Commit Graph

  • 85147cbc03 Merge 799a0a23dd into 392002484d Vundemodalu Manjush 2015-02-03 20:21:30 +0000
  • 799a0a23dd Silence Equality comparison with extraneous parentheses clang warnings Vundemodalu Manjush 2015-02-04 01:44:47 +0530
  • 99cbaac819 Debug warning on line 20 in libseccure.h Vundemodalu Manjush 2015-02-04 01:32:41 +0530
  • 5655745e49 Merge 3b19424f66 into 392002484d GitHub Merge Button 2012-05-28 15:58:10 -0700
  • 3b19424f66 In py_decrypt Make a copy of the input (encrypted data) because the call to ecc_decrypt is going to smash it! Jeffrey I. Schiller 2012-05-28 18:52:39 -0400
  • bc8076ebd7 Merge aa14fb0130 into 392002484d GitHub Merge Button 2012-04-13 21:43:09 -0700
  • aa14fb0130 This is patch for issue #3. Bithin A 2012-02-10 16:52:32 +0530
  • 392002484d Merge pull request #2 from bithin/patch-1 master R. Tyler Croy 2012-02-09 12:30:37 -0800
  • 6d3391c83a Merge faf9629804 into 44ea3f0b03 GitHub Merge Button 2012-02-09 02:35:25 -0800
  • faf9629804 StringIO was imported twice. Bithin A 2012-02-09 16:05:16 +0530
  • 44ea3f0b03 Updating setup.py to build properly on FreeBSD R. Tyler Ballance 2010-03-22 05:03:40 -0700
  • 1920cf75cd Build a dylib on Darwin v0.2 R. Tyler Ballance 2009-07-12 17:26:10 -0700
  • bd7b33e66e Add the ability to compile libseccure with 'slow' random, i.e. /dev/random instead of /dev/urandom R. Tyler Ballance 2009-07-10 14:51:51 -0700
  • d804fca886 Add return types for libseccure gh-pages R. Tyler Ballance 2009-07-09 22:21:03 -0700
  • 70787fc0cc Add libseccure documentation, still haven't fleshed out everything for the functions R. Tyler Ballance 2009-07-09 22:19:02 -0700
  • dcec11e0b2 New doctress R. Tyler Ballance 2009-07-09 22:18:37 -0700
  • 088ea35dd1 Add more pages, and flesh out the basic PyECC homepage; regen site R. Tyler Ballance 2009-07-09 21:24:39 -0700
  • 86b9ab7272 Add the generated documentation that will live in the root directory R. Tyler Ballance 2009-07-09 20:44:06 -0700
  • a8a0c67751 Move the docs into their own directory R. Tyler Ballance 2009-07-09 20:41:45 -0700
  • 45ef9bf8c4 Update conf.py to use the github.tools.sphinx extension R. Tyler Ballance 2009-07-09 20:41:03 -0700
  • f3fe27c88a Initial commit, add sphinx-quickstart generated files R. Tyler Ballance 2009-07-09 20:27:36 -0700
  • 29bc27f854 Remove the docs directory for now, going to bring it back under gh-pages R. Tyler Ballance 2009-07-09 20:21:22 -0700
  • 1aa1382138 Update licensing on the seccure code, moving to LGPL thanks to B. Poettering R. Tyler Ballance 2009-07-09 20:21:13 -0700
  • 2f233b8d4e Remove NULL returns in non-exception error conditions v0.1 R. Tyler Ballance 2009-07-08 14:56:47 -0700
  • 270593d49c Make sure the state and keypair objects are freed post-iterations as well R. Tyler Ballance 2009-07-08 13:45:36 -0700
  • a8da85fc64 Run loops over reading and encrypting the same sizes of data R. Tyler Ballance 2009-07-08 01:18:24 -0700
  • 4c8353d1e4 Compare memory regions, just to be safe R. Tyler Ballance 2009-07-08 01:14:28 -0700
  • 216f5bc10d Add a small test binary to encrypt random data *a lot* R. Tyler Ballance 2009-07-08 01:08:31 -0700
  • a603a31daa Prevent accidental attempts to re-initialize the secure memory pool R. Tyler Ballance 2009-07-07 16:56:12 -0700
  • a27592b5cc Author info R. Tyler Ballance 2009-07-07 14:55:33 -0700
  • b941e5cd9b Add some basic README junk R. Tyler Ballance 2009-07-07 14:53:46 -0700
  • fe51db906c Move the markdwon readme to reStructured text R. Tyler Ballance 2009-07-07 14:47:09 -0700
  • 1c26e1db55 Add basic Sphinx-based documentation R. Tyler Ballance 2009-07-07 14:43:58 -0700
  • 1f9568b99a Compile, *then* commit. Stupid semi-colons R. Tyler Ballance 2009-07-07 12:22:42 -0700
  • b9d319695e Missing jumps to return early from the function R. Tyler Ballance 2009-07-07 12:14:05 -0700
  • fe1701e05d Free the decrypted data object in the test as well R. Tyler Ballance 2009-07-07 12:13:21 -0700
