3b19424f66In py_decrypt Make a copy of the input (encrypted data) because the call to ecc_decrypt is going to smash it!
Jeffrey I. Schiller
2012-05-28 18:52:39 -0400
faf9629804StringIO was imported twice.
Bithin A
2012-02-09 16:05:16 +0530
44ea3f0b03Updating setup.py to build properly on FreeBSD
R. Tyler Ballance
2010-03-22 05:03:40 -0700
1920cf75cdBuild a dylib on Darwin
v0.2
R. Tyler Ballance
2009-07-12 17:26:10 -0700
bd7b33e66eAdd the ability to compile libseccure with 'slow' random, i.e. /dev/random instead of /dev/urandom
R. Tyler Ballance
2009-07-10 14:51:51 -0700
d804fca886Add return types for libseccure
gh-pages
R. Tyler Ballance
2009-07-09 22:21:03 -0700
70787fc0ccAdd libseccure documentation, still haven't fleshed out everything for the functions
R. Tyler Ballance
2009-07-09 22:19:02 -0700
dcec11e0b2New doctress
R. Tyler Ballance
2009-07-09 22:18:37 -0700
088ea35dd1Add more pages, and flesh out the basic PyECC homepage; regen site
R. Tyler Ballance
2009-07-09 21:24:39 -0700
86b9ab7272Add the generated documentation that will live in the root directory
R. Tyler Ballance
2009-07-09 20:44:06 -0700
a8a0c67751Move the docs into their own directory
R. Tyler Ballance
2009-07-09 20:41:45 -0700
45ef9bf8c4Update conf.py to use the github.tools.sphinx extension
R. Tyler Ballance
2009-07-09 20:41:03 -0700
b9d319695eMissing jumps to return early from the function
R. Tyler Ballance
2009-07-07 12:14:05 -0700
fe1701e05dFree the decrypted data object in the test as well
R. Tyler Ballance
2009-07-07 12:13:21 -0700
ecfde56e57Ensure we're not inadvertantly returning a half-allocated ECC_Data struct
R. Tyler Ballance
2009-07-07 11:57:02 -0700
c6442de86aCleanup the encrypt test, add a couple more assertions to be safe
R. Tyler Ballance
2009-07-07 11:56:47 -0700
578c5b7a04Forgot to remove the no-longer necessary assertion in ECC.encrypt()
R. Tyler Ballance
2009-07-07 11:20:10 -0700
debcea0d43Make sure we're relying on the C API for the string length instead of len() which will only read to a NULL byte
R. Tyler Ballance
2009-07-07 11:16:52 -0700
378b80fd6aAdd a couple error condition tests
R. Tyler Ballance
2009-07-07 11:16:22 -0700
5057d4028eAdd a simplistic GC test case
R. Tyler Ballance
2009-07-06 10:12:51 -0700
6994400addReduce the number of loops, no need to run as many now that debugging is over
R. Tyler Ballance
2009-07-06 10:12:24 -0700
fc99bcd337Add a wee bit more documentation
R. Tyler Ballance
2009-07-06 10:02:39 -0700
ac24a736afAdd some malloc() error checking
R. Tyler Ballance
2009-07-06 08:02:17 -0700
7be6b1b247Fix a bad cast caught with clang(1)
R. Tyler Ballance
2009-07-06 06:08:11 -0700
cf6646f6b9Add a *lot* more loops to find more leaks
R. Tyler Ballance
2009-07-06 05:33:48 -0700
9f65db74b0Forcefully end the decrypted data string with a null byte
R. Tyler Ballance
2009-07-06 05:32:52 -0700
612e112938Set data member to NULL to make sure we can conditionalize against it later
R. Tyler Ballance
2009-07-06 04:48:50 -0700
99dcb2a214Print out the errno that's running around (for debug)
R. Tyler Ballance
2009-07-06 04:48:26 -0700
64ff45319dFix a leak underneath seccure's decompress_string() function (used heavily by ecc_encrypt())
R. Tyler Ballance
2009-07-06 04:39:32 -0700
19d0796a77Document some of the usage of pointers, etc
R. Tyler Ballance
2009-07-06 04:37:05 -0700
469d8c55e4Set point members to NULL, just in case >_>
R. Tyler Ballance
2009-07-06 04:36:28 -0700
927e807510Print out an error message if our hmac init fails
R. Tyler Ballance
2009-07-06 04:35:34 -0700
f23f27e6fcAdd another test case to generate a boatload of keys
R. Tyler Ballance
2009-07-02 11:29:43 -0700
e6f02ae624Print timestamps just for kicks
R. Tyler Ballance
2009-07-02 10:50:44 -0700
d9facbd6bbThe behavior of generating different encrypted results is correct
R. Tyler Ballance
2009-07-02 10:45:51 -0700
310798b48dWorking on (currently failing) test to verify the ecc_encrypt() results' consistency
R. Tyler Ballance
2009-07-02 10:33:27 -0700
e5db992e29Make sure we NULL the pointers after freeing
R. Tyler Ballance
2009-07-02 10:33:20 -0700
c33f0e64acEnsure ecc_serialize_private_key() is null-terminating our string
R. Tyler Ballance
2009-07-01 15:15:33 -0700
8eb6363b93I find all these values informative, I'm printing them, ha!
