diff options
author | Peter Dettman <peter.dettman@bouncycastle.org> | 2013-06-28 15:26:06 +0700 |
---|---|---|
committer | Peter Dettman <peter.dettman@bouncycastle.org> | 2013-06-28 15:26:06 +0700 |
commit | 44288db4414158ac9b98a507b15e81d0d3c66ca6 (patch) | |
tree | aa5ef88948ebb68ed6c8df81eb5da889641a9b50 /crypto/Readme.html | |
parent | Set up text/binary handling for existing file types (diff) | |
download | BouncyCastle.NET-ed25519-44288db4414158ac9b98a507b15e81d0d3c66ca6.tar.xz |
Initial import of old CVS repository
Diffstat (limited to 'crypto/Readme.html')
-rw-r--r-- | crypto/Readme.html | 455 |
1 files changed, 455 insertions, 0 deletions
diff --git a/crypto/Readme.html b/crypto/Readme.html new file mode 100644 index 000000000..2660d4ac3 --- /dev/null +++ b/crypto/Readme.html @@ -0,0 +1,455 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> +<html> + <head> + <title>Notes</title> + <meta content="text/html; charset=ISO-8859-1" http-equiv="content-type"> + </head> + <body> + <h2><a class="mozTocH2" name="mozTocId533031"></a>The Bouncy Castle Cryptographic + C#® API</h2> + <h3><a class="mozTocH3" name="mozTocId685176"></a>Contents:<br> + </h3> + <ol id="mozToc"> + <!--mozToc h1 1 h2 2 h3 3 h4 4 h5 5 h6 6--><li><a href="#mozTocId533031">The Bouncy + Castle Cryptographic C#® API</a> + <ol> + <li> + <ol> + <li> + <a href="#mozTocId685176">Contents: </a> + <li> + <a href="#mozTocId66345">License & Contributors:</a> + <li> + <a href="#mozTocId575388">Features:</a> + <li> + <a href="#mozTocId211208">How To Build.</a> + <li> + <a href="#mozTocId245743">The Source:</a> + <li> + <a href="#mozTocId326820">Documentation:</a> + <li> + <a href="#mozTocId358608">For first time users.</a> + <li> + <a href="#mozTocId3413">Notes:</a> + <ol> + <li> + <a href="#mozTocId85313">Release 1.7</a> + <li> + <a href="#mozTocId85312">Release 1.6.1</a> + <li> + <a href="#mozTocId85311">Release 1.6</a> + <li> + <a href="#mozTocId85310">Release 1.5</a> + <li> + <a href="#mozTocId85309">Release 1.4</a> + <li> + <a href="#mozTocId85308">Release 1.3</a> + <li> + <a href="#mozTocId85307">Release 1.2</a> + <li> + <a href="#mozTocId85306">Release 1.1</a> + <li> + <a href="#mozTocId85305">Release 1.0</a> + <li> + <a href="#mozTocId85304">Tuesday Febuary 1, 2005</a> + <li> + <a href="#mozTocId498363">Sunday December 12, 2004</a></li> + </ol> + <li> + <a href="#mozTocId948186">Trademarks. </a> + </li> + </ol> </li> </ol> </li> </ol> + <br> + <hr style="WIDTH: 100%; HEIGHT: 2px"> + <h3><a class="mozTocH3" name="mozTocId66345"></a>License & Contributors:</h3> + See <a href="License.html">License</a> & <a href="Contributors.html">Contributors</a> + files.<br> + <br> + <hr style="WIDTH: 100%; HEIGHT: 2px"> + <br> + <h3><a class="mozTocH3" name="mozTocId575388"></a>Features:</h3> + <ul> + <li> + Generation and parsing of PKCS-12 files. + <li> + X.509: Generators and parsers for V1 and V3 certificates, V2 CRLs and attribute + certificates. + <li> + PBE algorithms supported by PbeUtilities: PBEwithMD2andDES-CBC, + PBEwithMD2andRC2-CBC, PBEwithMD5andDES-CBC, PBEwithMD5andRC2-CBC, + PBEwithSHA1andDES-CBC, PBEwithSHA1andRC2-CBC, PBEwithSHA-1and128bitRC4, + PBEwithSHA-1and40bitRC4, PBEwithSHA-1and3-keyDESEDE-CBC, + PBEwithSHA-1and2-keyDESEDE-CBC, PBEwithSHA-1and128bitRC2-CBC, + PBEwithSHA-1and40bitRC2-CBC, PBEwithHmacSHA-1, PBEwithHmacSHA-224, + PBEwithHmacSHA-256, PBEwithHmacRIPEMD128, PBEwithHmacRIPEMD160, and + PBEwithHmacRIPEMD256. + <li> + Signature algorithms supported by SignerUtilities: MD2withRSA, MD4withRSA, + MD5withRSA, RIPEMD128withRSA, RIPEMD160withECDSA, RIPEMD160withRSA, + RIPEMD256withRSA, SHA-1withRSA, SHA-224withRSA, SHA-256withRSAandMGF1, + SHA-384withRSAandMGF1, SHA-512withRSAandMGF1, SHA-1withDSA, and SHA-1withECDSA. + <li> + Symmetric key algorithms: AES, Blowfish, Camellia, CAST5, CAST6, DESede, DES, + GOST28147, HC-128, HC-256, IDEA, ISAAC, NaccacheStern, Noekeon, RC2, RC4, + RC5-32, RC5-64, RC6, Rijndael, Salsa20, SEED, Serpent, Skipjack, TEA/XTEA, + Twofish and VMPC. + <li> + Symmetric key modes: CBC, CFB, CTS, GOFB, OFB, OpenPGPCFB, and SIC (or CTR). + <li> + Symmetric key paddings: ISO10126d2, ISO7816d4, PKCS-5/7, TBC, X.923, and Zero + Byte. + <li> + Asymmetric key algorithms: RSA (with blinding), ElGamal, DSA, and ECDSA. + <li> + Asymmetric key paddings/encodings: ISO9796d1, OAEP, and PKCS-1. + <li> + AEAD block cipher modes: CCM, EAX, and GCM. + <li> + Digests: GOST3411, MD2, MD4, MD5, RIPEMD128, RIPEMD160, RIPEMD256, RIPEMD320, + SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, Tiger, and Whirlpool. + <li> + Signer mechanisms: DSA, ECDSA, ECGOST3410, GOST3410, ISO9796d2, PSS, RSA. + <li> + Key Agreement: Diffie-Hellman, EC-DH, SRP-6a. + <li> + Macs: CBCBlockCipher, CFBBlockCipher, GOST28147, HMac, ISO9797 Alg. 3, SipHash, VMPCMAC. + <li> + PBE generators: PKCS-12, and PKCS-5 - schemes 1 and 2. + <li> + OpenPGP (RFC 2440) + <li> + Cryptographic Message Syntax (CMS, RFC 3852), including streaming API. + <li> + Online Certificate Status Protocol (OCSP, RFC 2560). + <li> + Time Stamp Protocol (TSP, RFC 3161). + <li> + Elliptic Curve Cryptography (support for F2m and Fp curves). + <li> + Reading/writing of PEM files, including RSA and DSA keys, with a variety of + encryptions. + </li> + <li>PKIX certificate path validation</li> + </ul> + <br> + <p><b>Porting notes from the old ASN.1 library</b> For the most part code using the + old subset of ASN.1 classes should be easy to transfer, providing the following + changes are made: + </p> + <ul> + <li> + DERObject becomes Asn1Object + <li> + DEREncodable becomes Asn1Encodable + <li> + GetDERObject() becomes ToAsn1Object() + <li> + BERConstructedOctetString becomes BerOctetString + <li> + If you were using the older mutable DERConstructedSequence/Set and + BERConstructedSequence, use an Asn1EncodableVector in conjunction with + DerSequence/Set and BerSequence + <li> + BERInputStream and DERInputStream are replaced with Asn1InputStream + <li> + AsymmetricKeyParameter is now in the Org.Bouncycastle.Crypto namespace</li> + </ul> + <br> + <hr style="WIDTH: 100%; HEIGHT: 2px"> + <h3><a class="mozTocH3" name="mozTocId211208"></a>How To Build.</h3> + <p> + The BC C# API uses NAnt (<a href="http://nant.sourceforge.net/">http://nant.sourceforge.net</a>) + to provide a platform independent build environment (suggested version NAnt 0.90). + There is also a solution file for Visual Studio, and for MonoDevelop. The API works + with .NET Framework 1.1 and above. It has been successfully built and tested with Mono + versions from 1.1.13 onwards. The source code can be built for .NET Compact Framework 1.0 + by setting the compilation flag NETCF_1_0, or .NET Compact Framework 2.0 by setting NETCF_2_0, + or Silverlight 2 by setting SILVERLIGHT. + </p> + Using a command prompt (DOS window), cd into the 'crypto' folder of this + distribution.