Ecosyste.ms: OpenCollective

An open API service for software projects hosted on Open Collective.

cert-manager

cert-manager is a Kubernetes add-on to automate the management and issuance of TLS certificates.
Collective - Host: opensource - https://opencollective.com/cert-manager - Website: https://cert-manager.io - Code: https://github.com/cert-manager

acme/autocert: extend default value of RenewBefore

This change amends the default renewal to 30 days before cert expiration,
as recommended by vari...

github.com/cert-manager/crypto - 0242f07995e684be54f2a2776327141acf1cef91 authored over 7 years ago by Alex Vaghin <[email protected]>
ssh/knownhosts: add file + linenumber for parse errors

Change-Id: Iddcb145ecd8a6b51c72ad3d77b242975baf4a5cf
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - 91492a32430c88e1dd9c977684f7bea5712636cc authored over 7 years ago by Han-Wen Nienhuys <[email protected]>
ssh/knownhosts: support hashed hostnames

Change-Id: I855a6542a2eb2ae1d223f03892c0f19da81a4f8d
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - 64205593f25ab0ca0ac8f40914760074bf246f65 authored over 7 years ago by Han-Wen Nienhuys <[email protected]>
acme/autocert: extract Manager example from comments

Ensures that it compiles and makes it more discoverable in godoc.

Change-Id: I50a3deb23110017d0...

github.com/cert-manager/crypto - 12c985af8526c1f6f0c463bbfd9d69623d13b323 authored over 7 years ago by Ross Light <[email protected]>
ssh/knownhosts: fix variable reuse bug in checkAddrs

Consider the following code:
var p *int
a := []int{0, 1, 2, 3}
for _, i := range a {
if i =...

github.com/cert-manager/crypto - efac7f277b17c19894091e358c6130cb6bd51117 authored over 7 years ago by Joe Tsai <[email protected]>
acme: automatically retry on badNonce errors

After receiving a badNonce error, the call can be safely retried. Nonce
errors can happen unexpe...

github.com/cert-manager/crypto - cbc3d0884eac986df6e78a039b8792e869bff863 authored over 7 years ago by James Hartig <[email protected]>
ssh/knownhosts: a parser for the OpenSSH known_hosts file format

Change-Id: I271c90ff3a6d59e2e075c785a6bdb79e4b0849fa
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - ed779e1bec0180cdfce8135ca6558067b388777b authored over 7 years ago by Han-Wen Nienhuys <[email protected]>
ssh: fix reset{Read,Write}Thresholds for initial setup

Fixes a nil pointer dereference that slipped through buildbots because
it was introduced by the ...

github.com/cert-manager/crypto - ee3d6a30834d463dd094f3e372d648e516c866a1 authored over 7 years ago by Han-Wen Nienhuys <[email protected]>
ssh: set rekeying thresholds on construction

The normal handshake kicks off with a waitSession(), which guarantees
that we never attempt to s...

github.com/cert-manager/crypto - 6119528deef5a73f6a2b18bab3ad4ec69fdec74a authored over 7 years ago by Han-Wen Nienhuys <[email protected]>
curve25519: improve cswap

Simplify the constant swap function.

On amd64: Replace the CMOVQEQ scheme with SSE2 code simila...

github.com/cert-manager/crypto - cd11541cdfcb6d51d1d78f27d596cf7bdff346f7 authored over 7 years ago by Andreas Auernhammer <[email protected]>
acme/autocert: fix context usage

Context.Err() is not valid before Context.Done().

Updates golang/go#19856

Change-Id: I7605bb22...

github.com/cert-manager/crypto - 9b9c1afcb078c2080cd1fac84be67797a33a32e9 authored over 7 years ago by Brad Fitzpatrick <[email protected]>
ssh: support MaxAuthTries on ServerConfig

This change breaks backwards compatibility.

