Commit Graph

645 Commits

Author SHA1 Message Date
Steffen Jaeckel
a7d0008f52 bump version 2017-10-10 15:48:35 +02:00
Steffen Jaeckel
62143d96bd fix doxygen warning 2017-10-10 15:43:26 +02:00
Steffen Jaeckel
ea5cb8bff6 make it possible to use LTC_NOTHING with a math provider 2017-10-10 15:19:01 +02:00
Steffen Jaeckel
dd0bbdeac0 increase default value of Miller-Rabin rounds to 40 2017-10-09 17:58:47 +02:00
Karel Miko
959121253d rename duplicit rc4.c sober128.c 2017-10-07 11:35:10 +02:00
Steffen Jaeckel
58b71292c3 fixup caed025f8a
Simply always use an unsigned long long for ltc_mp_digit on 64-bit besides
when using MSVC.
2017-10-03 19:20:33 +02:00
Steffen Jaeckel
e438dbc3bf add ltc_mp_digit to sizes and tests 2017-10-03 18:43:32 +02:00
Steffen Jaeckel
caed025f8a define ltc_mp_digit as 'unsigned long' resp 'unsigned long long' for x32
This fixes #306
2017-10-03 18:42:26 +02:00
Steffen Jaeckel
cb34ef8626 fix-up LTC_FAST related defines/typedefs 2017-10-03 13:32:17 +02:00
Steffen Jaeckel
bb291cbbeb init_GMP() works perfectly fine 2017-10-02 14:06:42 +02:00
Steffen Jaeckel
7f302dab54 make sure size is valid 2017-10-02 01:18:36 +02:00
Steffen Jaeckel
ce7ae84d0d correctly fix decoding of SubjectPublicKeyInfo 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
db7d7a866e Revert "fix bit-length check in der_decode_raw_bit_string()"
This reverts commit 2b8d83ff93da0764f19f494de0a8211515428cef.
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
e5de0a0004 Revert "catch case where blen%8 != 0"
This reverts commit 548ee347c0d3366a41e5fa28ac3c0b44b362fdb5.
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
d1d9566250 format code 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
30b3a9a986 remove {MIN,MAX}_RSA_SIZE 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
40e4a66693 catch case where blen%8 != 0 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
3fef07c03e also clear bits in der_decode_raw_bit_string() 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
9cfbaa83a3 mostly remove MAX_RSA_SIZE 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
ab02d2e450 fix rsa_import() of MAX_RSA_SIZE'ed keys
The ASN1 encoded RSA key contains two MPI's therefore MAX_RSA_SIZE / 8
isn't enough.
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
15eab9702b don't over-allocate that much in der_decode_subject_public_key_info() 2017-10-01 22:56:46 +02:00
Steffen Jaeckel
0b04279890 fix bit-length check in der_decode_raw_bit_string() 2017-10-01 22:56:46 +02:00
Rob Swindell
6da2211ee9 Update rsa_import.c
Bug-fix: MAX_RSA_SIZE is the maximum RSA key size in *bits* (as commented in tomcrypt_custom.h), so the proper conversion to bytes (as the argument value to XCALLOC) would be to divide by 8 (bits per byte), not multiply by 8. This excessive allocation (32 Kbytes instead of 512 bytes) is readily apparent in memory-constrained environments.
2017-10-01 22:56:46 +02:00
Steffen Jaeckel
f4802ef40a add ltc_math_descriptor to crypt_sizes 2017-09-30 13:01:08 +02:00
Steffen Jaeckel
07c5e6b0a4 bump version 2017-09-27 21:37:21 +02:00
Steffen Jaeckel
4a8bfc0a21 introduce CRYPT_INPUT_TOO_LONG 2017-09-27 21:34:11 +02:00
Steffen Jaeckel
13cb43ad4c initialize 'flags' etc. to invalid values before trying to decode 2017-09-27 21:34:11 +02:00
Steffen Jaeckel
20c6bf812b bump version 2017-09-25 16:56:57 +02:00
Karel Miko
83e7f4a1c7 keep dh_key.x instead of free'ing it
the approach before probably saves some bytes on the heap, but it's
inconsistent in regards to what we normally do
2017-09-25 15:35:29 +02:00
Steffen Jaeckel
f7c0b25146 add missing math constants 2017-09-23 11:42:05 +02:00
Steffen Jaeckel
312247fa0b better comments for PKCS#5 2017-09-21 18:37:37 +02:00
Steffen Jaeckel
da4f854329 make sure chacha_crypt() can only be called after setting the IV 2017-09-21 18:37:37 +02:00
Steffen Jaeckel
342a10cc14 make PK_MAX_RETRIES a config option 2017-09-21 18:37:37 +02:00
Steffen Jaeckel
4f7747eaec DSA not DH 2017-09-20 15:06:40 +02:00
Steffen Jaeckel
c210f24853 IV is short for 'initialization vector' 2017-09-20 15:06:40 +02:00
Steffen Jaeckel
a9d9466694 beautify some strings
[skip-ci]
2017-09-20 15:06:28 +02:00
Karel Miko
155e29dd68 dsa_verify_hash must set stat=0 on any error 2017-09-20 11:58:32 +02:00
Karel Miko
5057af3ef1 fix char* vs. const char* 2017-09-18 12:35:03 +02:00
Karel Miko
3b663a199f fix char* vs. const char* (tests related part) 2017-09-18 09:24:19 +02:00
Karel Miko
5e71849942 properly exit dsa_int_validate_pqg 2017-09-14 20:07:32 +02:00
Karel Miko
bb6a7e1c6c if dsa_int_validate_* fails return consistently CRYPT_INVALID_PACKET 2017-09-14 18:53:09 +02:00
Karel Miko
a990a8252e mp_clear_multi - reverse the order 2017-09-14 18:51:02 +02:00
Karel Miko
6200f301a5 add comment #ifdef LTC_SOURCE + internal helper functions 2017-09-14 18:49:42 +02:00
Karel Miko
d91d59421f fix de-referencing stat before checking for NULL 2017-09-14 18:48:04 +02:00
Karel Miko
444d9f3fb7 do dsa_int_validate_* in dsa_import 2017-09-14 17:38:12 +02:00
Karel Miko
fd94e9540f move qord trest to dsa_int_validate_pqg 2017-09-14 17:37:39 +02:00
Karel Miko
9765befd6b do dsa_int_validate_pqg in dsa_set_pqg_dsaparam 2017-09-14 17:29:59 +02:00
Karel Miko
45b6b947da dsa_int_validate_primes & LTC_MILLER_RABIN_REPS 2017-09-14 17:21:48 +02:00
Karel Miko
c806ea17f9 fix dsa_int_validate_xy 2017-09-14 17:21:48 +02:00
Karel Miko
1ea4fecc81 FIPS 186-4 DSA validity tests 2017-09-14 17:21:48 +02:00