Home | History | Annotate | Download | only in libtomcrypt

Lines Matching full:now

3          so the code should be considered frozen now.
56 -- Fixed LTC_ECC_TIMING_RESISTANT so it once again builds properly (pt add/dbl are through the plugin now)
72 Decoder [non-flexi decoder that is] is more strict now and requires a match.
95 -- Made it so many functions which return CRYPT_BUFFER_OVERFLOW now also indicate the required buffer size, note that not all functions
100 v1.12 -- Fixed OID encoder/decoder/length to properly handle the first two parts of an OID, matches 2002 X.690 now.
101 -- [Wesley Shields] Allows both GMP/LTM and TFM to be defined now.
102 -- [Wesley Shields] GMP pluggin is cleaner now and doesn't use deprecated symbols. Yipee
118 -- lrw_process now checks the return of the cipher ecb encrypt/decrypt calls
187 -- ecc_decrypt_key() now uses find_hash_oid() to clean up the code ;-)
191 -- ECC timing demo now capable of detecting which curves have been defined
198 -- ecc_import() now checks if the point it reads in lies on the curve (to prevent degenerative points from being used)
199 -- ECC code now ALWAYS uses the accelerator interface. This allows people who use the accelerators to not have the stock
214 -- Made the ECC code fully public (you can access ecc_mulmod directly now) useful for debuging
218 -- rsa_import() can now read OpenSSL format DER public keys as well as the PKCS #1 RSAPublicKey format.
221 -- Ported tv_gen to new framework (and yes, I made ecc vectors BEFORE changing the API and YES they match now :-))
268 -- Removed redundant mu and point mapping in ecc_verify_hash() so it should be a bit faster now
276 -- RSA, DSA and ECDSA now use the DER SEQUENCE code (saves a lot of code!)
277 -- DSA output is now a DER SEQUENCE (so not compatible with previous releases).
284 -- The "no_oops" target (part of zipup) now scans for non-cvs files. This helps prevent temp/scratch files from appearing in releases ;-)
289 -- Sorted asn1/der/ directory ... less of a mess now ;-)
296 -- ECC code now uses Montgomery reduction ... it's even faster [ECC-256 make key down from 37.4M to 4.6M cycles on an Athlon64]
299 -- ECC key export is now a simple [and documented] SEQUENCE, the "encrypt_key" also uses a new SEQUENCE format.
310 -- "pt/ct" can now be NULL in gcm_process() if you are processing zero bytes
327 -- Made invalid ECC key sizes (configuration) not hard fault the program (it returns an error code now)
330 -- Added CCM mode to the encauth list (now has EAX, OCB and CCM, c'est un treo magnifique!)
331 -- Added missing ASN.1 header to the RSA keys ... oops... now the rsa_export/import are FULLY compatible
333 -- Manually merged in fix to the prime_random_ex() LTM function that ensures the 2nd MSB is set properly. Now
337 -- Updated API for ECB and CBC shell code. Now can process N whole blocks in one call (like $DEITY intended)
339 calls. Later on dependent code (e.g. OMAC, CCM) will be re-written to use the generic cbc/ctr functions. But now
342 -- Now ships with 20% more love.
343 -- x86_prof now uses ECB shell code (hint: accelerators) and outputs cycles per BLOCK not byte. This will make it a bit
357 -- Added CCM acelerator callbacks to the list [now supports ECB, CTR, CBC and now CCM].
360 -- LTC_NO_ASM is now the official "disable all non-portable stuff" macro. When defined it will make the code endian-neutral,
367 -- x86_prof builds and runs with IntelCC fine now
369 -- Moved testing/benchmark into testprof directory and build it as part of the build. Now you can link against libtomcrypt_prof.a to get
394 now
400 Now just include "tomcrypt.h" instead of "mycrypt.h" to get LTC ;-)
417 is not root. Now the makefiles allow this to be changed easily.