MaxAuthTries specifies the maximum number of authen...

github.com/cert-manager/crypto - 9ef620b9ca2f82b55030ffd4f41327fa9e77a92c authored over 7 years ago by James Myers <[email protected]>
ssh: support forwarding of Unix domain socket connections

This commit implements OpenSSH streamlocal extension, providing the equivalent
of `ssh -L local....

github.com/cert-manager/crypto - 3cddcd6758340b7620ed7f7895422317fab91e45 authored over 7 years ago by Akihiro Suda <[email protected]>
acme: stop using ctxhttp

The ctxhttp package used to be big and gross before net/http supported
contexts natively. Nowada...

github.com/cert-manager/crypto - 6022e334c1a8cce46fb30629dc30e835faa3844d authored over 7 years ago by Brad Fitzpatrick <[email protected]>
x/crypto/*: add import comment

Add import comment for blake2b, blake2s, chacha20poly1305 and cryptobyte.

Change-Id: I4703b5cd6...

github.com/cert-manager/crypto - 55a552f0823e0d3d54931488a2993ebd2fd0258c authored over 7 years ago by Andreas Auernhammer <[email protected]>
acme: set correct KeyUsage and ExtKeyUsage

A certificate must have the Server Auth Extended Key Usage to be used
for TLS, and an ECDSA cert...

github.com/cert-manager/crypto - 420870623a70591d5e0b187c77c95455a1224ca6 authored over 7 years ago by Filippo Valsorda <[email protected]>
ssh: Add support for RSA keys stored in OpenSSH's new format

Adds support for parsing RSA keys in the openssh-key-v1 private key format.

Change-Id: Iacdcbaa...

github.com/cert-manager/crypto - c2303dcbe84172e0c0da4c9f083eeca54c06f298 authored over 7 years ago by Paul Querna <[email protected]>
ssh: fix format string in client_test.go

Change-Id: I92c3916b0b5628dc2079af82202d9bfef032c708
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - 9da0784e41a20a10cbd0070acb40ffcea946cb07 authored over 7 years ago by Han-Wen Nienhuys <[email protected]>
acme/autocert: add Listener

Now users can do 1-line LetsEncrypt HTTPS servers:

log.Fatal(http.Serve(autocert.NewListene...

github.com/cert-manager/crypto - b020702ab212964a017cbb8f7db52b5367017a4d authored over 7 years ago by Brad Fitzpatrick <[email protected]>
ssh: reject RekeyThresholds over MaxInt64

This fixes weirdness when users use int64(-1) as sentinel value.

Also, really use cipher specif...

github.com/cert-manager/crypto - c78caca803c95773f48a844d3dcab04b9bc4d6dd authored over 7 years ago by Han-Wen Nienhuys <[email protected]>
ssh: improve client public key authentication

Previously, the public key authentication for clients would send an
enquiry to the remote for ev...

github.com/cert-manager/crypto - 573951cbe80bb6352881271bb276f48749eab6f4 authored over 7 years ago by James Myers <[email protected]>
acme, acme/autocert: switch to Go 1.7+ context package

The standard library context package has been available since Go 1.7,
and the Go build dashboard...

github.com/cert-manager/crypto - 88915ccf7aeb91e9324fe7cf3eddd1531ced61ea authored over 7 years ago by Brad Fitzpatrick <[email protected]>
acme/autocert: context propagation and doc tweaks

Change-Id: I061b797d46097e37880bea1911475e2b2f1a0378
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - b5cf4d8d48698c1f6d3b57b8c893e580aa2a4db1 authored over 7 years ago by Brad Fitzpatrick <[email protected]>
ssh: fix typo in unexported comment

Thanks to Anisse Astier (@anisse) for noticing.

Change-Id: I1c282b2bb54601cf5649e194eafd5344c70...

github.com/cert-manager/crypto - 3cb07270c9455e8ad27956a70891c962d121a228 authored over 7 years ago by Brad Fitzpatrick <[email protected]>
ssh: handle error from prepareKeyChange.

Fixes #18850.

