| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
|
|
| |
* 1.7 changelog date and version bump
* no wait the 12th
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Start of OpenSSL DH backend implementation
* Supporting DH in MultiBackend
* DHBackend has dh_parameters_supported method
* Removed DHParametersWithNumbers and DHPrivateKeyWithNumbers from documentation
* Removed ExchangeContext. exchange is a method of DHPrivateKeyWithSerialization
* PEP8 fixes
* Fixed TestDH.test_bad_tls_exchange
* Fixed generate_private_key reference in dh documentation
* test DH multibackend support
* testing DH coversion to serialized
* Validating that we receive serialized class in test_generate_dh
* Testing DH exchange symmetric key padding
* struct DH is now opaqued
* PEP8 fixes
* Testing load_dh_private_numbers throws ValueError when DH_check fails
* Using openssl_assert
* Passing keywords arguments in DH key exchange example
* test_dh::test_bad_tls_exchange now uses pre calculated parameters
* TestDH - Add test that the computed secret is equivalent to the definition by comparing with secret computed in pure python
* Add missing generator parameter to DHBackend interface docs.
* Include parameter type in DHBackend abc docs.
* Add docs for dh.generate_parameters function
* Remove the dh Numbers section, and move the DHNumbers class docs to where they are first used.
* Add note of big endian byte packing to DH exchange method.
* DH documentation updates.
Add single sentence overview with wikipedia link.
Add paragraph on assembling using Numbers objects.
Add link to backend interface docs.
First section was all indented, I think by mistake.
* Add exchange method to DHPrivateKey abstract base class.
* Small tweaks to DH documentation - remove Provider.
* Add endian to dictionary
* Use utils.int_from_bytes in test_tls_exchange_algorithm
* Removed duplicate line
* Change dh.rst exchange algorithm from doctest to code-block
The example in the Diffie-Hellman exhange algorithm is using
2048 bits key. Generating the parameters of 2048 takes long
time. This caused the automated tests to fail. In order to
pass the tests we change the example to code-block so it
will not run in the doc tests.
* Fix dh docs
* Document the generator in DHBackend relevant methods
* Fix dh tests
* use DHparams_dup
* Fix key type to unsigned char as expected by DH_compute_key
* Validate that DH generator is 2 or 5
* test dh exchange using botan vectors
* group all numbers classes
* Simplify _DHPrivateKey
* Rename test with serialized to numbers
* Move bad exchange params to external vector file
* update exchange versionadded to 1.7
* Make key_size bit accurate
* Change botan link
* Added CHANGELOG entry
|
| |
|
| |
|
|
|
|
|
|
| |
* add alternate signature OID for RSA with SHA1 + test and vector
* mozilla is a proper noun leave me alone spellchecker
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
* changelog and version bump
* typo, sigh
* fine you win doc8
* it's a brand new day
* add sign/verify for RSA to changelog
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* add RSA OAEP SHA2 vectors via custom vector creation
* update the docs
* retab
* remove sha2 oaep support (it will be added again in another PR)
* add header to each vector file
* Add Java 8 Bouncy Castle based verification of RSA-OAEP SHA-2 test vectors (#4)
* Update Java verifier to skip past test vector file header if present (#5)
* Update Java verifier to skip past test vector file header if present
* Fix tabs vs. space whitespace
* generate sha1 oaep permutations as well + verify support in java
* address review feedback
|
|
|
|
|
|
|
|
|
|
| |
* Add vectors for unkeyed blake2s and blake2b.
* Add short note describing source of vectors.
* Add link to OpenSSL repository.
* Amend docs.
|
| |
|
| |
|
| |
|
|\
| |
| | |
NIST SP 800-108 Counter Mode KDF test vectors.
|
| | |
|
| |
| |
| |
| | |
NIST CAVP test vectors for Counter Mode KDF using HMAC-SHA1, HMAC-SHA224, HMAC-SHA256 and HMAC-SHA512 as the PRF.
|
|/ |
|
|\
| |
| | |
Add verify method on CertificateSigningRequest
|
| | |
|
| | |
|
|/ |
|
| |
|
| |
|
| |
|
|
|
|
| |
see #2288
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
Add some missing changelog entries
|
| |
|
|\
| |
| | |
minor fix to handle malformed certificates without hostname
|
| | |
|
|/ |
|
|
|
|
|
|
|
| |
Source:
http://csrc.nist.gov/groups/STM/cavp/documents/components/800-135testvectors/ansx963_2001.zip
Signed-off-by: Simo Sorce <simo@redhat.com>
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|\
| |
| | |
add wildcard SAN x509 test vector
|
| | |
|