<p>Mattias Öhrn <mattias.ohrn@gmail.com> - identified problem with
Pkcs12Store.Save and provided fix.</p>
</li>
<li>
<p>Jen Andre <jandre@gmail.com> - initial implementation of
case-insensitive searches for PGP keyrings.</p>
</li>
<li>
<p>#Cyrille37# <cyrille37@gmail.com> - identified problem with
BigInteger.ModInverse for negative values.</p>
</li>
<li>
<p>David Reis Jr <davidreis@yahoo.com> - bug fix for X509CrlStoreSelector
handling of NextUpdate, fix handling of null parameters for DSA in key
factories, initial port of Pkix namespace and supporting tests.
</p>
</li>
<li>
<p>Ivan Peev <ivan.peev@cozyroc.com> - bug fix for version string
displayed in PGP armored output.</p>
</li>
<li>
<p>Hector Ornelas Aciga <hector.ornelas@sat.gob.mx> - patch to add support for PKCS#5 Scheme 2 keys.</p>
</li>
<li>
<p>Tom Van Holle <tvh@dsoft.be> - patch to add new class: Pkcs10CertificationRequestDelaySigned.</p>
</li>
<li>
<p>Kalev Lember <kalev@smartlink.ee> - patch to fix compilation problem under Mono 2.8+.</p>
</li>
<li>
<p>Kyle Hamilton <kyanha.bouncycastle@kyanha.net> - identified problem with BigInteger.Multiply, patch for MiscPemGenerator infinite recursion,
proposed improvements in use of random numbers.</p>
</li>
<li>
<p>Atanas Krachev <akrachev@gmail.com> - added support for revocation signatures in OpenPGP.</p>
</li>
<li>
<p>Torsten Moschny <t.moschny@web.de> - identified problem where PrivateKeyFactory/PublicKeyFactory failed to preserve publicKeyParamSet for EC keys.</p>
</li>
<li>
<p>Thomas Heggelund <the@dips.no> - identified problem with RSAParameters fields requiring zero-byte padding to satisfy .NET.</p>
</li>
<li>
<p>Laszlo Magyar <lmagyar1973@gmail.com> - patch to fix problem with SubjectDirectoryAttributes constructor.</p>
<p>Oscar Jacobsson (https://github.com/OscarAyoy) - patch to fix DerEnumerated constructor (including test coverage).</p>
</li>
<li>
<p>Michael Krueger <michael.krueger@secardeo.com> - patch to fix Asn1.Cmp.RevDetails constructor.</p>
</li>
<li>
<p>Daniel Nauck <daniel.nauck@gmail.com> - patch for Portable Class Library support.</p>
</li>
<li>
<p>John Allberg <john@ayoy.se> - improvements to Portable Class Library patch.</p>
</li>
<li>
<p>Oren Novotny (https://github.com/onovotny) - developed and maintained a fork supporting Portable Class Library, worked closely with us to integrate the changes back into the main project.</p>
</li>
<li>
<p>Nicolas Dorier (https://github.com/NicolasDorier) - patch to fix culture-dependent lookups in MacUtilities.
Copyright (c) 2000-2015 The Legion of the Bouncy Castle Inc.
(http://www.bouncycastle.org)<br>
Permission is hereby granted, free of charge, to any person obtaining a
copy of this software and associated documentation files (the "Software"), to deal in the
Software without restriction, including without limitation the rights to use, copy, modify, merge,
publish, distribute, sub license, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:<br>
The above copyright notice and this permission notice shall be included
in all copies or substantial portions of the Software.<br>
<spanstyle="font-weight: bold;">THE SOFTWARE IS PROVIDED "AS IS",
WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,</span><br
style="font-weight: bold;">
<spanstyle="font-weight: bold;">INCLUDING BUT NOT LIMITED TO THE
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR</span><br
style="font-weight: bold;">
<spanstyle="font-weight: bold;">PURPOSE AND NONINFRINGEMENT. IN NO
EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE</span><br
style="font-weight: bold;">
<spanstyle="font-weight: bold;">LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR</span><br
style="font-weight: bold;">
<spanstyle="font-weight: bold;">OTHERWISE, ARISING FROM, OUT OF OR IN
CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER</span><br
style="font-weight: bold;">
<spanstyle="font-weight: bold;">DEALINGS IN THE SOFTWARE.<br>
We state, where EC MQV has not otherwise been disabled or removed:
"The use of this product or service is subject to the reasonable, non-discriminatory terms in the Intellectual Property Rights (IPR) Disclosures of Certicom Corp. at the IETF for Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS) implemented in the product or service."