Change-Id: Id3ae89233f9e95ec3238462bf2ecda3e0c515f88
Reviewed-on: https://go-revi...

github.com/cert-manager/crypto - 9d2d6c1e3693239d2283279f74ed70818a325931 authored over 7 years ago by Han-Wen Nienhuys <[email protected]>
ssh: require host key checking in the ClientConfig

This change breaks existing behavior.

Before, a missing ClientConfig.HostKeyCallback would caus...

github.com/cert-manager/crypto - e4e2799dd7aab89f583e1d898300d96367750991 authored over 7 years ago by Han-Wen Nienhuys <[email protected]>
pkcs12: fix ToPEM to not ignore non-nil error from getSafeContents

Fixes golang/go#19542

Change-Id: I60d2370d1d1e0763c72c9cc203ea2ff21123af73
Reviewed-on: https:/...

github.com/cert-manager/crypto - 459e26527287adbc2adcc5d0d49abff9a5f315a7 authored almost 8 years ago by Fredrik Forsmo <[email protected]>
cryptobyte: new package.

cryptobyte is a helper library for building and parsing byte strings,
specifically for TLS and A...

github.com/cert-manager/crypto - 728b753d0135da6801d45a38e6f43ff55779c5c2 authored almost 8 years ago by Martin Kreichgauer <[email protected]>
blake2s: register BLAKE2s

Register BLAKE2s-256 if the package is imported.
Change-Id: Ib415ae641f21d863720bf9c089017ee9765...

github.com/cert-manager/crypto - 40541ccb1c6e64c947ed6f606b8a6cb4b67d7436 authored almost 8 years ago by Andreas Auernhammer <[email protected]>
blake2b: register BLAKE2b

Register BLAKE2b-256, BLAKE2b-384 and BLAKE2b-512 if the package is imported.
Change-Id: Iba425a...

github.com/cert-manager/crypto - 83de8c7b40e04b54e5b7c61396d7749eb4050ffa authored almost 8 years ago by Andreas Auernhammer <[email protected]>
poly1305: add burn-in test.

This is the test that I use to sanity-check significant changes to the
package, thus it's probab...

github.com/cert-manager/crypto - 453249f01cfeb54c3d549ddb75ff152ca243f9d8 authored almost 8 years ago by Adam Langley <[email protected]>
ocsp: fix test flakiness

The test was assuming that the OCSP creation wouldn't cross a minute
boundary, which is flakey n...

github.com/cert-manager/crypto - dd96d35c1b251a7ef77f057fc5c4f92ea2b285b4 authored almost 8 years ago by Adam Langley <[email protected]>
acme: reduce the number of network round trips

Before this change, every JWS-signed request was preceded
by a HEAD request to fetch a fresh non...

github.com/cert-manager/crypto - 92783773f0d5c65e68a806909423bea53c78df01 authored almost 8 years ago by Alex Vaghin <[email protected]>
poly1305: simplify reference implementation

Reduce code complexity by replacing the floating-point implementation
with a 32-bit implementati...

github.com/cert-manager/crypto - 537c9dfe43c8ca78e68e340fc140bca4d8bfaaa0 authored almost 8 years ago by Andreas Auernhammer <[email protected]>
blake2b: fix AVX performance problems on amd64

On some amd64 CPUs (Xeon E5-2680v4 / E5-2620v3) using SSE and AVX instructions
leads to very low...

github.com/cert-manager/crypto - f671756e047d6bc429798536b39e1bbd761e5ce5 authored almost 8 years ago by Andreas Auernhammer <[email protected]>
ssh: Add the [email protected] algorithm

Fixes golang/go#17676

Change-Id: I96c51431b174898a6bc0f6bec7f4561d5d64819f
Reviewed-on: https:/...

github.com/cert-manager/crypto - 84bacda6ede319f5074d43b5d096b7ee7f3f5d77 authored almost 8 years ago by MiLk <[email protected]>
acme/autocert: fix racy tests

memCache used an unsynchronized map, which failed go test -race. Add a
mutex and constructor fun...

github.com/cert-manager/crypto - 22ddb68eccda408bbf17759ac18d3120ce0d4f3f authored almost 8 years ago by Heschi Kreinick <[email protected]>
curve25519: avoid loss of R15 in -dynlink mode

Fixes golang/go#18820.