<br> + <br> + <span style="FONT-WEIGHT: bold">Use,</span><br> + <ul> + <li> + '<span style="FONT-WEIGHT: bold">nant</span>' without arguments to compile + debug code, the tests and run the tests. + <li> + '<span style="FONT-WEIGHT: bold">nant compile-release</span>' to compile + release code. + <li> + '<span style="FONT-WEIGHT: bold">nant compile-debug</span>' to compile + debug code. + <LI> + '<SPAN style="FONT-WEIGHT: bold">nant test</SPAN>' to run the included unit + tests (using NUnit; you may need to edit the build file to set the location + where NUnit is installed).</LI> + </ul> + <P> + <span style="FONT-WEIGHT: bold">Output:</span><br> + <br> + The compiled API can be found in the 'api/bin/release' & + 'api/bin/debug' directories.<br> + The compiled tests can be found in the 'test/bin' directory + (by default a debug build is used for testing).<br> + <P> + <hr style="WIDTH: 100%; HEIGHT: 2px"> + <P></P> + <h3><a class="mozTocH3" name="mozTocId245743"></a><span style="FONT-WEIGHT: bold">The Source:</span></h3> + Source code can be found in the 'src'directory.<br> + <br> + <hr style="WIDTH: 100%; HEIGHT: 2px"> + <h3><a class="mozTocH3" name="mozTocId326820"></a><span style="FONT-WEIGHT: bold"></span>Documentation:</h3> + <P>There is limited documentation available at the moment. Some of the source + contains XML comments, but this is a work in progress. We will be working to + improve this now that 1.0 is out the door.</P> + <P> + <hr style="WIDTH: 100%; HEIGHT: 2px"> + <P></P> + <h3><a class="mozTocH3" name="mozTocId358608"></a>For first time users.</h3> + <span style="FONT-WEIGHT: bold">Java® heritage,</span><br> + <br> + The Bouncy Castle C# API is a port of the Bouncy Castle Java APIs. + Approximately %80 of the functionality in the Java build has now been ported. + For the most part, the naming conventions of the .NET platform have been + adopted. The C# API is constantly kept uptodate with bug fixes and new test + cases from the Java build (and vice versa sometimes), thus benefitting from the + large user base and real-world use the Java version has seen.<br> + <br> + <span style="FONT-WEIGHT: bold">Please consider.</span><br> + <br> + The Bouncy Castle C# API is a library of transformations that when combined + properly will enable developers to create standard conforming cryptographic + systems. In order to use this API you must have some knowledge of how to build + cryptographic systems, namely what transformations to use and the when, where + and why of their use.<br> + Developing good cryptographic systems takes practice and understanding.<br> + <br> + There are many resources available online and in book shops; please use those + to your advantage.<br> + <br> + <hr style="WIDTH: 100%; HEIGHT: 2px"> + <h3><a class="mozTocH3" name="mozTocId3413"></a>Notes:</h3> + <H4><A class="mozTocH4" name="mozTocId85313"></A>Release 1.7, Thursday April 7, 2011</H4> +<h5>Additional Features and Functionality</h5> +<ul> +<li>TLS now supports client authentication.</li> +<li>TLS now supports compression.</li> +<li>TLS now supports ECC cipher suites (RFC 4492).</li> +<li>Library can now be built for Silverlight (2.0 and above).