Commit Graph

1394 Commits

Author SHA1 Message Date
Steffen Jaeckel
58b71292c3 fixup caed025f8a
Simply always use an unsigned long long for ltc_mp_digit on 64-bit besides
when using MSVC.
2017-10-03 19:20:33 +02:00
Steffen Jaeckel
e438dbc3bf add ltc_mp_digit to sizes and tests 2017-10-03 18:43:32 +02:00
Steffen Jaeckel
caed025f8a define ltc_mp_digit as 'unsigned long' resp 'unsigned long long' for x32
This fixes #306
2017-10-03 18:42:26 +02:00
Steffen Jaeckel
cb34ef8626 fix-up LTC_FAST related defines/typedefs 2017-10-03 13:32:17 +02:00
Steffen Jaeckel
bb291cbbeb init_GMP() works perfectly fine 2017-10-02 14:06:42 +02:00
Steffen Jaeckel
01a61e64ef Merge pull request #302 from libtom/fix/pr/301
re-work PK crypto im- & export
2017-10-02 14:05:58 +02:00
Steffen Jaeckel
7f302dab54 make sure size is valid 2017-10-02 01:18:36 +02:00
Steffen Jaeckel
c702ac6f1c improve rsa_test a bit 2017-10-02 01:18:19 +02:00
Karel Miko
67f9064b71 missing rsa_free in _rsa_issue_301 test 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
ce7ae84d0d correctly fix decoding of SubjectPublicKeyInfo 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
db7d7a866e Revert "fix bit-length check in der_decode_raw_bit_string()"
This reverts commit 2b8d83ff93da0764f19f494de0a8211515428cef.
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
e5de0a0004 Revert "catch case where blen%8 != 0"
This reverts commit 548ee347c0d3366a41e5fa28ac3c0b44b362fdb5.
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
d1d9566250 format code 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
30b3a9a986 remove {MIN,MAX}_RSA_SIZE 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
40e4a66693 catch case where blen%8 != 0 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
3fef07c03e also clear bits in der_decode_raw_bit_string() 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
1d20c32a45 update README
[skip ci]
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
9cfbaa83a3 mostly remove MAX_RSA_SIZE 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
ab02d2e450 fix rsa_import() of MAX_RSA_SIZE'ed keys
The ASN1 encoded RSA key contains two MPI's therefore MAX_RSA_SIZE / 8
isn't enough.
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
0500aaec45 add tests for MAX_RSA_SIZE sized openssl-standard RSA keys 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
efa089e211 fixup #290 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
15eab9702b don't over-allocate that much in der_decode_subject_public_key_info() 2017-10-01 22:56:46 +02:00
Steffen Jaeckel
0b04279890 fix bit-length check in der_decode_raw_bit_string() 2017-10-01 22:56:46 +02:00
Steffen Jaeckel
062fc3ffe3 print info when doing a debug build 2017-10-01 22:56:46 +02:00
Rob Swindell
6da2211ee9 Update rsa_import.c
Bug-fix: MAX_RSA_SIZE is the maximum RSA key size in *bits* (as commented in tomcrypt_custom.h), so the proper conversion to bytes (as the argument value to XCALLOC) would be to divide by 8 (bits per byte), not multiply by 8. This excessive allocation (32 Kbytes instead of 512 bytes) is readily apparent in memory-constrained environments.
2017-10-01 22:56:46 +02:00
karel-m
c2f0675ede Merge pull request #304 from libtom/pr/fix-303
missing dsa_free
2017-10-01 17:24:08 +02:00
Karel Miko
98536fa5bf add missing dsa_free to _dsa_wycheproof_test - fixes #303 2017-10-01 15:40:19 +02:00
Steffen Jaeckel
f4802ef40a add ltc_math_descriptor to crypt_sizes 2017-09-30 13:01:08 +02:00
Steffen Jaeckel
9ff889b330 Update makefiles 2017-09-27 21:37:23 +02:00
Steffen Jaeckel
07c5e6b0a4 bump version 2017-09-27 21:37:21 +02:00
Steffen Jaeckel
5f89a5ce2c Merge pull request #298 from libtom/strict_der_decoding
initialize 'flags' etc. to invalid values before trying to decode
2017-09-27 21:34:30 +02:00
Steffen Jaeckel
4a8bfc0a21 introduce CRYPT_INPUT_TOO_LONG 2017-09-27 21:34:11 +02:00
Steffen Jaeckel
13cb43ad4c initialize 'flags' etc. to invalid values before trying to decode 2017-09-27 21:34:11 +02:00
Steffen Jaeckel
8935cd9a8a Merge pull request #299 from libtom/pr/libtool-cygwin
libtool + cygwin
2017-09-27 21:33:29 +02:00
Karel Miko
9c2c9f8af4 libtool on cygwin needs -no-undefined 2017-09-27 21:25:19 +02:00
Steffen Jaeckel
5049463774 bump the libtool version
yeah, helper.pl doesn't update it anymore automagically...
we'll probably find a new way to do that in the future...
or we keep on updating it manually...

This fixes #300
2017-09-27 21:19:33 +02:00
Steffen Jaeckel
f868a16a44 Update makefiles 2017-09-25 16:56:59 +02:00
Steffen Jaeckel
20c6bf812b bump version 2017-09-25 16:56:57 +02:00
Karel Miko
83e7f4a1c7 keep dh_key.x instead of free'ing it
the approach before probably saves some bytes on the heap, but it's
inconsistent in regards to what we normally do
2017-09-25 15:35:29 +02:00
Steffen Jaeckel
f7c0b25146 add missing math constants 2017-09-23 11:42:05 +02:00
Steffen Jaeckel
91a10318f1 Merge pull request #296 from libtom/cleanup/3
General clean-up 3
2017-09-21 20:46:41 +02:00
Karel Miko
ea43d9a1d2 Fix openssl-enc compilation 2017-09-21 18:37:37 +02:00
Steffen Jaeckel
8f7986bbb2 fix coverage_more.sh after updating hashsum 2017-09-21 18:37:37 +02:00
Steffen Jaeckel
5bb63f1bca hashsum: improve help 2017-09-21 18:37:37 +02:00
Steffen Jaeckel
eb75c894db hashsum: cleanup at exit 2017-09-21 18:37:37 +02:00
Steffen Jaeckel
312247fa0b better comments for PKCS#5 2017-09-21 18:37:37 +02:00
Steffen Jaeckel
da4f854329 make sure chacha_crypt() can only be called after setting the IV 2017-09-21 18:37:37 +02:00
Steffen Jaeckel
342a10cc14 make PK_MAX_RETRIES a config option 2017-09-21 18:37:37 +02:00
Steffen Jaeckel
a278f72659 skip comment lines when checking hashes
[skip ci]
2017-09-20 17:43:07 +02:00
Steffen Jaeckel
9a83397376 catch case where we could BOF should_buffer[]
[skip ci]
2017-09-20 17:29:05 +02:00