Change-Id: I4b3a49b3bbbecc4e1008989fefd39da9725a28ea
Reviewed-on: https:...

github.com/cert-manager/crypto - 59a182cab66ead4fe21e6472267504ac035edee2 authored almost 8 years ago by Russ Cox <[email protected]>
ssh/agent: fix another test to not require IPv4.

Missed a copy/paste of netPipe in change 36110.

Change-Id: I1a850dd9273d71fadc0519cf4cb2a2de6ec...

github.com/cert-manager/crypto - 5a6e40e042292b81de1d40719a995dc058f7cbf1 authored almost 8 years ago by Heschi Kreinick <[email protected]>
ssh: prevent double kex at connection start, 2nd try

The previous attempt would fail in the following scenario:

* select picks "first" kex from requ...

github.com/cert-manager/crypto - 77014cf7f9bde4925afeed52b7bf676d5f5b4285 authored almost 8 years ago by Han-Wen Nienhuys <[email protected]>
ssh: Support multiple source-addresses, don't require IPv4 in tests.

The ssh tests currently require 127.0.0.1 to work which isn't
necessarily available everywhere. ...

github.com/cert-manager/crypto - bed12803fa9663d7aa2c2346b0c634ad2dcd43b7 authored almost 8 years ago by Heschi Kreinick <[email protected]>
ssh: reset buffered packets after sending

Since encryption messes up the packets, the wrongly retained packets
look like noise and cause a...

github.com/cert-manager/crypto - 641ab6b32049cabca26c30bf27baaae445bf4175 authored almost 8 years ago by Han-Wen Nienhuys <[email protected]>
ssh: add debug print at the lowest level

This is a simple minded, fast print, suitable for debugging timing
sensitive issues.

Change-Id:...

github.com/cert-manager/crypto - b05791f2e11c76a1ca25fd2181cc059e14bceeaa authored almost 8 years ago by Han-Wen Nienhuys <[email protected]>
poly1305: add test vectors for edge cases

Often intermediate results of poly1305 calculations are only reduced to
the range [0, 2^130). Th...

github.com/cert-manager/crypto - dc137beb6cce2043eb6b5f223ab8bf51c32459f4 authored almost 8 years ago by Michael Munday <[email protected]>
ssh: rationalize rekeying decisions.

1) Always force a key exchange if we exchange 2^31 packets. In the past
this might not happen if...

github.com/cert-manager/crypto - a59c127441a8ae2ad9b0fb300ab36a6558bba697 authored almost 8 years ago by Han-Wen Nienhuys <[email protected]>
ssh: make sure we execute the initial key exchange only once

The initial kex is started from both sides simultaneously, and before,
we could consume the the ...

github.com/cert-manager/crypto - 6fb066875c8002ccd49dbd9a16b522711cb8f59d authored almost 8 years ago by Han-Wen Nienhuys <[email protected]>
crypto/chacha20poly1305: rename test vectors file

The previous name did not have the '_test.go' suffix and so was
always built.

Change-Id: I2d18d...

github.com/cert-manager/crypto - 854ae91cdcbf914b499b1d7641d07859f3653481 authored almost 8 years ago by Michael Munday <[email protected]>
crypto/chacha20poly1305/internal/chacha20: add missing copyright header

The file was originally added in 2016.

