as3-crypto
as3-crypto copied to clipboard
Upstream issue tracking
The original repo can be found on Google Code.
List of issues:
- [x]
#1 Inline ASDoc comments not allowed
Addressed by 34d0618ef62138c8cebacd5bbc0365958a083d70 - [ ] #2 TLSEngine reports errors when connecting over VPN vs. straight LAN.
- [ ] #3 Common Name mismatches cause immediate errors, with no exit/ignore strategy.
- [ ] #4 TLSSocket doesn't send handshake
- [ ] #5 Wildcards not supported in tls
- [ ] #6 Cannot get TLS to work from server
- [ ] #7 RSA Verify fails due to TypeError: Error #2007: Parameter bytes must be non-null.
- [ ] #8 Error with plus.pop.mail.yahoo.com
- [x]
#10 build fails for flex sdk 3.2
Resolution: build-swc.xml is no longer used - [ ] #11 AFAIK nothing on the Secret Key page actually works on the demo
- [ ] #12 Does it support reading keys from a keystore?
- [ ] #13 X509Certificate.isSigned does not seem to respect timezones
- [ ] #14 TLSEngine produces incorrect packets for data longer than 16KB.
- [x]
#15 Crypto adds too much to a project's filesize.
Tests are no longer included in the build and as outlined one does not necessarily need to use the convenience class. - [ ] #16 Support for diffie-hellman algorithm
- [ ] #17 RSA encryption causes BadPaddingException on Java decryption
- [ ] #18 RSA ecrypt Error when decrypt large amount of data
- [ ] #19 extra return in TLSSocket
- [x]
#20 Allow ASDOCs to be build
Addressed by 34d0618ef62138c8cebacd5bbc0365958a083d70 - [ ] #21 TripleDES implementation is not compatable with .NET's
- [x]
#22 flex2.compiler.as3.SignatureExtension.SignatureGenerationFailed when compiling com.hurlant.crypto.symmetric.AESKey
Flex compiler bug from the past - [ ] #23 Self-signed cert fails on connect
- [x]
#24 Mozilla Certificates tool.
Addressed by 19767fc6768af822802cb4eb49142e9cec43511c - [ ] #25 TLSSocket "pure virtual function call"
- [ ] #26 RSAKey verify error (PKCS#1 unpad: i=0, expected b[i]==[0,1,2])
- [ ] #27 Inconsistent behavior on 64-bit flash runtime in Linux
- [ ] #28 bug in decrypting
- [ ] #29 Encrypt function works periodically
- [ ] #30 AES mode Error
- [ ] #31 Lot of run-time errors in http://crypto.hurlant.com/demo/
- [ ] #32 readRSAPublicKey fails to load key with arr[1].position = 1;
- [ ] #33 protected var h:Array on SHA256
- [ ] #34 toString(10) in a BigInteger enters an infinite loop
- [ ] #35 TLS socket Cross-domain Problem
- [x]
#36 include 700% faster base64 class
See #1, addressed by a1e287bf3fe74d7677c0ff614263d5c1d8eece33 - [ ] #37 Base64
- [ ] #39 I DONT KNOW HOW TO HANDLE DER stuff of TYPE 22
- [ ] #40 Encryption error
- [ ] #41 What about async encryption process impl?
- [ ] #42 Decrypting Text-based Blowfish Encryption in CBC Mode
- [ ] #43 XTea implementation is wrong
- [ ] #44 Java encrypted content fails to decrypt with Private Key
- [ ] #45 Compiler error in AESKey: for-loops in static initializers should be nested inside anonymous functions
- [ ] #46 Automatic initialization vector in IVMode class fails.
- [ ] #47 RSA decrypt skips the first byte of data
- [ ] #48 AESKey.decrypt only decrypts the first 16 bytes of a message correctly, and put the rest of the encrtyped message on the end.
- [ ] #49 IHash#hash should take an IDataInput rather than ByteArray
- [ ] #50 RSA sign fail on xmlsec verify.
- [ ] #51 AES encryption is incompatible with java AES decryption - always gives BadPaddingException
- [ ] #52 RSAKey canDecrypt and canEncrypt flags not set in RSAKey.generate() method
- [ ] #53 Hex.toString()/fromString is not 100% reversible
- [ ] #54 Submitted Patch for various certificate parsing issues
- [ ] #55 Found typo!
- [ ] #56 Strange code in BigInteger
- [ ] #57 rsa problem
- [ ] #58 Found typo! in RSA Verify
- [ ] #59 Found error! in RSA _encrypt ( r28 )
- [x]
#60 Base64 decode is incorrect when working with double-byte characters
Covered with test-case in 8d9aa48c5a2fb63d688a30914239fcdc91e40c97 - [x]
#61 Constructor of BigInteger doesn't support negative numbers
Addressed by 35dad947339183276080e095c211f9c2463d267d - [ ] #62 CTRMode broken - pads final block even with NullPad
- [ ] #63 RSA sign function problem
- [ ] #64 PKCS#1 unpad: i=0, expected b[i]==2, got b[i]=3b Error: Decrypt error - padding function returned null!
- [ ] #65 encrypt in flash / decrypt in java use RSA
- [ ] #66 Only 64 bits of IV (initialization vector) are used with CBC
- [ ] #67 PKCS 1.5 PADDING
- [ ] #68 Difference between demo outputs and local test outputs
- [ ] #69 Incorrect RC4 generation
- [x]
#70 Memory leak in Base64 encode
Addressed by a1e287bf3fe74d7677c0ff614263d5c1d8eece33 - [ ] #71 TLSEngine overflow patch has critical errors
- [ ] #72 pkcs1pad crashes in flex application compiled for iOS
- [ ] #73 new BigInteger("0", 10) is not equal to BigInteger.nbv(0)
- [ ] #74 Patch for /trunk/as3crypto/src/com/hurlant/crypto/hash/SHABase.as
- [ ] #75 Patch for /trunk/as3crypto/src/com/hurlant/util/asn1/parser/pkcs9unstructuredString.as