Legrandin
b8d07cbc24
Prepare docs for release 3.3
2015-10-28 21:35:55 +01:00
Legrandin
bdda4f9133
Updates to docs
2015-10-28 21:21:29 +01:00
Legrandin
1a5b9f5de5
Add SHAKE128 and SHAKE256
2015-10-28 18:01:48 +01:00
Legrandin
0cb9555d8b
SHA3 object cannot be copied nor changed after digest
2015-10-28 18:01:47 +01:00
Legrandin
38ea6cba76
Keccak objects cannot be copied nor changed after digest
...
[skip ci]
2015-10-28 18:01:47 +01:00
Legrandin
50d9c6b035
Add Crypto.Hash.keccak module
2015-10-28 18:01:47 +01:00
Legrandin
354abdd4c7
Add digest size parameter to keccak_digest.
...
Also, some minor clean up to keccak C code.
2015-10-28 18:01:46 +01:00
Legrandin
7506698308
Use one native module for all 4 SHA3 variants
2015-10-28 18:01:46 +01:00
Legrandin
95c9b5be4e
Check primality of Q in any DSA domain parameter
2015-10-12 09:17:28 -04:00
Legrandin
3835072713
Package MPIR in Windows wheel
2015-10-10 22:48:47 +02:00
Legrandin
7f14313273
Verify that no faults occur during RSA decryption
2015-09-23 08:58:09 +02:00
Legrandin
1df56d2061
Prepare release 3.2.1
2015-09-08 21:32:41 +02:00
Legrandin
002aa583e7
Shows if AESNI tests are not performed
2015-09-08 21:16:23 +02:00
Legrandin
603d6cc6b2
Prepare for release 3.3
2015-09-06 20:57:16 +02:00
Legrandin
8505ba9dc3
Create version 3.2
2015-09-05 22:00:28 +02:00
Legrandin
c8f9a58e83
Update link to final FIPS 202 (SHA-3)
2015-09-04 21:34:59 +02:00
Legrandin
c2b27a3cd9
Update link to latest scrypt RFC draft
2015-08-04 20:32:17 +00:00
Legrandin
98e64fbd4d
Better exception string for PKCS8 unwrapping
2015-08-04 20:28:55 +00:00
Legrandin
e1acde156d
Bumped version to 3.2.dev0
2015-08-04 19:40:24 +00:00
Legrandin
7073325ff7
Update to documentation
2015-07-19 19:12:47 +00:00
Legrandin
b52930835d
Small clean up to PSS code
2015-07-12 19:57:16 +00:00
Legrandin
29302e0686
Fix missing module problem on Windows
2015-07-11 20:37:33 +00:00
Legrandin
f45c561328
Add Crypto.Signature.pkcs1_pss with NIST test vectors
...
Crypto.Signature.PKCS1_PSS is reverted to the old behavior it had
in PyCrypto: verify() returns True/False and does not raise an
exception with wrong signature.
2015-07-11 20:26:17 +00:00
Legrandin
c85dfa7953
Add Crypto.Signature.pkcs1_v1_5 module with NIST test vectors
...
Crypto.Signature.PKCS1_v1_5 is reverted to old behavior it
had in PyCrypto (verify raises no exception; it only returns
True or False).
2015-07-10 19:19:13 +00:00
Legrandin
0e38393c74
Revert verify method of PKCS1_PSS to old behavior (return True/False)
2015-07-01 20:28:43 +00:00
Legrandin
0847391638
Revert verify method of PKCS1_v1_5 to old behavior (return True/False)
2015-07-01 20:12:54 +00:00
Legrandin
d97b240d56
Removed parameter verify_x509_cert from importKey (RSA/DSA)
2015-06-30 20:52:22 +00:00
Legrandin
46dc96c30d
Formatting
2015-06-05 21:41:10 +02:00
Legrandin
fda457dbdb
Raise exception if message is too long given block size
2015-06-05 21:41:10 +02:00
Legrandin
a3988bf260
Refactored CMAC to internally copy less data
2015-06-05 21:41:10 +02:00
Legrandin
469714c1ab
Formatting
2015-06-05 21:35:04 +02:00
Legrandin
734f329c35
[OCB] Avoid slicing of (large) inputs when possible
2015-05-31 07:17:42 -04:00
Legrandin
bf7e048e74
Added example and clarifications on use of last encrypt/decrypt
2015-05-30 15:24:41 -04:00
Legrandin
f11a960bbc
Fix incorrect handling of misaligned associated data
2015-05-30 15:13:20 -04:00
Legrandin
03b14b6a0c
Simplify C code by moving caches under Python
2015-05-29 09:06:49 -04:00
Legrandin
a24f0fb534
First draft of OCB
...
[skip ci]
2015-05-24 15:29:26 -04:00
Legrandin
6257fa5114
Add support for ChaCha20.
2015-04-30 11:44:34 -04:00
Legrandin
d0311fb416
MAC checks are all performed with BLAKE2s
2015-04-16 14:11:50 +02:00
Legrandin
db6c6f8e5e
Add support or BLAKE2s and BLAKE2b
2015-04-16 14:11:50 +02:00
Legrandin
12b75141c4
Minor simplification to DER decoding code
2015-03-18 08:42:04 +01:00
Legrandin
2e969dbaec
Adjust DSS example
2015-03-13 20:43:59 +01:00
Legrandin
b3cdb1754b
Update library version
2015-03-13 20:43:59 +01:00
Legrandin
0701df338c
Remove ambiguous method size() from RSA, DSA and ElGamal keys
2015-03-13 20:35:38 +01:00
Legrandin
8e4d6f3518
Update to API documentation.
2015-03-13 20:35:37 +01:00
Legrandin
eaf771e1b9
Remove Crypto.PublicKey.DSA.DSAImplementation
...
In the process, Crypto.PublicKey.DSA.exportKey()
accepts a "randfunc" parameter to convey the PRNG
to rely on when doing PEM encryption.
2015-03-11 13:56:19 -04:00
Legrandin
1f3c1b4fcc
Remove Crypto.PublicKey.RSA.RSAImplementation
...
In the process, we add a "randfunc" parameter to
- Crypto.Cipher.PKCS1_OAEP.new()
- Crypto.Cipher.PKCS1_v1_5.new()
- Crypto.Signature.PKCS1_PSS.new()
to set the PRNG used by each algorithm.
Previously, the PRNG was taken from the RSA key itself.
2015-03-11 11:30:33 -04:00
Legrandin
72aff29a65
Update to API documentation.
2015-03-11 11:30:16 -04:00
Legrandin
54f786bbf3
Refactor DSA generation to follow FIPS186 more closely
2015-03-08 20:51:23 +01:00
Legrandin
06501ae142
RSA modulus size is not required to be a multiple of 256 bits anymore.
...
RSA key method ``size`` returns the same value as
in PyCrypto.
Use LCM for RSA private exponent.
2015-03-05 21:55:03 +01:00
Legrandin
1cca0ff6c1
Add Integer.lcm() method
2015-03-05 21:54:07 +01:00