Change-Id: I1b5c01400fb73e83f39c086ea1235a948d27308d
Rev...

github.com/cert-manager/crypto - 33e8e8f6b3794a88c6c02f6a6b960ba5282be246 authored almost 8 years ago by Michael Munday <[email protected]>
ssh: soft code internal channel size for testing purposes

Change-Id: I2ee0ed4ba82d2d156a7896551dea04b28cdeceb0
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - 41d678d1df78cd0410143162dff954e6dc09300f authored almost 8 years ago by Han-Wen Nienhuys <[email protected]>
otr: add missing return on error path

Due to a missing return, corrupt TLV data would cause an infinite loop
that consumes memory, eve...

github.com/cert-manager/crypto - b8a2a83acfe6e6770b75de42d5ff4c67596675c0 authored almost 8 years ago by Adam Langley <[email protected]>
otr: reject private keys with parameters <= 0.

This serves as a basic sanity check and also prevents malformed private
keys from setting P=0 an...

github.com/cert-manager/crypto - 88e46b5e95a3e892175609288157d467d21ba2e5 authored almost 8 years ago by Adam Langley <[email protected]>
crypto/ssh: fix parsing order for ssh.ParseDSAPrivateKey

The inline struct has the wrong order for the public and private key parts.

Change-Id: Ib3a5d68...

github.com/cert-manager/crypto - b82246307bd525fde15c1df976318003716bca68 authored almost 8 years ago by Paul Querna <[email protected]>
ssh/terminal: consume data before checking for an error.

According to the io.Reader docs, Alex had it right the first time. (See
discussion on https://go...

github.com/cert-manager/crypto - 91902e332b9d47760598861512d2ae148f94ca58 authored almost 8 years ago by Adam Langley <[email protected]>
ssh/terminal: fix line endings handling in ReadPassword

Fixes golang/go#16552

Change-Id: I18a9c9b42fe042c4871b3efb3f51bef7cca335d0
Reviewed-on: https:/...

github.com/cert-manager/crypto - 13d9f6188e639cb843a0568d05540a4cec71cc14 authored almost 8 years ago by Alex Brainman <[email protected]>
ssh: rewrite (re)keying logic.

Use channels and a dedicated write loop for managing the rekeying
process. This lets us collect...

github.com/cert-manager/crypto - 2e74c773682f59dc50a56475f7918dd8fa6dcaf8 authored almost 8 years ago by Han-Wen Nienhuys <[email protected]>
poly1305: make data declared in assembly files private

Update golang/go#18673.

Change-Id: I3ba89bab42f17e6fd7005df40c7a853aef1fda37
Reviewed-on: https...

github.com/cert-manager/crypto - abc5fa7ad02123a41f02bf1391c9760f7586e608 authored almost 8 years ago by Shenghou Ma <[email protected]>
ssh: make client auth tests less chatty.

Change-Id: Ib35ce0e7437e32a3fa24a9330c479306b7fa6880
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - 2f8be38b9a7533b8763d48273737ff6e90428a96 authored almost 8 years ago by Han-Wen Nienhuys <[email protected]>
x/ssh: filter debug and ignore messages in transport.readPacket.

This prevents these messages from confusing higher layers of the
protocol.

Fixes #16927.

Chang...

github.com/cert-manager/crypto - 7c6cc321c680f03b9ef0764448e780704f486b51 authored almost 8 years ago by Han-Wen Nienhuys <[email protected]>
acme/autocert: fix typo in Cache doc comment

Change-Id: I13dc3119cb46f0649147959c05c6c62624c43690
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - 1d77d5bd477a5879ed443a73e11a1a3dd9616d03 authored almost 8 years ago by Andrew Gerrand <[email protected]>
ssh/terminal: consistent return value for Restore

This patch makes the Restore function return nil
on success to be consistent with other function...

github.com/cert-manager/crypto - c3b1d0d6d8690eaebe3064711b026770cc37efa3 authored almost 8 years ago by Peter Morjan <[email protected]>
chacha20poly1305: fix detection of BMI on amd64

This change detects BMI2 usability as an additional condition
to examine the usability of AVX2 v...

github.com/cert-manager/crypto - cb497ae8f18e3c55f81bc9f3876c8f4c3d8a2813 authored almost 8 years ago by Lion Yang <[email protected]>
all: fix some vet warnings