</li> +<li>ASN.1 classes for CRMF (RFC 4211) and CMP (RFC 4210) have been added.</li> +<li>Further performance improvements to GCM mode.</li> +<li>BufferedBlockCipher will now always reset after a DoFinal().</li> +<li>An IV can now be passed to an Iso9797Alg3Mac</li> +</ul> +<h5>Additional Notes</h5> +<ul> +<li>See list of resolved issues at +<a href="http://www.bouncycastle.org/jira/secure/IssueNavigator.jspa?reset=true&&pid=10001&fixfor=10110&sorter/field=issuekey&sorter/order=DESC"> +Bouncy Castle JIRA C# 1.7</a></li> +</ul> + <H4><A class="mozTocH4" name="mozTocId85312"></A>Release 1.6.1, Monday February 8, 2010</H4> +<ul> +<li>A point release to rectify some problems with the released assembly of 1.6 version.</li> +</ul> + <H4><A class="mozTocH4" name="mozTocId85311"></A>Release 1.6, Thursday February 4, 2010</H4> +<h5>Defects Fixed</h5> +<ul> +<li>X509DefaultEntryConverter was not recognising telephone number as a PrintableString field. This has been fixed.</li> +<li>OpenPGP now supports UTF-8 in file names for literal data.</li> +</ul> +<h5>Security Advisory</h5> +<ul> +<li>This version has been specifically reviewed to eliminate possible timing attacks on algorithms such as GCM and CCM mode.</li> +</ul> +<h5>Additional Features and Functionality</h5> +<ul> +<li>Support for PSS signatures has been added to CMS.</li> +<li>SubjectKeyIdentifier now supports both methods specified in RFC 3280, section 4.2.1.2 for generating the identifier.</li> +<li>Performance of GCM mode has been greatly improved (on average 10x).</li> +<li>Support for mac lengths of 96, 104, 112, and 120 bits has been added to existing support for 128 bits in GCMBlockCipher.</li> +<li>Support for raw signatures has been extended to RSA, RSA-PSS and ECDSA. RSA support can be used in CmsSignedDataStreamGenerator to support signatures without signed attributes.</li> +<li>Support for EC MQV has been added to the light weight API and the CMS library.</li> +</ul> +<h5>Additional Notes</h5> +<ul> +<li>See list of resolved issues at +<a href="http://www.bouncycastle.org/jira/secure/IssueNavigator.jspa?reset=true&&pid=10001&fixfor=10100&sorter/field=issuekey&sorter/order=DESC"> +Bouncy Castle JIRA C# 1.6</a></li> +</ul> + <H4><A class="mozTocH4" name="mozTocId85310"></A>Release 1.5, Tuesday August 18, 2009</H4> +<h5>Defects Fixed</h5> +<ul> +<li>Correct the ASN.1 class for AuthorityInformationAccess.</li> +<li>In the Bcpg libs, armored output now inserts the correct version string.</li> +<li>EssCertIDv2 encoding now complies with RFC 5035.</li> +<li>ECDSA now computes correct signatures for oversized hashes when the order of the base point is not a multiple of 8 in compliance with X9.62-2005.</li> +<li>Standard name "DiffieHellman" is now supported in factory classes.</li> +<li>Better support for equality tests for '#' encoded entries has been added to X509Name.</li> +<li>'=' inside a X509Name was not being properly escaped. This has been fixed.</li> +<li>ApplicationSpecific ASN.1 tags are now recognised in BER data. The GetObject() method now handles processing of arbitrary tags.</li> +<li>Multiplication by negative powers of two is fixed in BigInteger.</li> +<li>Multiple countersignature attributes are now correctly collected.</li> +<li>Two bugs in HC-128 and HC-256 related to sign extension and byte swapping have been fixed. The implementations now pass the latest ecrypt vector tests.