summaryrefslogtreecommitdiff
path: root/lib/Crypto/SelfTest/Signature
Commit message (Collapse)AuthorAgeFilesLines
* Get rid of catch-all exceptions. LP#1178485.Richard Mitchell2014-06-221-2/+2
|
* Removed most 'import *' statementsLegrandin2013-10-202-2/+4
| | | | | | | | | | | | [dlitz@dlitz.net: Re-ordered commits; so don't import S2V yet] [dlitz@dlitz.net: Included an additional 'import *' change from the following commit:] commit 4ec64d8eaaa4965889eb8e3b801fc77aa84e0a4e Author: Legrandin <helderijs@gmail.com> Date: Tue Sep 10 07:28:08 2013 +0200 Removed last references to ApiUsageError [dlitz@dlitz.net: Removed unrelated whitespace changes]
* whitespace changes (pre-AEAD)Legrandin2013-10-201-1/+1
| | | | | | | [dlitz@dlitz.net: Whitespace changes extracted from the author's pull request:] - [9c13f9c] Rename 'IV' parameter to 'nonce' for AEAD modes. - [4ec64d8] Removed last references to ApiUsageError - [ee46922] Removed most 'import *' statements
* Added unit tests for bugfix #1119552Legrandin2013-07-141-0/+27
|
* Hash: Rename SHA->SHA1 and RIPEMD->RIPEMD160 (1/2)Dwayne Litzenberger2013-02-162-11/+11
| | | | | | | | | These algorithm names were confusing, because there are actually algorithms called "SHA" (a.k.a. SHA-0) and "RIPEMD" (the original version). This commit just renames the modules, with no backward-compatibility support.
* Merged from upstream (py3k support) and modified so that all unit tests pass.Legrandin2011-10-182-27/+31
|
* Added Lorenz Quack's native C implementation of all SHA-2 algorithmLegrandin2011-10-162-11/+11
| | | | | | | | | (as submitted here https://bugs.launchpad.net/pycrypto/+bug/544792) so that they are available also in Python 2.1, 2.2, 2.3 and 2.4. Regardless where the implementation comes from (Python standard library or our native modules, depending on the Python version), all Crypto.Hash objects are always used as front-ends.
* Restructure both PKCS#1 signature schemes as objects.Legrandin2011-10-162-15/+30
| | | | Fixed the can_sign() methods.
* To simplify, no RNG needs to be provided with PKCS1 encryption: the one ↵Legrandin2011-10-021-23/+38
| | | | | | | belonging to each RSA key is reused. Error detection is internally implemented in a simpler (and safer) way for PKCS1 OAEP decryption. General fixes to documentation for PKCS1.
* Make PKCS#1 and its test cases work with Python 2.1Legrandin2011-02-071-0/+2
|
* More test cases for PKCS#1Legrandin2011-02-072-4/+73
|
* First fully tested version of Crypto.Signature.PKCS1_PSSLegrandin2011-02-062-0/+363
|
* Tab to space conversionLegrandin2011-02-061-72/+72
|
* Make tests compatible to Python 2.1Legrandin2011-02-031-1/+3
|
* Add tests for PKCS#1 v1.5Legrandin2011-02-032-0/+235