<h4><aclass="mozTocH4"name="mozTocId85314"></a>Release 1.8.0, Sunday November 22, 2015</h4>
<h5>IMPORTANT</h5>
<ul>
<li>The Serpent cipher as of 1.8.0 is incompatible with the behaviour of Serpent in earlier releases; it has been
modified to conform to the standard byte-order interpretation for blocks (and keys). The previous behaviour is
available from 1.8.0 as the "Tnepres" cipher. See <ahref="http://www.bouncycastle.org/jira/browse/BMA-52">BMA-52</a>
for more information if this may affect you.</li>
</ul>
<h5>Additional Features and Functionality</h5>
<ul>
<li>IV only re-initialisation is supported by using null as the key parameter when creating a ParametersWithIV object.</li>
<li>CMS Enveloped and AuthenticatedData now support OriginatorInfo.</li>
<li>Support for ECDSA_fixed_ECDH authentication has been added to the TLS client.</li>
<li>Support for the Features signature sub-packet has been added to the PGP API.</li>
<li>Classes involved in CRL manipulation have been rewritten to reduce memory requirements for handling and parsing extremely large CRLs.</li>
<li>An implementation of Password Authenticated Key Exchange by Juggling (J-PAKE) has been added.</li>
<li>Support has been added for SHA-512/224, SHA-512/256, as well as a general SHA-512/t in the lightweight API.</li>
<li>The TSP API now supports generation of certIDs based on digests other than SHA-1.</li>
<li>OCSP responses can now be included in CMS SignedData objects.</li>
<li>The SipHash MAC algorithm has been added.</li>
<li>DRBGs from NIST SP 800-90A (DualEC excluded) have been added to the Crypto.Prng namespace together with SecureRandom builders.</li>
<li>Support has been added for OCB mode.</li>
<li>DSA version 2 parameter and key generation is now supported.</li>
<li>A new interface IMemoable has been added for objects that can copy in and out their state. The digest classes now support this.
A special class NonMemoableDigest has been added which hides the IMemoable interface where it should not be available.</li>
<li>TDEA is now recognised as an alias for DESede.</li>
<li>Support has been added for NIST SP 800-38D - GMAC to AES and other 128 bit block size algorithms.</li>
<li>The TLS API now supports TLS/DTLS 1.2 for both client and server</li>
<li>Full support is now provided for client-side auth in the D/TLS server code.</li>
<li>TLS: server-side support for DHE key exchange.</li>
<li>TLS: server-side support for PSK and SRP ciphersuites.</li>
<li>TLS: (EC)DSA now supports signatures with non-SHA1 digests.</li>
<li>TLS: support for ECDHE_ECDSA/AES/CCM ciphersuites from RFC 7251.</li>
<li>The TLS/DTLS code now includes a non-blocking API.</li>
<li>RFC 6637 ECDSA and ECDH support has been added to the OpenPGP API.</li>
<li>Implementations of Threefish and Skein have been added.</li>
<li>Implementation of the SM3 digest has been added.</li>
<li>Implementations of XSalsa20 and ChaCha have been added. Support for reduced round Salas20 has been added.</li>
<li>Support has been added for RFC 6979 Deterministic DSA/ECDSA.</li>
<li>Support for the Poly1305 MAC has been added.</li>
<li>GCM and GMAC now support tag lengths down to 32 bits.</li>
<li>Custom implementations for many of the NIST and SEC elliptic curves have been added, resulting in drastically improved performance. They
can be accessed via the Crypto.EC.CustomNamedCurves class and are generally selected by other internal APIs in place of the generic implementations.</li>
<li>Automatic EC point validation added, both for decoded inputs and multiplier outputs.</li>
<li>Support has been added for X9.31-1998 DRBG.</li>
<li>Support has been added for the SHA3 family of digests, including SHAKE128 and SHAKE256.