</li> +</ul> +<h5>Security Advisory</h5> +<ul> +<li>The effect of the sign extension bug was to decrease the key space the HC-128 and HC-256 ciphers were operating in and the byte swapping inverted every 32 bits of the generated stream. If you are using either HC-128 or HC-256 you must upgrade to this release.</li> +</ul> +<h5>Additional Features and Functionality</h5> +<ul> +<li>PKIX certificate path validation</li> +<li>Accept duplicate PKCS#9 FriendlyName attributes in PKCS#12 keystore.</li> +<li>Add support for PKCS#5 Scheme 2 keys.</li> +<li>Camellia performance improved.</li> +<li>A smaller version of Camellia, CamelliaLightEngine has also been added.</li> +<li>CmsSignedData generation now supports SubjectKeyIdentifier as well as use of issuer/serial.</li> +<li>A CMS PBE key holder for UTF8 keys has been added to the CMS API.</li> +<li>Salt and iteration count can now be recovered from PasswordRecipientInformation.</li> +<li>Support for reading and extracting personalised certificates in PGP Secret Key rings has been added.</li> +<li>Support for EAC algorithms has been added to CMS.</li> +<li>Asn1Dump now supports a verbose mode for displaying the contents of octet and bit strings.</li> +<li>Support for the SRP-6a protocol has been added.</li> +</ul> +<h5>Additional Notes</h5> +<ul> +<li>See also the list of resolved issues at +<a href="http://www.bouncycastle.org/jira/secure/IssueNavigator.jspa?reset=true&&pid=10001&fixfor=10080&sorter/field=issuekey&sorter/order=DESC"> +Bouncy Castle JIRA C# 1.5</a></li> +</ul> + <H4><A class="mozTocH4" name="mozTocId85309"></A>Release 1.4, Thursday August 8, 2008</H4> +<h5>Defects Fixed</h5> +<ul> +<li>The GeneralName string constructor now supports IPv4 and IPv6 address parsing.</li> +<li>EAX mode was not handling non-zero offsetted data correctly and failing. This has been fixed.</li> +<li>EAX mode ciphers were not resetting correctly after a DoFinal/Reset. This has been fixed.</li> +<li>Some boolean parameters to IssuingDistributionPoint were being reversed. This has been fixed.</li><li>A zero length RDN would cause an exception in an X509Name. This has been fixed.</li> +<li>Specifying a greater than 32bit length for a stream and relying on the default BcpgOutputStream resulted in corrupted data. This has been fixed.</li> +<li>Pkcs7Padding validation would not fail if pad length was 0. This has been fixed.</li> +<li>Signature creation time was not being properly initialised in new V4 PGP signature objects although the encoding was correct. This has been fixed.</li> +<li>The '+' character can now be escaped or quoted in the constructor for X509Name.</li> +<li>IV handling in CMS for SEED and Camellia was incorrect. This has been fixed.</li> +<li>ASN.1 stream parser now throws exceptions for unterminated sequences.</li> +<li>X509CertificateParser/X509CrlParser now handle multiple certificates/CRLs in streams that don't support seeking.</li> +<li>The CertID class used by the TSP library was incomplete. This has been fixed</li> +<li>\# is now properly recognised in the X509Name class.</li> +<li>BigInteger.ModInverse was failing for negative values. This has been fixed.</li> +<li>CMS API now supports RSASSA-PSS signatures with explicit salt length.</li> +</ul> +<h5>Additional Features and Functionality</h5> +<ul> +<li>ASN.1 libs now support high tag numbers.