Steffen Jaeckel
9cfbaa83a3
mostly remove MAX_RSA_SIZE
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
ab02d2e450
fix rsa_import() of MAX_RSA_SIZE'ed keys
...
The ASN1 encoded RSA key contains two MPI's therefore MAX_RSA_SIZE / 8
isn't enough.
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
15eab9702b
don't over-allocate that much in der_decode_subject_public_key_info()
2017-10-01 22:56:46 +02:00
Steffen Jaeckel
0b04279890
fix bit-length check in der_decode_raw_bit_string()
2017-10-01 22:56:46 +02:00
Rob Swindell
6da2211ee9
Update rsa_import.c
...
Bug-fix: MAX_RSA_SIZE is the maximum RSA key size in *bits* (as commented in tomcrypt_custom.h), so the proper conversion to bytes (as the argument value to XCALLOC) would be to divide by 8 (bits per byte), not multiply by 8. This excessive allocation (32 Kbytes instead of 512 bytes) is readily apparent in memory-constrained environments.
2017-10-01 22:56:46 +02:00
Steffen Jaeckel
f4802ef40a
add ltc_math_descriptor to crypt_sizes
2017-09-30 13:01:08 +02:00
Steffen Jaeckel
07c5e6b0a4
bump version
2017-09-27 21:37:21 +02:00
Steffen Jaeckel
4a8bfc0a21
introduce CRYPT_INPUT_TOO_LONG
2017-09-27 21:34:11 +02:00
Steffen Jaeckel
13cb43ad4c
initialize 'flags' etc. to invalid values before trying to decode
2017-09-27 21:34:11 +02:00
Steffen Jaeckel
20c6bf812b
bump version
2017-09-25 16:56:57 +02:00
Karel Miko
83e7f4a1c7
keep dh_key.x instead of free'ing it
...
the approach before probably saves some bytes on the heap, but it's
inconsistent in regards to what we normally do
2017-09-25 15:35:29 +02:00
Steffen Jaeckel
f7c0b25146
add missing math constants
2017-09-23 11:42:05 +02:00
Steffen Jaeckel
312247fa0b
better comments for PKCS#5
2017-09-21 18:37:37 +02:00
Steffen Jaeckel
da4f854329
make sure chacha_crypt() can only be called after setting the IV
2017-09-21 18:37:37 +02:00
Steffen Jaeckel
342a10cc14
make PK_MAX_RETRIES a config option
2017-09-21 18:37:37 +02:00
Steffen Jaeckel
4f7747eaec
DSA not DH
2017-09-20 15:06:40 +02:00
Steffen Jaeckel
c210f24853
IV is short for 'initialization vector'
2017-09-20 15:06:40 +02:00
Steffen Jaeckel
a9d9466694
beautify some strings
...
[skip-ci]
2017-09-20 15:06:28 +02:00
Karel Miko
155e29dd68
dsa_verify_hash must set stat=0 on any error
2017-09-20 11:58:32 +02:00
Karel Miko
5057af3ef1
fix char* vs. const char*
2017-09-18 12:35:03 +02:00
Karel Miko
3b663a199f
fix char* vs. const char* (tests related part)
2017-09-18 09:24:19 +02:00
Karel Miko
5e71849942
properly exit dsa_int_validate_pqg
2017-09-14 20:07:32 +02:00
Karel Miko
bb6a7e1c6c
if dsa_int_validate_* fails return consistently CRYPT_INVALID_PACKET
2017-09-14 18:53:09 +02:00
Karel Miko
a990a8252e
mp_clear_multi - reverse the order
2017-09-14 18:51:02 +02:00
Karel Miko
6200f301a5
add comment #ifdef LTC_SOURCE + internal helper functions
2017-09-14 18:49:42 +02:00
Karel Miko
d91d59421f
fix de-referencing stat before checking for NULL
2017-09-14 18:48:04 +02:00
Karel Miko
444d9f3fb7
do dsa_int_validate_* in dsa_import
2017-09-14 17:38:12 +02:00
Karel Miko
fd94e9540f
move qord trest to dsa_int_validate_pqg
2017-09-14 17:37:39 +02:00
Karel Miko
9765befd6b
do dsa_int_validate_pqg in dsa_set_pqg_dsaparam
2017-09-14 17:29:59 +02:00
Karel Miko
45b6b947da
dsa_int_validate_primes & LTC_MILLER_RABIN_REPS
2017-09-14 17:21:48 +02:00
Karel Miko
c806ea17f9
fix dsa_int_validate_xy
2017-09-14 17:21:48 +02:00
Karel Miko
1ea4fecc81
FIPS 186-4 DSA validity tests
2017-09-14 17:21:48 +02:00
Karel Miko
5fb4c9f89b
another approach for dsa_int_validate_*
2017-09-14 17:21:48 +02:00
Karel Miko
aa5b9dafc4
fix dsa_int_validate_key related compiler warnings
2017-09-14 17:21:48 +02:00
Steffen Jaeckel
1625ce4001
re-factor & re-name internal dsa key validation
2017-09-14 17:21:48 +02:00
Karel Miko
053ba6d600
introducing dsa_verify_key_ex
2017-09-14 17:21:48 +02:00
Karel Miko
2505e3b609
add basic validity tests to dsa_set
2017-09-14 17:21:48 +02:00
Andrew Janke
cfce691a50
initialize ltc_mp to force allocation under all compilers, including clang on macOS
2017-09-14 17:07:49 +02:00
Karel Miko
c927e4315a
dsa_verify_hash: fix wycheproof - appending unused 0's
2017-09-02 14:16:52 +02:00
Karel Miko
7e4bd971de
dsa_verify_hash: properly handle (=reject) negative r, s
2017-09-02 14:16:52 +02:00
Karel Miko
59857ba5e0
fix DSA dependency on RSA #285
2017-09-01 18:24:15 +02:00
Karel Miko
9ea6247da1
Revert "add basic validity tests to dsa_set"
...
This reverts commit 9003e87e5aaee40e5e95277172e3c8079663a082.
2017-08-30 00:03:04 +02:00
Karel Miko
9003e87e5a
add basic validity tests to dsa_set
2017-08-30 00:01:00 +02:00
Steffen Jaeckel
43e6860925
fix RSA - wycheproof "wrong length"
2017-08-29 17:26:14 +02:00
Karel Miko
fe9af6cfbd
RSA: handle wycheproof test vectors - Legacy:missing NULL
2017-08-29 17:26:14 +02:00
Karel Miko
105abdd8cd
GCM: 0 size IV is not valid #273
2017-08-28 16:10:30 +02:00
Steffen Jaeckel
33e70b427a
CRYPT_INVALID_KEYSIZE isn't only used for block ciphers
2017-08-26 12:03:35 +02:00
Steffen Jaeckel
0afbefc549
bump version
2017-08-23 22:35:32 +02:00
Steffen Jaeckel
bb9d397975
default ChaCha to ChaCha20
2017-08-16 11:49:25 +02:00
Karel Miko
de8a53a2e5
ocb3_test cosmetics
...
[skip ci]
2017-08-13 18:15:44 +02:00