Change-Id: I85c2912a6862c6c251450f2a0926ecd33a9fb8e7
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - 5b4074c2c416448b5d06e287167144493aabda43 authored almost 8 years ago by Joe Tsai <[email protected]>
blake2b: fix build on non-amd64 platforms

Change-Id: Ib9ebb1a2eff4b61f60453086be5c63ac7af1f7fc
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - f6b343c37ca80bfa8ea539da67a0b621f84fab1d authored about 8 years ago by Mikio Hara <[email protected]>
ocsp: Expose ResponderID in parsed Response.

ResponderID is unmarshalled into either ResponderName or
ResponderKeyHash depending on which one...

github.com/cert-manager/crypto - f5719d24587163700c5f7fa625ef3e05d9b372e7 authored about 8 years ago by Martin Kreichgauer <[email protected]>
blake2b: add AVX assembly

Add an AVX implementation and improve SSE4.1 assembly.

AVX vs SSE4.1
name old time/op new t...

github.com/cert-manager/crypto - d8e61c69ab46ca38328da2f4995abaf93b252290 authored about 8 years ago by Andreas Auernhammer <[email protected]>
chacha20poly1305: fix typos

Change-Id: I55a2ad4495f4e1164af6a8504b035cf658f8b822
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - 2b786ab9e9649dc660afa3bd580fd05a05e20d95 authored about 8 years ago by Mikio Hara <[email protected]>
ssh/terminal: fix a typo

Change-Id: Iafe2ebb6d37afd2a64aa72750a722d4860bb735e
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - abc3c1b02083efdbef727c8631a865ad7d8d8b19 authored about 8 years ago by Mikio Hara <[email protected]>
chacha20poly1305: fix typos

Change-Id: Icf4ccb29e9eae0fb6fd237ca1d8785d4fd39a8d8
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - a70a72a7277679b330bc7394cb3a99f240402e8d authored about 8 years ago by Mikio Hara <[email protected]>
acme/autocert: add an option for RSA-based certs

Currently, autocert.Manager always generates EC-based certificates.
This change adds an optional...

github.com/cert-manager/crypto - 9b1a210a06ea1176ec1f0a1ddf83ad7463b8ea3e authored about 8 years ago by Alex Vaghin <[email protected]>
crypto/ssh: use net.IP.Equal instead of bytes.Equal

A net.IP may be represented by both by a 4 as well as a 16 byte long
byte slice. Because of this...

github.com/cert-manager/crypto - 01be46f62051d02cb6a36c9b47b37b24e5758c81 authored about 8 years ago by Péter Szilágyi <[email protected]>
blake2b: fix constant size

Change-Id: Icae0ec427183d1e319f5a28d6372c823c269d898
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - 9a6f0a01987842989747adff311d80750ba25530 authored about 8 years ago by Andreas Auernhammer <[email protected]>
x/crypto/ocsp: Don't hard-code OCSP response hash function

Allows user to set the hash function to use in the OCSP response
when using ocsp.CreateResponse ...

github.com/cert-manager/crypto - b07d8c96772f426812d3fc5530710ec1f3b205e7 authored about 8 years ago by Roland Shoemaker <[email protected]>
x/crypto/ssh/terminal: replace \n with \r\n.

911fafb28f4 made MakeRaw match C's behaviour. This included clearing the
OPOST flag, which means...

github.com/cert-manager/crypto - 95cb608f365d51e0e69abc646ec90c0e26fb427f authored about 8 years ago by Adam Langley <[email protected]>
bn256: fix equations in comments

Change-Id: Icb220341756f472ade15f5fc6b91016214233da9
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - 3f77d695175f990a2967385c493939f380ee40a3 authored about 8 years ago by David Lazar <[email protected]>
chacha20poly1305: make polyHashADInternal private

For golang/go#18154.

