Commit graph

484 commits

Author SHA1 Message Date
Legrandin
3835072713 Package MPIR in Windows wheel 2015-10-10 22:48:47 +02:00
Legrandin
7f14313273 Verify that no faults occur during RSA decryption 2015-09-23 08:58:09 +02:00
Legrandin
1df56d2061 Prepare release 3.2.1 2015-09-08 21:32:41 +02:00
Legrandin
002aa583e7 Shows if AESNI tests are not performed 2015-09-08 21:16:23 +02:00
Legrandin
603d6cc6b2 Prepare for release 3.3 2015-09-06 20:57:16 +02:00
Legrandin
8505ba9dc3 Create version 3.2 2015-09-05 22:00:28 +02:00
Legrandin
c8f9a58e83 Update link to final FIPS 202 (SHA-3) 2015-09-04 21:34:59 +02:00
Legrandin
c2b27a3cd9 Update link to latest scrypt RFC draft 2015-08-04 20:32:17 +00:00
Legrandin
98e64fbd4d Better exception string for PKCS8 unwrapping 2015-08-04 20:28:55 +00:00
Legrandin
e1acde156d Bumped version to 3.2.dev0 2015-08-04 19:40:24 +00:00
Legrandin
7073325ff7 Update to documentation 2015-07-19 19:12:47 +00:00
Legrandin
b52930835d Small clean up to PSS code 2015-07-12 19:57:16 +00:00
Legrandin
29302e0686 Fix missing module problem on Windows 2015-07-11 20:37:33 +00:00
Legrandin
f45c561328 Add Crypto.Signature.pkcs1_pss with NIST test vectors
Crypto.Signature.PKCS1_PSS is reverted to the old behavior it had
in PyCrypto: verify() returns True/False and does not raise an
exception with wrong signature.
2015-07-11 20:26:17 +00:00
Legrandin
c85dfa7953 Add Crypto.Signature.pkcs1_v1_5 module with NIST test vectors
Crypto.Signature.PKCS1_v1_5 is reverted to old behavior it
had in PyCrypto (verify raises no exception; it only returns
True or False).
2015-07-10 19:19:13 +00:00
Legrandin
0e38393c74 Revert verify method of PKCS1_PSS to old behavior (return True/False) 2015-07-01 20:28:43 +00:00
Legrandin
0847391638 Revert verify method of PKCS1_v1_5 to old behavior (return True/False) 2015-07-01 20:12:54 +00:00
Legrandin
d97b240d56 Removed parameter verify_x509_cert from importKey (RSA/DSA) 2015-06-30 20:52:22 +00:00
Legrandin
46dc96c30d Formatting 2015-06-05 21:41:10 +02:00
Legrandin
fda457dbdb Raise exception if message is too long given block size 2015-06-05 21:41:10 +02:00
Legrandin
a3988bf260 Refactored CMAC to internally copy less data 2015-06-05 21:41:10 +02:00
Legrandin
469714c1ab Formatting 2015-06-05 21:35:04 +02:00
Legrandin
734f329c35 [OCB] Avoid slicing of (large) inputs when possible 2015-05-31 07:17:42 -04:00
Legrandin
bf7e048e74 Added example and clarifications on use of last encrypt/decrypt 2015-05-30 15:24:41 -04:00
Legrandin
f11a960bbc Fix incorrect handling of misaligned associated data 2015-05-30 15:13:20 -04:00
Legrandin
03b14b6a0c Simplify C code by moving caches under Python 2015-05-29 09:06:49 -04:00
Legrandin
a24f0fb534 First draft of OCB
[skip ci]
2015-05-24 15:29:26 -04:00
Legrandin
6257fa5114 Add support for ChaCha20. 2015-04-30 11:44:34 -04:00
Legrandin
d0311fb416 MAC checks are all performed with BLAKE2s 2015-04-16 14:11:50 +02:00
Legrandin
db6c6f8e5e Add support or BLAKE2s and BLAKE2b 2015-04-16 14:11:50 +02:00
Legrandin
12b75141c4 Minor simplification to DER decoding code 2015-03-18 08:42:04 +01:00
Legrandin
2e969dbaec Adjust DSS example 2015-03-13 20:43:59 +01:00
Legrandin
b3cdb1754b Update library version 2015-03-13 20:43:59 +01:00
Legrandin
0701df338c Remove ambiguous method size() from RSA, DSA and ElGamal keys 2015-03-13 20:35:38 +01:00
Legrandin
8e4d6f3518 Update to API documentation. 2015-03-13 20:35:37 +01:00
Legrandin
eaf771e1b9 Remove Crypto.PublicKey.DSA.DSAImplementation
In the process, Crypto.PublicKey.DSA.exportKey()
accepts a "randfunc" parameter to convey the PRNG
to rely on when doing PEM encryption.
2015-03-11 13:56:19 -04:00
Legrandin
1f3c1b4fcc Remove Crypto.PublicKey.RSA.RSAImplementation
In the process, we add a "randfunc" parameter to
- Crypto.Cipher.PKCS1_OAEP.new()
- Crypto.Cipher.PKCS1_v1_5.new()
- Crypto.Signature.PKCS1_PSS.new()
to set the PRNG used by each algorithm.
Previously, the PRNG was taken from the RSA key itself.
2015-03-11 11:30:33 -04:00
Legrandin
72aff29a65 Update to API documentation. 2015-03-11 11:30:16 -04:00
Legrandin
54f786bbf3 Refactor DSA generation to follow FIPS186 more closely 2015-03-08 20:51:23 +01:00
Legrandin
06501ae142 RSA modulus size is not required to be a multiple of 256 bits anymore.
RSA key method ``size`` returns the same value as
in PyCrypto.

Use LCM for RSA private exponent.
2015-03-05 21:55:03 +01:00
Legrandin
1cca0ff6c1 Add Integer.lcm() method 2015-03-05 21:54:07 +01:00
Legrandin
f928741c77 Add square root to Integer 2015-02-25 22:39:10 +01:00
Legrandin
2cb82bb2a6 Remove progress_func from PublicKey objects 2015-02-25 21:42:49 +01:00
Legrandin
00ab349550 Generic filter for prime number generation 2015-02-25 07:40:29 +01:00
Legrandin
f08e5f9506 On Windows, do not rely on ctypes.util.find_library(). 2015-02-20 14:40:56 +00:00
Legrandin
58bf9c6ba4 Clean up detection of FFI backend 2015-02-20 14:34:41 +00:00
Legrandin
79ae1d2756 Numbers._implementation refers to library and API 2015-02-11 15:11:58 +00:00
Legrandin
0b76cd2168 Ensure that all data passed to C backend is byte strings 2015-02-10 22:29:40 +01:00
Legrandin
11a6d1dfa4 Flag explicitly certain arguments as of size_t type 2015-02-10 16:45:25 +01:00
Legrandin
0564cb7c3e On Win64, use ulonglong instead ulong for MPIR 2015-02-10 12:50:02 +00:00