- Adds
MIHEC*
classes to support Elliptic Curve Cryptography. - Fix a memory leak in
MIHRSAPrivateKey
andMIHPublicKey
(see issue #60 for details).
There are no API breaks in release 0.5.0 compared to 0.4.1. Thanks to @lolgear for MICEC*
implementation and thanks to @zty0 for pointing out the memory leak.
- Adds
signWithMD5:error:
andverifySignatureWithMD5:message:
toMIHRSAPrivateKey
andMIHRSAPublicKey
. - Fixes a rare memory leak in
MIHAESKey
andMIHDESKey
which occurs when OpenSSL failed during encryption or decryption of the data.
There are no API breaks in release 0.4.1 compared to 0.4.
- Renamed
MIHBigInteger#initWithData:
(usingBN_mpi2bn
internally) toMIHBigInteger#initWithMpiData:
and added aMIHBigInteger#initWithData:
method which really accepts binary data (usingBN_bin2bn
internally). RSA_PKCS1_OAEP_PADDING
is now the default padding for RSA since it is more common. (Before it wasRSA_PKCS1_PADDING
).- Added the ability to encrypt with private keys and decrypt with public keys.
Attention: Release 0.4 contains breaking changes.
- Adds support for handling OpenSSLs
BIGNUM
. (SeeMIHBigNumber
.) - Adds
signWithSHA128:error:
andverifySignatureWithSHA128:message:
to MIHRSAPrivateKey and MIHRSAPublicKey.
There are no API breaks in release 0.3.