Change-Id: Ieab8bae9cb8be5e2817a87ae62ac0a2218f63dbb
Reviewed-on: https://...

github.com/cert-manager/crypto - 8a549a1948fc5271eb24f36dcb0d3b47dec75a16 authored about 8 years ago by Shenghou Ma <[email protected]>
x/crypto/blake2b: SSE4.1 is bit 19, not 15.

I missed this in the initial review but this will cause blake2b to
SIGILL on, at least, some Ato...

github.com/cert-manager/crypto - 7efbae5d109cb7a2dbc362886213f73c4c55dede authored about 8 years ago by Adam Langley <[email protected]>
acme/autocert: remove trailing dot from domain before requesting cert

Browsers can send an SNI name of "example.com." for
https://example.com./ but LetsEncrypt reject...

github.com/cert-manager/crypto - 21853a76e0cca35cf785c34dceee499a3d5a7168 authored about 8 years ago by Brad Fitzpatrick <[email protected]>
x/crypto/ssh: Add FingerprintLegacyMD5 and FingerprintSHA256 methods

Implement a standards-compliant fingerprint format method (RFC 4716 section 4)
and a newer SHA25...

github.com/cert-manager/crypto - ede567c8e044a5913dad1d1af3696d9da953104c authored about 8 years ago by Ryuzo Yamamoto <[email protected]>
chacha20poly1305: fix build constraints

Similarly to https://go-review.googlesource.com/32311,
chacha20poly1305 needs additional build c...

github.com/cert-manager/crypto - 9477e0b78b9ac3d0b03822fd95422e2fe07627cd authored about 8 years ago by Alex Vaghin <[email protected]>
blake2s: fix build constraints

Having a trailing comma before a space doesn't mean that the next option
will be ANDed rather th...

github.com/cert-manager/crypto - b2fa06b6af4b7c9bfeb8569ab7b17f04550717bf authored about 8 years ago by Adam Langley <[email protected]>
acme: add v3 implementation to RevokeAuthorization

Let's Encrypt apparently implements authorization revocation as specified
in the v3 of the spec:...

github.com/cert-manager/crypto - ca7e7f10cb9fd9c1a6ff7f60436c086d73714180 authored about 8 years ago by Alex Vaghin <[email protected]>
poly1305: don't move R13 in sum_arm.s.

Rather than change the value of R13 during the execution, keep R13 fixed
(after the initial prel...

github.com/cert-manager/crypto - 1150b8bd09e53aea1d415621adae9bad665061a1 authored about 8 years ago by Adam Langley <[email protected]>
blake2b: test all three hashing implementations

This adds use* flags for all arches so a common test can observe what
implementations are suppor...

github.com/cert-manager/crypto - 8291fff38ab6f2928eca153913c3b5773aa0de98 authored about 8 years ago by Austin Clements <[email protected]>
blake2s: test all four hashing implementations

This adds use* flags for all arches so a common test can observe what
implementations are suppor...

github.com/cert-manager/crypto - 814723eff783c3281d914985cac5d548bfc96424 authored about 8 years ago by Austin Clements <[email protected]>
blake2s: fix frame size of hashBlocksSSE4

The frame is actually 16 bytes plus alignment, not 0.

This fixes the build on Go 1.6.

Change-I...

github.com/cert-manager/crypto - 3c0d69f1777220f1a1d2ec373cb94a282f03eb42 authored about 8 years ago by Austin Clements <[email protected]>
blake2s: remove NOSPLIT from asm functions

Now that the frame sizes of these functions are correct, the compiler
is detecting that they ove...

github.com/cert-manager/crypto - a9ecc67d46e12a127b6b40b62d62b689cc511de4 authored about 8 years ago by Austin Clements <[email protected]>
sha3: fix SP adjustment

keccakF1600 manually subtracts 200 from SP, but the generated prologue
already does this and the...

github.com/cert-manager/crypto - 77e80449e8f4f5928316edeb49b56ec16c63c6cc authored about 8 years ago by Austin Clements <[email protected]>
salsa20/salsa: eliminate unnecessary "callee save" prologue/epilogue