</li> +<li>Galois/Counter Mode (GCM) has been added.</li> +<li>The TSP API now supports parsing and validation of responses with V2 signing certificate entries.</li> +<li>Unnecessary local ID attributes on certificates in PKCS12 files are now automatically removed.</li> +<li>New Pkcs12StoreBuilder class supports generation of PKCS12 files with both certificates and keys protected by 3DES.</li> +<li>Certifications associated with user attributes can now be created, verified and removed in OpenPGP.</li> +<li>API support now exists for CMS countersignature reading and production.</li> +<li>A new class LazyAsn1InputStream supports lazy evaluation of DER sequences and sets, considerably reducing memory requirements in some scenarios.</li> +<li>KeyPurposeId class has been updated for RFC 4945.</li> +<li>Initial support has been added for HP_CERTIFICATE_REQUEST in the TLS API.</li> +<li>PGP example programs now handle blank names in literal data objects.</li> +<li>The ProofOfPossession class now better supports the underlying ASN.1 structure.</li> +</ul> +<h5>Additional Notes</h5> +<ul> +<li>Due to problems for some users caused by the presence of the IDEA algorithm, an implementation is no +longer included in the default assembly. Only the assembly named BouncyCastle.CryptoExt now includes IDEA.</li> +<li>See also the list of resolved issues at +<a href="http://www.bouncycastle.org/jira/secure/IssueNavigator.jspa?reset=true&&pid=10001&fixfor=10050&sorter/field=issuekey&sorter/order=DESC"> +Bouncy Castle JIRA C# 1.4</a></li> +</ul> + <H4><A class="mozTocH4" name="mozTocId85308"></A>Release 1.3, Saturday December 8, 2007</H4> + <P> + ASN.1 stream parsing now handles definite length encodings efficiently.<br> + Buffering in the streaming CMS has been reworked. Throughput is now usually higher and the behaviour is more predictable.<br> + BcpgInputStream now handles data blocks in the 2**31->2**32-1 range.<br> + Some confusion over the parameters J and L in connection with Diffie-Hellman has been resolved.<br> + Added CryptoApiRandomGenerator, a wrapper for RNGCryptoServiceProvider.<br> + Added VMPC stream cipher, VMPCMAC and a VMPC-based implementation of IRandomGenerator.<br> + Added support in OpenPGP for fetching keyrings by case-insensitive user ID [#BMA-8].<br> + Fixed a vulnerability of CMS signatures that do not use signed attributes (Bleichenbacher RSA forgery).<br> + Fixed a bug causing second and later encrypted objects to be ignored in KeyBasedFileProcessor example.<br> + Fixed case-sensitivity issue with deletion from a PKCS#12 file.<br> + Fixed problem overwriting entities in a PKCS#12 file.<br> + Fixed PgpUtilities.MakeKeyFromPassPhrase for 8-bit characters [#BMA-13].<br> + Fixed duplicate certificate problem in Pkcs12Store.Save [#BMA-12].<br> + Fixed NAnt build under Mono [#BMA-10].<br> + Fixed BigInteger.ModPow for negative exponents [#BMA-7].<br> + </P> + <H4><A class="mozTocH4" name="mozTocId85307"></A>Release 1.2, Thursday July 5, 2007</H4> + <P> + Source now builds on .NET Compact Framework 1.0 (compilation flag NETCF_1_0).<br> + Release assembly now signed with a strong name.<br> + Added CCM and EAX block cipher modes.<br> + Added Noekeon block cipher.<br> + Added HC-128, HC-256, and ISAAC stream ciphers.<br> + Added RIPEMD160withECDSA signature algorithm.