encrypt
| * Make parallel processing possible by buffering more than one blocklloyd2013-03-152-41/+64
| | | | | | | | | | | | and handling possible extra full blocks in end_msg Add a constant OCB_Mode::BS == 16 for readability.
| * OCB decryptionlloyd2013-03-143-62/+109
| |
| * Add OCB mode, currently encrypt only, and an AEAD interfacelloyd2013-03-146-0/+480
| |
* | Add algorithm_kat_detailed which returns a string with info about the failurelloyd2013-03-162-14/+50
|/
* Move assert.h from internal to very public (included in types.h)lloyd2013-03-1326-29/+9
| | | | | | This reduces friction to writing an assert, so hopefully there will be more of them as a result. And we can use asserts in public headers now, very useful for templates.
* src/utils/semaphore.h was marked both public and internal, which brokelloyd2013-03-091-1/+0
| | | | | the amalgamation build. Add a check that warns if we do this again, and some more logging in the amalgamation generator.