SP offsets were adjusted to fill in the now unused callee save area
using the following Python s...

github.com/cert-manager/crypto - 1705134e1b0161f13718c2a3e2b2735c93580b0e authored about 8 years ago by Austin Clements <[email protected]>
salsa20/salsa: hide SP alignment from spadj

The spadj computation in the assembler can't handle SP alignment code
and will just get confused...

github.com/cert-manager/crypto - a0819bbd36c200141787f8a98ecdfd6902290702 authored about 8 years ago by Austin Clements <[email protected]>
blake2b: use proper Go frame sizes

Similar to the previous commit, blake2b's assembly routines claim they
have a zero byte frame an...

github.com/cert-manager/crypto - e67f5eca87e1a46f5b154439b827d050b4e1da9f authored about 8 years ago by Austin Clements <[email protected]>
blake2s: use proper Go frame sizes

Currently blake2s's assembly routines claim they have a zero byte
frame and manually subtract up...

github.com/cert-manager/crypto - 5953a478da834917998e419d409a769ac0815814 authored about 8 years ago by Austin Clements <[email protected]>
curve25519: eliminate unnecessary "callee save" prologues

The assembly implementations of ladderstep and mul contain register
save prologues that are unne...

github.com/cert-manager/crypto - f62085100e1abe3d5c9b3b8c9a38d50b71323f64 authored about 8 years ago by Austin Clements <[email protected]>
curve25519: fix confusing SP adjustments

The curve25519 assembly routines do very non-Go-ABI SP adjustments.
These would thoroughly confu...

github.com/cert-manager/crypto - 722a7b78279d26b59c95f4149affa65d2cc9c9bc authored about 8 years ago by Austin Clements <[email protected]>
poly1305: enable assembly for ARM in Go 1.6.

5f31782cfb2b6373211f8f9fbf31283fa234b570 added build constraints to
disable assembly for Go 1.6 ...

github.com/cert-manager/crypto - 3ded668c5379f6951fb0de06174442072e5447d3 authored about 8 years ago by Adam Langley <[email protected]>
poly1305: fix stack handling in sum_arm.s

Up till now, sum_arm.s was working only because of luck. It was written
assuming that it had sta...

github.com/cert-manager/crypto - dec8741f623b766103bba9a406faed81587e0ccf authored about 8 years ago by Adam Langley <[email protected]>
blake2s,blake2b: fix typo in package doc

Change-Id: I6c33e69dc3e45d86843861973952d6f11c0fae88
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - c367d6eeb7c6158125f2f47e049f7eb7e251c09a authored about 8 years ago by Andreas Auernhammer <[email protected]>
blake2b: new package

Add the hash function BLAKE2b defined in RFC 7693.

On amd64/AVX2
name time/op
Write128-4 164...

github.com/cert-manager/crypto - 9e9c7d4ed3e28836a0741f74011e308570bec743 authored about 8 years ago by Andreas Auernhammer <[email protected]>
chacha20poly1305: scope assembly constants

The names of the constant values were previously not scoped to the
package and |andMask| could c...

github.com/cert-manager/crypto - 14f9af67c679edd414f72f13d67c917447113df2 authored about 8 years ago by Adam Langley <[email protected]>
poly1305: fix NaCl build.

The ARM assembly doesn't work for NaCl on ARM because it doesn't meet
the required rules. This c...

github.com/cert-manager/crypto - cdcb58c6cadec8967e86a977a1c953e03d0ac0d6 authored about 8 years ago by Adam Langley <[email protected]>
blake2s: new package

Add hash function BLAKE2s defined in RFC 7693.

On amd64/SSE4:
name time/op
Write64-4 1...

github.com/cert-manager/crypto - 4428aee3e5957ee2252b9c7a17460e5147363b4b authored about 8 years ago by Andreas Auernhammer <[email protected]>