Commit graph

493 commits

Author SHA1 Message Date
Legrandin
b8d07cbc24 Prepare docs for release 3.3 2015-10-28 21:35:55 +01:00
Legrandin
bdda4f9133 Updates to docs 2015-10-28 21:21:29 +01:00
Legrandin
1a5b9f5de5 Add SHAKE128 and SHAKE256 2015-10-28 18:01:48 +01:00
Legrandin
0cb9555d8b SHA3 object cannot be copied nor changed after digest 2015-10-28 18:01:47 +01:00
Legrandin
38ea6cba76 Keccak objects cannot be copied nor changed after digest
[skip ci]
2015-10-28 18:01:47 +01:00
Legrandin
50d9c6b035 Add Crypto.Hash.keccak module 2015-10-28 18:01:47 +01:00
Legrandin
354abdd4c7 Add digest size parameter to keccak_digest.
Also, some minor clean up to keccak C code.
2015-10-28 18:01:46 +01:00
Legrandin
7506698308 Use one native module for all 4 SHA3 variants 2015-10-28 18:01:46 +01:00
Legrandin
95c9b5be4e Check primality of Q in any DSA domain parameter 2015-10-12 09:17:28 -04:00
Legrandin
3835072713 Package MPIR in Windows wheel 2015-10-10 22:48:47 +02:00
Legrandin
7f14313273 Verify that no faults occur during RSA decryption 2015-09-23 08:58:09 +02:00
Legrandin
1df56d2061 Prepare release 3.2.1 2015-09-08 21:32:41 +02:00
Legrandin
002aa583e7 Shows if AESNI tests are not performed 2015-09-08 21:16:23 +02:00
Legrandin
603d6cc6b2 Prepare for release 3.3 2015-09-06 20:57:16 +02:00
Legrandin
8505ba9dc3 Create version 3.2 2015-09-05 22:00:28 +02:00
Legrandin
c8f9a58e83 Update link to final FIPS 202 (SHA-3) 2015-09-04 21:34:59 +02:00
Legrandin
c2b27a3cd9 Update link to latest scrypt RFC draft 2015-08-04 20:32:17 +00:00
Legrandin
98e64fbd4d Better exception string for PKCS8 unwrapping 2015-08-04 20:28:55 +00:00
Legrandin
e1acde156d Bumped version to 3.2.dev0 2015-08-04 19:40:24 +00:00
Legrandin
7073325ff7 Update to documentation 2015-07-19 19:12:47 +00:00
Legrandin
b52930835d Small clean up to PSS code 2015-07-12 19:57:16 +00:00
Legrandin
29302e0686 Fix missing module problem on Windows 2015-07-11 20:37:33 +00:00
Legrandin
f45c561328 Add Crypto.Signature.pkcs1_pss with NIST test vectors
Crypto.Signature.PKCS1_PSS is reverted to the old behavior it had
in PyCrypto: verify() returns True/False and does not raise an
exception with wrong signature.
2015-07-11 20:26:17 +00:00
Legrandin
c85dfa7953 Add Crypto.Signature.pkcs1_v1_5 module with NIST test vectors
Crypto.Signature.PKCS1_v1_5 is reverted to old behavior it
had in PyCrypto (verify raises no exception; it only returns
True or False).
2015-07-10 19:19:13 +00:00
Legrandin
0e38393c74 Revert verify method of PKCS1_PSS to old behavior (return True/False) 2015-07-01 20:28:43 +00:00
Legrandin
0847391638 Revert verify method of PKCS1_v1_5 to old behavior (return True/False) 2015-07-01 20:12:54 +00:00
Legrandin
d97b240d56 Removed parameter verify_x509_cert from importKey (RSA/DSA) 2015-06-30 20:52:22 +00:00
Legrandin
46dc96c30d Formatting 2015-06-05 21:41:10 +02:00
Legrandin
fda457dbdb Raise exception if message is too long given block size 2015-06-05 21:41:10 +02:00
Legrandin
a3988bf260 Refactored CMAC to internally copy less data 2015-06-05 21:41:10 +02:00
Legrandin
469714c1ab Formatting 2015-06-05 21:35:04 +02:00
Legrandin
734f329c35 [OCB] Avoid slicing of (large) inputs when possible 2015-05-31 07:17:42 -04:00
Legrandin
bf7e048e74 Added example and clarifications on use of last encrypt/decrypt 2015-05-30 15:24:41 -04:00
Legrandin
f11a960bbc Fix incorrect handling of misaligned associated data 2015-05-30 15:13:20 -04:00
Legrandin
03b14b6a0c Simplify C code by moving caches under Python 2015-05-29 09:06:49 -04:00
Legrandin
a24f0fb534 First draft of OCB
[skip ci]
2015-05-24 15:29:26 -04:00
Legrandin
6257fa5114 Add support for ChaCha20. 2015-04-30 11:44:34 -04:00
Legrandin
d0311fb416 MAC checks are all performed with BLAKE2s 2015-04-16 14:11:50 +02:00
Legrandin
db6c6f8e5e Add support or BLAKE2s and BLAKE2b 2015-04-16 14:11:50 +02:00
Legrandin
12b75141c4 Minor simplification to DER decoding code 2015-03-18 08:42:04 +01:00
Legrandin
2e969dbaec Adjust DSS example 2015-03-13 20:43:59 +01:00
Legrandin
b3cdb1754b Update library version 2015-03-13 20:43:59 +01:00
Legrandin
0701df338c Remove ambiguous method size() from RSA, DSA and ElGamal keys 2015-03-13 20:35:38 +01:00
Legrandin
8e4d6f3518 Update to API documentation. 2015-03-13 20:35:37 +01:00
Legrandin
eaf771e1b9 Remove Crypto.PublicKey.DSA.DSAImplementation
In the process, Crypto.PublicKey.DSA.exportKey()
accepts a "randfunc" parameter to convey the PRNG
to rely on when doing PEM encryption.
2015-03-11 13:56:19 -04:00
Legrandin
1f3c1b4fcc Remove Crypto.PublicKey.RSA.RSAImplementation
In the process, we add a "randfunc" parameter to
- Crypto.Cipher.PKCS1_OAEP.new()
- Crypto.Cipher.PKCS1_v1_5.new()
- Crypto.Signature.PKCS1_PSS.new()
to set the PRNG used by each algorithm.
Previously, the PRNG was taken from the RSA key itself.
2015-03-11 11:30:33 -04:00
Legrandin
72aff29a65 Update to API documentation. 2015-03-11 11:30:16 -04:00
Legrandin
54f786bbf3 Refactor DSA generation to follow FIPS186 more closely 2015-03-08 20:51:23 +01:00
Legrandin
06501ae142 RSA modulus size is not required to be a multiple of 256 bits anymore.
RSA key method ``size`` returns the same value as
in PyCrypto.

Use LCM for RSA private exponent.
2015-03-05 21:55:03 +01:00
Legrandin
1cca0ff6c1 Add Integer.lcm() method 2015-03-05 21:54:07 +01:00