R. Tyler Ballance
2009-07-01 15:15:16 -0700
7e65949e7bEnsure the released pointer gets set to NULL, lest we double free! :(
R. Tyler Ballance
2009-07-01 14:58:28 -0700
1eb11436beMinor bit of documentation on the returned tuple from py_keygen()
R. Tyler Ballance
2009-07-01 14:01:36 -0700
c04327333dUse ecc_new_keypair_s() in py_new_keypair() since we're given the lengths by Python
R. Tyler Ballance
2009-07-01 14:01:15 -0700
2fcc6a76aeReturn the curve as the third parameter, not the keypair
R. Tyler Ballance
2009-07-01 12:19:16 -0700
4523a8785fRemove Python bindings for generating a public key based on a user-specified public key
R. Tyler Ballance
2009-07-01 12:18:53 -0700
5f0aa3d8e2Pass the curve back in the generated ECC object
R. Tyler Ballance
2009-07-01 11:36:25 -0700
d58c300738Separate the deserialize_mpi() and hash_to_exponent() calls
R. Tyler Ballance
2009-07-01 11:04:37 -0700
85286ab7c6Add the correct testing values to the PyUnit tests
R. Tyler Ballance
2009-07-01 10:49:33 -0700
6e27088af3Add private key serialization function, hook up to pu_keygen
R. Tyler Ballance
2009-06-30 23:53:07 -0700
f89c00de0fMake sure we're deserializing the mpi if that's what we get, otherwise we should be in keygen mode and be calling hash to exponent
R. Tyler Ballance
2009-06-30 23:46:36 -0700
e373c5d622Initialize pub_butes to zero
R. Tyler Ballance
2009-06-30 21:13:53 -0700
ef4e8cd256Add a couple ecc_free_keypair() calls here and there
R. Tyler Ballance
2009-06-30 21:11:05 -0700
ae08078f20Revert "Revert "Stop passing private key thorugh a SHA-512 block prior to hash_to_exponent()""
R. Tyler Ballance
2009-06-30 19:58:13 -0700
78a13c867dRevert "Stop passing private key thorugh a SHA-512 block prior to hash_to_exponent()"
R. Tyler Ballance
2009-06-30 19:55:10 -0700
9c38476aa3Accidentally pruned this at some point causing the ecc_verify() function to fail miserably
R. Tyler Ballance
2009-06-30 19:45:51 -0700
553cd2ecf6Correct warnings, copypasta fail
R. Tyler Ballance
2009-06-30 19:45:29 -0700
097b245c2cRevert "Cleanup mixin_key_and_curve to be more gdb friendly"
R. Tyler Ballance
2009-06-30 19:40:19 -0700
704dbf7663Stop passing private key thorugh a SHA-512 block prior to hash_to_exponent()
R. Tyler Ballance
2009-06-30 19:25:34 -0700
9b674cae84Clean up misc use of strlen() here and there, some places it's still needed however
R. Tyler Ballance
2009-06-30 19:09:57 -0700
3805ab8891Use ecc_new_keypair_s() like I should instad of relying on strlen() in ecc_new_keypair()
R. Tyler Ballance
2009-06-30 19:03:11 -0700
ba55608cdbRandomize the right number of bytes, i.e. 384B instead of 384b
R. Tyler Ballance
2009-06-30 19:02:48 -0700
54cbf24fb6Update the DEFAULT_SIG with that generated with the DEFAULT_PUBKEY and DEFAULT_PRIVKEY using seccure-sign
R. Tyler Ballance
2009-06-30 15:52:38 -0700
0c9e1422dcShuffle pieces around, generate a random buffer and then rely on ecc_new_keypair to generate the appropriate hash for it
R. Tyler Ballance
2009-06-30 15:46:06 -0700
22a041ad16Avoid strlen() since there may be null bytes in here
R. Tyler Ballance
2009-06-30 15:25:11 -0700
ee8badddffForce generating the private key hash, FML
R. Tyler Ballance
2009-06-30 15:24:58 -0700
c9bee81a29Prune now unnecessary defines
R. Tyler Ballance
2009-06-30 15:24:36 -0700
fd886ff652Gut all hopes of using a gcry_mpi_t for the internal representation of the public key
R. Tyler Ballance
2009-06-30 15:08:42 -0700
75fdb6b19aCleanup mixin_key_and_curve to be more gdb friendly
R. Tyler Ballance
2009-06-30 12:07:24 -0700
dcde2edffdRemove the highly experimental libgcrypt-based key generation and opt instead for seccure-based
R. Tyler Ballance
2009-06-30 11:46:15 -0700
3887cba8dbAbstract out the pertinent pieces of decompress_from_string() that do some mpi massaging
R. Tyler Ballance
2009-06-30 09:29:10 -0700
dff46a1e11Revert "Work in progres code to hijack libgcrupt's ecc sign implementation"
R. Tyler Ballance
2009-06-30 08:21:44 -0700
d2c5b6cb7eWork in progres code to hijack libgcrupt's ecc sign implementation
R. Tyler Ballance
2009-06-30 01:15:34 -0700
ac4497f631Bounce a proper hex encoded gcry_mpi_t back out of keygen
R. Tyler Ballance
2009-06-30 01:08:18 -0700
eec9a79031Rename function to be an even more generic shortcut for HEXifying a gcry_mpi_t
R. Tyler Ballance
2009-06-30 01:05:47 -0700
b819bfa3acSwitch key generation entirely over gcry_mpi_t generation
R. Tyler Ballance
2009-06-30 00:50:40 -0700
c079584f42Move ecc_private_to_str() to a generic key->str function
R. Tyler Ballance
2009-06-29 16:17:48 -0700
6aec64c302Disable passphrase-based key generation, switch cover over to expect keypairs as gcry_mpi_t's
R. Tyler Ballance
2009-06-29 16:16:32 -0700
5dcfae61aaMove ECC_KeyPair to just exist as a container for gcry_mpi_t objects]
R. Tyler Ballance
2009-06-29 16:15:41 -0700
1f0f30a557Add encrypt/decrypt calls to test_GenerateBoth to verify the keys work
R. Tyler Ballance
2009-06-29 12:46:10 -0700