435 E.g. ciphers keys are called "skey" consistently now. The input to PK encryption is called "in", etc.
439 -- DSA sign/verify now uses DER encoded output/inputs and no LTC style headers.
459 -- RSA is now fully joy. rsa_export/rsa_import use PKCS #1 encodings and should be
473 -- Added test functions to PRNG api, RC4 now conforms ;-) [was a minor issue]
476 -- Changed RC4 back [due to request]. It will now XOR the output so you can use it like
522 fix pkcs_5_2(). It now matches the output of another crypto library. Whoops... hehehe
529 ++ API change for the PRNGs there now is a done() function per PRNG. You
574 -- rsa_exptmod() now pads with leading zeroes as per I2OSP.
579 -- refactored AES, now sports an "encrypt only" descriptor which uses half as much code space.
593 -- Worked over AES so that it's even smaller now [in both modes].
604 -- DSA/RSA now makes composites of the exact size desired.
631 -- Made SAFER default to disabled for now (plans are to cleanhouse write an implementation later)
647 -- CTR mode supports big and little [default] endian counters now.
661 -- Re-wrote the twofish large key generation [the four 8x32 key dependent tables]. Now about twice as fast.
662 With both optimizations [e.g. TWOFISH_ALL_TABLES defined] a 128-bit Twofish key can now be scheduled
667 -- Fixed up demos/x86_prof so it sorts the output now :-)
668 -- The project is now powered by radioactive rubber pants.
681 -- Added stack cleaning to rijndael, cast5 so now all ciphers have CLEAN_STACK code.
684 -- Added mechanical testing to cipher test vector routines. Now it encrypts 1000 times, then decrypts and
688 The code now builds with any config. Thanks.
694 conversion [now returns CRYPT_MEM, will fix it up better later]
701 -- Added OMAC/HMAC tests to demos/tv_gen and I now store the output of this in notes/
704 would not support that (does now just like the new OMAC code).
727 -- hmac_done() now requires you pass it the size of the destination buffer to prevent
729 -- hmac/hash filebased routines now return CRYPT_NOP if NO_FILE is defined.
794 test from LibTomMath now
796 -- Removed ampi.o from the depends cuz it ain't no not working in *nix with it [routines are in mpi.c now].
805 errors now.
821 operations on 521-bit keys now (translates to about 8ms on my Athlon XP). I also now use barrett reduction
823 -- Fixed a huge flaw in ecc_verify_hash() where it would return CRYPT_OK on error... Now fixed.
845 -- Fixed up the PK code to remove all use of mp_toraw() and mp_read_raw() [get all the changes out of the way now]
850 -- Spruced up the config.pl script. It now makes a header file "mycrypt_custom.h" which can be included *before*
854 -- Also made all the internal functions of MPI are now static to avoid poluting the namespace
878 -- Fixed up the ECC point multiplication, its about 15% faster now
887 -- Made "aes" an alias for Rijndael via a pre-processor macro. Now you can use "aes_ecb_encrypt", etc... :-)
900 -- Optimized AES slightly for 256-bit keys [only one if statement now, still two for 192-bit keys]
902 -- Changed the primality routines around. I now use 8 rounds of Rabin-Miller, I use 256 primes in the sieve
907 with v0.76. Essentially insteading of exporting the setting index like before I export the key size. Now
954 -- the MSVC makefile will now build for a SPACE optimized library rather than TIME optimized.
967 v0.71 -- HELP TOM. I need tuition for the January semester. Now I don't want to force donations [nor will I ever]
1028 -- Note I forgot to change the CRYPT version tag in v0.68... fixed now.
1032 -- Fixed bug in kr_find_name that used memcmp to match strings. Uses strncmp now.
1033 -- kr_clear now sets the pointer to NULL to facilate debugging [e.g. using the keyring after clearing]
1034 -- static functions in _write/_read in keyring.c now check the return of ctr_encrypt/ctr_decrypt.