<br> + Added support for notation data signature subpackets to OpenPGP.<br> + Added support for parsing of experimental signatures to OpenPGP.<br> + Added the complete set of SEC-2 EC curves.<br> + Added support for implicit tagging to DerApplicationSpecific.<br> + Added remaining ASN.1 structures from RFC 3126 to Asn1.Esf namespace.<br> + Performance of ECDSA improved.<br> + Performance of ASN.1 stream parsing improved.<br> + Fixed default private key length for Diffie-Hellman parameters.<br> + Fixed DerT61String to correctly support 8-bit characters.<br> + Fixed duplicate attribute problem in Pkcs12Store.Save.<br> + Fixed a problem writing public keys in OpenPGP [#BMA-5].<br> + </P> + <H4><A class="mozTocH4" name="mozTocId85306"></A>Release 1.1, Friday May 4, 2007</H4> + <P> + Added support for writing DSA private keys, and more encodings, in OpenSsl + (PemReader/PemWriter).<br> + Removed SharpZipLib dependency.<br> + Added RSA blinded signature classes.<br> + Added Asn1.IsisMtt namespace (ISIS-MTT ASN.1 classes).<br> + Added SEED block cipher engine.<br> + Added Salsa20 stream cipher engine.<br> + Performance optimisations for F2m elliptic curves.<br> + Fixed OpenPGP bug decrypting files with multiple types of encryption on the + session key.<br> + </P> + <H4><A class="mozTocH4" name="mozTocId85305"></A>Release 1.0, Thursday January 18, + 2007</H4> + <P> + Implementations of CMS, OCSP, OpenPGP, and TSP.<br> + Elliptic Curves (F2m and Fp).<br> + A basic TLS client.<br> + PEM file reading and writing.<br> + Symmetric key algorithms: Camellia, GOST28147, NaccacheStern, and TEA/XTEA.<br> + Symmetric key modes: GOFB and OpenPGPCFB.<br> + Symmetric key paddings: ISO7816d4.<br> + Asymmetric key algorithms: RSA blinding.<br> + Digests: GOST3411 and Whirlpool.<br> + Macs: GOST28147 and ISO9797 Alg 3.<br> + Signer mechanisms: ECDSA, ECGOST3410, and GOST3410.<br> + ...and many more features, bug fixes, and performance improvements.<br> + </P> + <H4><A class="mozTocH4" name="mozTocId85304"></A>Tuesday Febuary 1, 2005</H4> + <P>This is the second beta release of the Bouncy Castle API C# implementation.<BR> + Reliability improvement to ASN1InputStream.<BR> + The OID entries in SignerUtilities for RSA signature algorithms for SHA-256,<BR> + SHA-384, and SHA-512 were pointing creating the wrong signature objects.</P> + <h4><a class="mozTocH4" name="mozTocId498363"></a>Sunday December 12, 2004</h4> + This is the first beta release of the Bouncy Castle Cryptographic API C# + implementation.<br> + The Legion of the Bouncy Castle would like to extend their thanks to all those + who contributed to this API during the alpha stages of its development.<br> + Keep up the good work folks.<br> + Please send any questions or bug reports to <a href="mailto:%5Cdev-crypto-csharp@bouncycastle.org"> + dev-crypto-csharp@bouncycastle.org</a><br> + <br> + <hr style="WIDTH: 100%; HEIGHT: 2px"> + <h3><a class="mozTocH3" name="mozTocId948186"></a>Trademarks.<br> + </h3> + C#, .NET, and MSDN are Registered Trademarks of Microsoft. <a href="http://www.microsoft.com"> + Microsoft.com</a><br> + Java is a Registered Trademark of Sun Microsystems. <a href="http://www.sun.com">Sun + Microsystems</a><br> + <br> + <br> + <div style="TEXT-ALIGN: center">© 2007 Legion of the Bouncy Castle<br> + </div> + </body> +</html> |