An implementation of the draft standard has been added as 'Keccak'.</li>
<li>The ASN.1 parser for ECGOST private keys will now parse keys encoded with a private value represented as an ASN.1 INTEGER.</li>
<li>SubjectPublicKeyInfoFactory now supports DSA parameters.</li>
<li>Improved performance of BigInteger.ModPow and random prime generation.</li>
<li>SecureRandom instances now seeded by RNGCryptoServiceProvider (where available).</li>
<li>An initial port of the Java "operators" mechanism has been introduced to support overriding of cryptographic primitives
in high-level APIs e.g. for signing using an external provider.</li>
<H4><Aclass="mozTocH4"name="mozTocId85312"></A>Release 1.6.1, Monday February 8, 2010</H4>
<ul>
<li>A point release to rectify some problems with the released assembly of 1.6 version.</li>
</ul>
<H4><Aclass="mozTocH4"name="mozTocId85311"></A>Release 1.6, Thursday February 4, 2010</H4>
<h5>Defects Fixed</h5>
<ul>
<li>X509DefaultEntryConverter was not recognising telephone number as a PrintableString field. This has been fixed.</li>
<li>OpenPGP now supports UTF-8 in file names for literal data.</li>
</ul>
<h5>Security Advisory</h5>
<ul>
<li>This version has been specifically reviewed to eliminate possible timing attacks on algorithms such as GCM and CCM mode.</li>
</ul>
<h5>Additional Features and Functionality</h5>
<ul>
<li>Support for PSS signatures has been added to CMS.</li>
<li>SubjectKeyIdentifier now supports both methods specified in RFC 3280, section 4.2.1.2 for generating the identifier.</li>
<li>Performance of GCM mode has been greatly improved (on average 10x).</li>
<li>Support for mac lengths of 96, 104, 112, and 120 bits has been added to existing support for 128 bits in GCMBlockCipher.</li>
<li>Support for raw signatures has been extended to RSA, RSA-PSS and ECDSA. RSA support can be used in CmsSignedDataStreamGenerator to support signatures without signed attributes.</li>
<li>Support for EC MQV has been added to the light weight API and the CMS library.</li>
<H4><Aclass="mozTocH4"name="mozTocId85310"></A>Release 1.5, Tuesday August 18, 2009</H4>
<h5>Defects Fixed</h5>
<ul>
<li>Correct the ASN.1 class for AuthorityInformationAccess.</li>
<li>In the Bcpg libs, armored output now inserts the correct version string.</li>
<li>EssCertIDv2 encoding now complies with RFC 5035.</li>
<li>ECDSA now computes correct signatures for oversized hashes when the order of the base point is not a multiple of 8 in compliance with X9.62-2005.</li>
<li>Standard name "DiffieHellman" is now supported in factory classes.</li>
<li>Better support for equality tests for '#' encoded entries has been added to X509Name.</li>
<li>'=' inside a X509Name was not being properly escaped. This has been fixed.</li>
<li>ApplicationSpecific ASN.1 tags are now recognised in BER data. The GetObject() method now handles processing of arbitrary tags.</li>
<li>Multiplication by negative powers of two is fixed in BigInteger.</li>
<li>Multiple countersignature attributes are now correctly collected.</li>
<li>Two bugs in HC-128 and HC-256 related to sign extension and byte swapping have been fixed. The implementations now pass the latest ecrypt vector tests.</li>
</ul>
<h5>Security Advisory</h5>
<ul>
<li>The effect of the sign extension bug was to decrease the key space the HC-128 and HC-256 ciphers were operating in and the byte swapping inverted every 32 bits of the generated stream. If you are using either HC-128 or HC-256 you must upgrade to this release.</li>
</ul>
<h5>Additional Features and Functionality</h5>
<ul>
<li>PKIX certificate path validation</li>
<li>Accept duplicate PKCS#9 FriendlyName attributes in PKCS#12 keystore.</li>
<li>Add support for PKCS#5 Scheme 2 keys.</li>
<li>Camellia performance improved.</li>
<li>A smaller version of Camellia, CamelliaLightEngine has also been added.</li>
<li>CmsSignedData generation now supports SubjectKeyIdentifier as well as use of issuer/serial.</li>
<li>A CMS PBE key holder for UTF8 keys has been added to the CMS API.</li>
<li>Salt and iteration count can now be recovered from PasswordRecipientInformation.</li>
<li>Support for reading and extracting personalised certificates in PGP Secret Key rings has been added.</li>
<li>Support for EAC algorithms has been added to CMS.</li>
<li>Asn1Dump now supports a verbose mode for displaying the contents of octet and bit strings.</li>
<li>Support for the SRP-6a protocol has been added.</li>
<H4><Aclass="mozTocH4"name="mozTocId85309"></A>Release 1.4, Thursday August 8, 2008</H4>
<h5>Defects Fixed</h5>
<ul>
<li>The GeneralName string constructor now supports IPv4 and IPv6 address parsing.</li>
<li>EAX mode was not handling non-zero offsetted data correctly and failing. This has been fixed.</li>
<li>EAX mode ciphers were not resetting correctly after a DoFinal/Reset. This has been fixed.</li>
<li>Some boolean parameters to IssuingDistributionPoint were being reversed. This has been fixed.</li><li>A zero length RDN would cause an exception in an X509Name. This has been fixed.</li>
<li>Specifying a greater than 32bit length for a stream and relying on the default BcpgOutputStream resulted in corrupted data. This has been fixed.</li>
<li>Pkcs7Padding validation would not fail if pad length was 0. This has been fixed.</li>
<li>Signature creation time was not being properly initialised in new V4 PGP signature objects although the encoding was correct. This has been fixed.</li>