1056 -- The ECB/CBC/OFB/CFB/CTR wrappers now check that the cipher is valid in the encrypt/decrypt calls
1057 Returns int now instead of void.
1066 Code ships in unix LF format by default now too... will still build in MSVC and all... but if you want
1115 now they only make one call to ctr_encrypt()/ctr_decrypt().
1122 -- The rsa_exptmod() function will now more reliably detect invalid inputs (e.g. greater than the modulus).
1125 145 byte (1160 bits) modulus. This is all in the manual now.
1130 MD4 process() now handles input buffers > 64 bytes
1135 -- fixed a couple of places where descriptor indexes were tested wrong. Not a huge bug but now its harder
1148 v0.54 -- Blowfish now conforms to known test vectors. Silly bad coding tom!
1149 -- RC5/RC6/Serpent all have more test vectors now [and they seemed to have been working before]
1152 v0.53 -- Added more test vectors to the blowfish code just for kicks [and they are const now too :-)]
1154 with an invalid index ever now.
1158 v0.52 -- Fixed a bug in MD4 where the hash descriptor ID was the same as SHA-512. Now MD4 will work with
1172 -- the packet.c code now makes crypt_error literal string errors when an error occurs
1174 -- fixed a huge bug in Twofish with the TWOFISH_SMALL define. Because I clean the stack now I had
1176 g_func() function which caused it not to work... [does now :-)]
1189 placed in ROM not RAM now.
1192 alot of variables it will clean up better. Functions like the ecb serpent and twofish code will now have their
1196 For example, the MD5/SHA1 code now uses all of the test vectors from the RFC/FIPS spec.
1220 v0.42 -- The RNG code can now use /dev/urandom before trying /dev/random (J. Klapste)
1226 -- Made registry code for the PRNGs as well [now the smallest useable link is 43kb]
1230 -- I'm developing in Linux now :-)
1237 v0.38 -- CFB and OFB modes can now handle blocks of variable size like the CTR code
1243 use the next lower key supported. (mainly for the PK code). So you can now use SHA-1 with
1245 -- Added more options for Twofish. You can now tell it to use precomputed sboxes and MDS multiplications
1260 you used an ID=0 [i.e blowfish or sha256] in any routine. Now it checks for that and will
1267 is about 2^191.99, so instead I rounded down and used a 184-bit secret key. Now I simply use a full 192-bit
1270 -- Made the configuration a bit simpler and more exacting. You can for example now select which DH or ECC
1274 -- Jason Klapste submitted bug fixes to the yarrow, hash and various other issues. The yarrow code will now
1298 if you want a 1024-bit prime it would make a 1023-bit one. Now it ensures that the prime
1316 v0.31 -- The RSA routines can now use CRT to speed up decryption/signatures. The routines are backwards
1319 rsa_exptmod() function itself if you're not careful. That's fixed now. Fixed another bug in
1329 cancel out. Now I hash the pool with the new data which is way smarter.
1344 -- Updated the is_prime() function to use a new prototype [it can return errors now] and it also
1386 -- gf_shl() and gf_shr() are safe on 64-bit platforms now
1394 efficiently in "ecc_mulmod()" now.
1395 -- sped up [and documented] the rand_prime() function. Now it just
1417 error checking now
1435 -- Library now has polynomial-basis GF(2^w) routines I wrote myself. Can be used to perform
1442 -- base64_encode() now appends a NULL byte, um "duh" stupid mistake now fixed...
1458 -- hash_file() clears stack now [like it should]
1464 -- The hashes now wipe the "hash_state" after the digest is computed. This helps
1474 -- ECC now compresses the public key, a ECC-192 public key takes 33 bytes
1488 for the exponent... now it makes the full 768 bits [or whatever the case
1498 -- Switched everything to use typedef's now to clear up the code.
1504 -- Started adding a RNG to the library. Right now it tries
1508 -- the RNG can also automatically setup a PRNG as well now