  • ecfde56e57 Ensure we're not inadvertantly returning a half-allocated ECC_Data struct R. Tyler Ballance 2009-07-07 11:57:02 -0700
  • c6442de86a Cleanup the encrypt test, add a couple more assertions to be safe R. Tyler Ballance 2009-07-07 11:56:47 -0700
  • 578c5b7a04 Forgot to remove the no-longer necessary assertion in ECC.encrypt() R. Tyler Ballance 2009-07-07 11:20:10 -0700
  • debcea0d43 Make sure we're relying on the C API for the string length instead of len() which will only read to a NULL byte R. Tyler Ballance 2009-07-07 11:16:52 -0700
  • 378b80fd6a Add a couple error condition tests R. Tyler Ballance 2009-07-07 11:16:22 -0700
  • 5057d4028e Add a simplistic GC test case R. Tyler Ballance 2009-07-06 10:12:51 -0700
  • 6994400add Reduce the number of loops, no need to run as many now that debugging is over R. Tyler Ballance 2009-07-06 10:12:24 -0700
  • fc99bcd337 Add a wee bit more documentation R. Tyler Ballance 2009-07-06 10:02:39 -0700
  • ac24a736af Add some malloc() error checking R. Tyler Ballance 2009-07-06 08:02:17 -0700
  • 7be6b1b247 Fix a bad cast caught with clang(1) R. Tyler Ballance 2009-07-06 06:08:11 -0700
  • cf6646f6b9 Add a *lot* more loops to find more leaks R. Tyler Ballance 2009-07-06 05:33:48 -0700
  • 9f65db74b0 Forcefully end the decrypted data string with a null byte R. Tyler Ballance 2009-07-06 05:32:52 -0700
  • 612e112938 Set data member to NULL to make sure we can conditionalize against it later R. Tyler Ballance 2009-07-06 04:48:50 -0700
  • 99dcb2a214 Print out the errno that's running around (for debug) R. Tyler Ballance 2009-07-06 04:48:26 -0700
  • 64ff45319d Fix a leak underneath seccure's decompress_string() function (used heavily by ecc_encrypt()) R. Tyler Ballance 2009-07-06 04:39:32 -0700
  • 19d0796a77 Document some of the usage of pointers, etc R. Tyler Ballance 2009-07-06 04:37:05 -0700
  • 469d8c55e4 Set point members to NULL, just in case >_> R. Tyler Ballance 2009-07-06 04:36:28 -0700
  • 927e807510 Print out an error message if our hmac init fails R. Tyler Ballance 2009-07-06 04:35:34 -0700
  • f23f27e6fc Add another test case to generate a boatload of keys R. Tyler Ballance 2009-07-02 11:29:43 -0700
  • e6f02ae624 Print timestamps just for kicks R. Tyler Ballance 2009-07-02 10:50:44 -0700
  • d9facbd6bb The behavior of generating different encrypted results is correct R. Tyler Ballance 2009-07-02 10:45:51 -0700
  • 310798b48d Working on (currently failing) test to verify the ecc_encrypt() results' consistency R. Tyler Ballance 2009-07-02 10:33:27 -0700
  • e5db992e29 Make sure we NULL the pointers after freeing R. Tyler Ballance 2009-07-02 10:33:20 -0700
  • c33f0e64ac Ensure ecc_serialize_private_key() is null-terminating our string R. Tyler Ballance 2009-07-01 15:15:33 -0700
  • 8eb6363b93 I find all these values informative, I'm printing them, ha! R. Tyler Ballance 2009-07-01 15:15:16 -0700
  • 7e65949e7b Ensure the released pointer gets set to NULL, lest we double free! :( R. Tyler Ballance 2009-07-01 14:58:28 -0700
  • 1eb11436be Minor bit of documentation on the returned tuple from py_keygen() R. Tyler Ballance 2009-07-01 14:01:36 -0700
  • c04327333d Use ecc_new_keypair_s() in py_new_keypair() since we're given the lengths by Python R. Tyler Ballance 2009-07-01 14:01:15 -0700
  • 2fcc6a76ae Return the curve as the third parameter, not the keypair R. Tyler Ballance 2009-07-01 12:19:16 -0700
  • 4523a8785f Remove Python bindings for generating a public key based on a user-specified public key R. Tyler Ballance 2009-07-01 12:18:53 -0700
  • 5f0aa3d8e2 Pass the curve back in the generated ECC object R. Tyler Ballance 2009-07-01 11:36:25 -0700
  • d58c300738 Separate the deserialize_mpi() and hash_to_exponent() calls R. Tyler Ballance 2009-07-01 11:04:37 -0700
  • 85286ab7c6 Add the correct testing values to the PyUnit tests R. Tyler Ballance 2009-07-01 10:49:33 -0700
  • 6e27088af3 Add private key serialization function, hook up to pu_keygen R. Tyler Ballance 2009-06-30 23:53:07 -0700