<li>The '+' character can now be escaped or quoted in the constructor for X509Name.</li>
<li>IV handling in CMS for SEED and Camellia was incorrect. This has been fixed.</li>
<li>ASN.1 stream parser now throws exceptions for unterminated sequences.</li>
<li>X509CertificateParser/X509CrlParser now handle multiple certificates/CRLs in streams that don't support seeking.</li>
<li>The CertID class used by the TSP library was incomplete. This has been fixed</li>
<li>\# is now properly recognised in the X509Name class.</li>
<li>BigInteger.ModInverse was failing for negative values. This has been fixed.</li>
<li>CMS API now supports RSASSA-PSS signatures with explicit salt length.</li>
</ul>
<h5>Additional Features and Functionality</h5>
<ul>
<li>ASN.1 libs now support high tag numbers.</li>
<li>Galois/Counter Mode (GCM) has been added.</li>
<li>The TSP API now supports parsing and validation of responses with V2 signing certificate entries.</li>
<li>Unnecessary local ID attributes on certificates in PKCS12 files are now automatically removed.</li>
<li>New Pkcs12StoreBuilder class supports generation of PKCS12 files with both certificates and keys protected by 3DES.</li>
<li>Certifications associated with user attributes can now be created, verified and removed in OpenPGP.</li>
<li>API support now exists for CMS countersignature reading and production.</li>
<li>A new class LazyAsn1InputStream supports lazy evaluation of DER sequences and sets, considerably reducing memory requirements in some scenarios.</li>
<li>KeyPurposeId class has been updated for RFC 4945.</li>
<li>Initial support has been added for HP_CERTIFICATE_REQUEST in the TLS API.</li>
<li>PGP example programs now handle blank names in literal data objects.</li>
<li>The ProofOfPossession class now better supports the underlying ASN.1 structure.</li>
</ul>
<h5>Additional Notes</h5>
<ul>
<li>Due to problems for some users caused by the presence of the IDEA algorithm, an implementation is no
longer included in the default assembly. Only the assembly named BouncyCastle.CryptoExt now includes IDEA.</li>
The Project builds a DLL file (LIL_VSTT_Plugins.dll) which you need to add a reference to in your Test Project in order to use the plugins. Either copy the project into your Test Project's Solution, and reference the project in your Test Project, or place a copy of the built dll file in each Test Project (create a lib directory and copy the dll to it, add the DLL file as an existing item, and add a reference in your test project by browsing to the dll file). The DLL will be deployed automatically to all agents in your test rig.
## License
The project source code and binaries are open source and under the MS-RL license unless otherwise specified in the code or in the folders of such code.
By using the code (reading, compiling, linking, distributing or in any other way make use of the code) you accept the license terms applicable for the code in question.
You can download or read the MS-RL license here: https://opensource.org/licenses/MS-RL
In short,
- you are not allowed to distribute the software or any portion of the software without distributing the complete code and license together with the software.
- you are not allowed to remove any trademarks, copyrights or attributions from the code.
## Building
Pre build versions of the DLL and the PDB Debug symbols files are available in the project wiki home page for download. Please remember to remove the blocking of the file that windows does for downloaded executable files, otherwise it will not load. Most windows setups also block executable files on shared filesystems, so you might want to place the file local.
...
...
@@ -16,4 +26,12 @@ This means that other mechanisms of versioning need to be used, like changing th
## Project Gitlab
https://git.lightsinline.se/products/VSTT-Plugins
This project is maintained on a GitLab server, where you can find the latest code, builds, issues and documention. Register an account (for free) if you want to get support or create issues/bugs/suggestions. With an account, you can also create a personal fork (clone) of the project and get the plugin code in your own repository and maintain your own version. You may also invite others to join your project or share the code. If you create code you want to get added to the original code base, you are welcome to create a merge request to get it added to the master branch.
\ No newline at end of file
This project is maintained on a GitLab server, where you can find the latest code, builds, issues and documention. Register an account (for free) if you want to get support or create issues/bugs/suggestions. With an account, you can also create a personal fork (clone) of the project and get the plugin code in your own repository and maintain your own modified version. You may also invite others to join your project or share the code. If you create code you want to get added to the original code base, you are welcome to create a merge request to get it added to the master branch for others to use.
## Bouncy Castle API
Contains the code of the Bouncy Castle C# API Release 1.8.1
Please note that the Bouncy Castle API source files are under a diffrent license (http://www.bouncycastle.org/csharp/licence.html)
and BZIP2 source files are under the Apache License Version 2.0 (http://www.apache.org/licenses/LICENSE-2.0)
For more information, wiki, docs, latest code, donations etc please visit http://www.bouncycastle.org