summaryrefslogtreecommitdiff
path: root/NEWS
AgeCommit message (Collapse)AuthorFilesLines
2011-06-13Fixed a pkcs#1 v1.5 flaw regarding leading zero bytesWerner Koch1-1/+3
With these changes the entire new pkcs#1 test suite passes fine. The leading zero bytes used to appear due to mixed signed/unsigned use of our internal representation of the values as MPIs. The changed code also detected another bug in the DSA selftest which used the pkcs1 flag - this was certainly wrong but didn't throw an error. The code in GnuPG does the right thing thus I believe not too many applications got it as wrong as we in our own selftest.
2011-06-10Fixed leading zero problems in PSS and OAEP.Werner Koch1-3/+7
2011-06-09Add random-override parameter to the PK functions to allow better regression ↵Werner Koch1-2/+2
testing.
2011-05-11Add missing ChangeLogsWerner Koch1-0/+4
2011-04-11CTR mode may now be used with arbitrary long data chunks.Werner Koch1-0/+2
2011-03-09New function gcry_kdf_deriveWerner Koch1-0/+4
This allows us to factor the S2k code from gpg and gpg-agent out to libgcrypt. Created a bunch of test vectors using a hacked gpg 1.4. The function also implements PBKDF2; tested against the RFC-6070 test vectors.
2011-02-22Use AES-NI insns for CTR mode.Werner Koch1-4/+7
That really boosts the performance of CTR.
2011-02-21Final changes for 1.5.0-beta1Werner Koch1-18/+19
2011-02-17Flag the _ac_ functions as deprecated.Werner Koch1-0/+10
The AC functions are deprecated for a long time. How we will even print a warning if they are used. The module register interface is now also deprecated and the use of those functions will yield a warning as well.
2011-02-16Add GCRYCTL_DISABLE_HWFWerner Koch1-0/+1
This option is useful to disable detected hardware features. It has been implemented in benchmark, so that it is now possible to run tests/benchmark --disable-hwf intel-aesni cipher aes aes192 aes256 to compare the use of AES-NI insns to the pure C code.
2011-02-13First take on using AES-NI instructionsWerner Koch1-0/+2
This first naive use of the new Intel AES-NI instructions boosts the performance of AES on CPUs supporting this by 3 to 5 times. Results from running ./benchmark --cipher-repetitions 10 --large-buffers cipher aes on a cpu family : 6 model : 37 model name : Intel(R) Core(TM) i5 CPU 660 @ 3.33GHz stepping : 2 cpu MHz : 3325.494 cache size : 4096 KB cpu cores : 2 yields this: ECB/Stream CBC CFB OFB CTR --------------- --------------- --------------- --------------- --------------- 130ms 110ms 110ms 100ms 110ms 110ms 160ms 150ms 170ms 170ms 40ms 40ms 20ms 30ms 30ms 20ms 70ms 70ms 80ms 80ms The first line is with runtime switched off AES-NI instructions (don't set use_aesni in do_setkey), the second with enabled AES-NI. By fixing the alignment, I hope to squeeze out a little more even with this naive implementation.
2011-02-04Nuked almost all trailing whitespace.Werner Koch1-12/+12
Check and install the standard git pre-commit hook.
2011-02-01Add function gcry_pk_get_param.Werner Koch1-2/+3
Also changed quite some trailing white spaces. I never configured that in Emacs but git diff annoys me with red lines and thus it seems better to use nuke-trailing-whitespace autmatically. Sorry for the extra diff lines. A diff filter should help to not show those changes.
2011-02-01Handle opaque MPIs in gcry_mpi_cmpWerner Koch1-1/+4
2011-02-01Add gcry_pk_get_curve.Werner Koch1-0/+3
2011-01-31Changed ecdh parameter names and fixed MPI allocation.Werner Koch1-0/+2
2011-01-20Revert version number to 1.5.0.Werner Koch1-0/+2
Update AUTHORS and NEWS.
2010-03-26Add new TIGER variantsWerner Koch1-0/+4
2010-01-21Support WindowsCE.Werner Koch1-0/+2
2010-01-21Add an identifier for ECDH.Werner Koch1-6/+7
Fixed some NEWS entries. Updated copyright lines.
2009-12-11Boost performance of SHA-512 and SHA-256.Werner Koch1-0/+3
2009-12-10Cleaned up the cipher encrypy/decrypt constraints checks.Werner Koch1-0/+8
2009-12-09Implemented the AES-Wrap algorithmWerner Koch1-0/+6
2009-01-22Prepare for new developments.Werner Koch1-0/+4
2009-01-22PreparingWerner Koch1-3/+4
2008-12-10Allow speicification of domain parameters for DSA key generation.Werner Koch1-0/+3
Doc updates. Allows the use of the strings AES-128, AES-192, AES-256 to specify AES algorithms.
2008-11-25Implement FIPS 186-2 key generation.Werner Koch1-0/+3
2008-11-05Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes.Werner Koch1-0/+2
2008-11-05Add a method to disable the weak key detection.Werner Koch1-1/+1
Add a method to return the current input block. Use this in the FIPS driver.
2008-10-24Do no restrtc usage of MD5 in fips mode.Werner Koch1-0/+2
2008-10-02Add CAVS test.Werner Koch1-0/+7
Various minor fixes. Sigbus fixes for AES.
2008-09-18Preparing a releaseWerner Koch1-3/+5
2008-09-18Implemented an Enforced FIPS mode.Werner Koch1-1/+6
Documentation updates.
2008-09-15Use syslog to log important messages.Werner Koch1-0/+9
Add an external RNG test hook.
2008-09-15doc cleanups.Werner Koch1-0/+4
2008-09-09Add more selftests.Werner Koch1-0/+4
2008-09-08doc cleanupsWerner Koch1-1/+1
2008-09-03Updated the NEWS file.Werner Koch1-4/+7
2008-08-26Implemented transient-key flag as requested by the GNUNet folks.Werner Koch1-2/+3
Documentation cleanups. Removed FIPS logging unless in double verbose state.
2008-08-20Implemented gcry_mpi_lshift.Werner Koch1-2/+1
Reordered some code in mpi-bit.c
2008-08-19Adding gcry_mpi_lshift.Werner Koch1-3/+9
Preparing a release candidate.
2008-08-19A whole bunch of changes to eventually support Werner Koch1-0/+19
FIPS restricted mode. Also some documentation improvements and other minor enhancements. See the ChangeLogs. Stay tuned.
2008-04-25post release updatesWerner Koch1-0/+4
2008-04-25Preparing the releaseWerner Koch1-2/+2
2008-04-22Preapring a release candidateWerner Koch1-1/+3
2008-04-18Collected changes. See ChnageLogs.Werner Koch1-1/+1
2008-03-17Better AES performance.Werner Koch1-2/+4
2008-01-08Manual and comment fixes.Werner Koch1-0/+2
Fixed a entropy wasting bug.
2007-12-11Small build fixes from Tim Mooney.Werner Koch1-0/+5
2007-12-10Preparing 1.4.0.Werner Koch1-1/+4