  • f89c00de0f Make sure we're deserializing the mpi if that's what we get, otherwise we should be in keygen mode and be calling hash to exponent R. Tyler Ballance 2009-06-30 23:46:36 -0700
  • e373c5d622 Initialize pub_butes to zero R. Tyler Ballance 2009-06-30 21:13:53 -0700
  • ef4e8cd256 Add a couple ecc_free_keypair() calls here and there R. Tyler Ballance 2009-06-30 21:11:05 -0700
  • ae08078f20 Revert "Revert "Stop passing private key thorugh a SHA-512 block prior to hash_to_exponent()"" R. Tyler Ballance 2009-06-30 19:58:13 -0700
  • 78a13c867d Revert "Stop passing private key thorugh a SHA-512 block prior to hash_to_exponent()" R. Tyler Ballance 2009-06-30 19:55:10 -0700
  • 9c38476aa3 Accidentally pruned this at some point causing the ecc_verify() function to fail miserably R. Tyler Ballance 2009-06-30 19:45:51 -0700
  • 553cd2ecf6 Correct warnings, copypasta fail R. Tyler Ballance 2009-06-30 19:45:29 -0700
  • 097b245c2c Revert "Cleanup mixin_key_and_curve to be more gdb friendly" R. Tyler Ballance 2009-06-30 19:40:19 -0700
  • 704dbf7663 Stop passing private key thorugh a SHA-512 block prior to hash_to_exponent() R. Tyler Ballance 2009-06-30 19:25:34 -0700
  • 9b674cae84 Clean up misc use of strlen() here and there, some places it's still needed however R. Tyler Ballance 2009-06-30 19:09:57 -0700
  • 3805ab8891 Use ecc_new_keypair_s() like I should instad of relying on strlen() in ecc_new_keypair() R. Tyler Ballance 2009-06-30 19:03:11 -0700
  • ba55608cdb Randomize the right number of bytes, i.e. 384B instead of 384b R. Tyler Ballance 2009-06-30 19:02:48 -0700
  • 54cbf24fb6 Update the DEFAULT_SIG with that generated with the DEFAULT_PUBKEY and DEFAULT_PRIVKEY using seccure-sign R. Tyler Ballance 2009-06-30 15:52:38 -0700
  • 0c9e1422dc Shuffle pieces around, generate a random buffer and then rely on ecc_new_keypair to generate the appropriate hash for it R. Tyler Ballance 2009-06-30 15:46:06 -0700
  • 22a041ad16 Avoid strlen() since there may be null bytes in here R. Tyler Ballance 2009-06-30 15:25:11 -0700
  • ee8badddff Force generating the private key hash, FML R. Tyler Ballance 2009-06-30 15:24:58 -0700
  • c9bee81a29 Prune now unnecessary defines R. Tyler Ballance 2009-06-30 15:24:36 -0700
  • fd886ff652 Gut all hopes of using a gcry_mpi_t for the internal representation of the public key R. Tyler Ballance 2009-06-30 15:08:42 -0700
  • 75fdb6b19a Cleanup mixin_key_and_curve to be more gdb friendly R. Tyler Ballance 2009-06-30 12:07:24 -0700
  • dcde2edffd Remove the highly experimental libgcrypt-based key generation and opt instead for seccure-based R. Tyler Ballance 2009-06-30 11:46:15 -0700
  • 3887cba8db Abstract out the pertinent pieces of decompress_from_string() that do some mpi massaging R. Tyler Ballance 2009-06-30 09:29:10 -0700
  • dff46a1e11 Revert "Work in progres code to hijack libgcrupt's ecc sign implementation" R. Tyler Ballance 2009-06-30 08:21:44 -0700
  • d2c5b6cb7e Work in progres code to hijack libgcrupt's ecc sign implementation R. Tyler Ballance 2009-06-30 01:15:34 -0700
  • ac4497f631 Bounce a proper hex encoded gcry_mpi_t back out of keygen R. Tyler Ballance 2009-06-30 01:08:18 -0700
  • eec9a79031 Rename function to be an even more generic shortcut for HEXifying a gcry_mpi_t R. Tyler Ballance 2009-06-30 01:05:47 -0700
  • b819bfa3ac Switch key generation entirely over gcry_mpi_t generation R. Tyler Ballance 2009-06-30 00:50:40 -0700
  • c079584f42 Move ecc_private_to_str() to a generic key->str function R. Tyler Ballance 2009-06-29 16:17:48 -0700
  • 6aec64c302 Disable passphrase-based key generation, switch cover over to expect keypairs as gcry_mpi_t's R. Tyler Ballance 2009-06-29 16:16:32 -0700
  • 5dcfae61aa Move ECC_KeyPair to just exist as a container for gcry_mpi_t objects] R. Tyler Ballance 2009-06-29 16:15:41 -0700
  • 1f0f30a557 Add encrypt/decrypt calls to test_GenerateBoth to verify the keys work R. Tyler Ballance 2009-06-29 12:46:10 -0700