Commit Graph

655 Commits

Author SHA1 Message Date
Steffen Jaeckel
f9e90f5b1c revert the change of MAXBLOCKSIZE
Currently this only plays a role in HMAC which still uses dynamic
allocation depending on the real blocksize defined by the hash
algorithm.
2017-12-05 17:46:08 +01:00
Steffen Jaeckel
f122e9b887 Merge pull request #329 from libtom/pr/sha3-blocksize
Correct SHA3 block sizes
(cherry picked from commit 64d028832b36559af753f8c341c53720e5b33aba)
2017-12-05 17:43:46 +01:00
Steffen Jaeckel
13d91e7c8b Merge pull request #327 from libtom/fix/ccm_segfault
Fix ccm_memory() cleaning user-supplied key
(cherry picked from commit 85ac227862eceb3b22c0852a7dc363d46c2dd532)
2017-12-05 09:23:06 +01:00
Steffen Jaeckel
368dc60ff3 Merge pull request #326 from libtom/pr/ccm_process
fixes #323 ccm_process fails to process input buffer longer than 256
(cherry picked from commit 7c4c61d7ef3cbf8ff8ebaad9976224364a688b3c)
2017-12-05 09:21:52 +01:00
Karel Miko
153b897984 helper.pl - detect sizeof without brackets
(cherry picked from commit b7e35e9f57f5747d497e1101a624092b8b633302)
2017-12-05 09:21:27 +01:00
Karel Miko
f10c2055dc helper.pl - improved detection of static functions without _
(cherry picked from commit 5c34fb2bad2cc23fc2c038158a606d7b83c33170)
2017-12-05 09:21:17 +01:00
Karel Miko
a674de7408 Merge branch 'diamondo25-patch-2' into develop
Fix not defined warnings (-Wundef)

(cherry picked from commit 617698e54459ec9f31c894ba83c6f4dfc5570291)
2017-12-05 09:20:41 +01:00
karel-m
7f6af93798 Merge pull request #320 from diamondo25/patch-1
Remove duplicate prototypes
(cherry picked from commit b4eae5231dfbbc2f34509a8e09f7111d189c25df)
2017-12-05 09:20:15 +01:00
karel-m
00ca140c57 Merge pull request #316 from libtom/pr/register-all
register_all_* should return CRYPT_OK on success
(cherry picked from commit e4763d940a03a18ec56810152c3dda79991258ac)
2017-12-05 09:19:40 +01:00
Steffen Jaeckel
521d0737ea fix typo
(cherry picked from commit 442bb90a51621deb38a5f9dce890db0f3b312e49)
2017-12-05 09:17:30 +01:00
Steffen Jaeckel
a7d0008f52 bump version 2017-10-10 15:48:35 +02:00
Steffen Jaeckel
62143d96bd fix doxygen warning 2017-10-10 15:43:26 +02:00
Steffen Jaeckel
ea5cb8bff6 make it possible to use LTC_NOTHING with a math provider 2017-10-10 15:19:01 +02:00
Steffen Jaeckel
dd0bbdeac0 increase default value of Miller-Rabin rounds to 40 2017-10-09 17:58:47 +02:00
Karel Miko
959121253d rename duplicit rc4.c sober128.c 2017-10-07 11:35:10 +02:00
Steffen Jaeckel
58b71292c3 fixup caed025f8a
Simply always use an unsigned long long for ltc_mp_digit on 64-bit besides
when using MSVC.
2017-10-03 19:20:33 +02:00
Steffen Jaeckel
e438dbc3bf add ltc_mp_digit to sizes and tests 2017-10-03 18:43:32 +02:00
Steffen Jaeckel
caed025f8a define ltc_mp_digit as 'unsigned long' resp 'unsigned long long' for x32
This fixes #306
2017-10-03 18:42:26 +02:00
Steffen Jaeckel
cb34ef8626 fix-up LTC_FAST related defines/typedefs 2017-10-03 13:32:17 +02:00
Steffen Jaeckel
bb291cbbeb init_GMP() works perfectly fine 2017-10-02 14:06:42 +02:00
Steffen Jaeckel
7f302dab54 make sure size is valid 2017-10-02 01:18:36 +02:00
Steffen Jaeckel
ce7ae84d0d correctly fix decoding of SubjectPublicKeyInfo 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
db7d7a866e Revert "fix bit-length check in der_decode_raw_bit_string()"
This reverts commit 2b8d83ff93da0764f19f494de0a8211515428cef.
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
e5de0a0004 Revert "catch case where blen%8 != 0"
This reverts commit 548ee347c0d3366a41e5fa28ac3c0b44b362fdb5.
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
d1d9566250 format code 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
30b3a9a986 remove {MIN,MAX}_RSA_SIZE 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
40e4a66693 catch case where blen%8 != 0 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
3fef07c03e also clear bits in der_decode_raw_bit_string() 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
9cfbaa83a3 mostly remove MAX_RSA_SIZE 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
ab02d2e450 fix rsa_import() of MAX_RSA_SIZE'ed keys
The ASN1 encoded RSA key contains two MPI's therefore MAX_RSA_SIZE / 8
isn't enough.
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
15eab9702b don't over-allocate that much in der_decode_subject_public_key_info() 2017-10-01 22:56:46 +02:00
Steffen Jaeckel
0b04279890 fix bit-length check in der_decode_raw_bit_string() 2017-10-01 22:56:46 +02:00
Rob Swindell
6da2211ee9 Update rsa_import.c
Bug-fix: MAX_RSA_SIZE is the maximum RSA key size in *bits* (as commented in tomcrypt_custom.h), so the proper conversion to bytes (as the argument value to XCALLOC) would be to divide by 8 (bits per byte), not multiply by 8. This excessive allocation (32 Kbytes instead of 512 bytes) is readily apparent in memory-constrained environments.
2017-10-01 22:56:46 +02:00
Steffen Jaeckel
f4802ef40a add ltc_math_descriptor to crypt_sizes 2017-09-30 13:01:08 +02:00
Steffen Jaeckel
07c5e6b0a4 bump version 2017-09-27 21:37:21 +02:00
Steffen Jaeckel
4a8bfc0a21 introduce CRYPT_INPUT_TOO_LONG 2017-09-27 21:34:11 +02:00
Steffen Jaeckel
13cb43ad4c initialize 'flags' etc. to invalid values before trying to decode 2017-09-27 21:34:11 +02:00
Steffen Jaeckel
20c6bf812b bump version 2017-09-25 16:56:57 +02:00
Karel Miko
83e7f4a1c7 keep dh_key.x instead of free'ing it
the approach before probably saves some bytes on the heap, but it's
inconsistent in regards to what we normally do
2017-09-25 15:35:29 +02:00
Steffen Jaeckel
f7c0b25146 add missing math constants 2017-09-23 11:42:05 +02:00
Steffen Jaeckel
312247fa0b better comments for PKCS#5 2017-09-21 18:37:37 +02:00
Steffen Jaeckel
da4f854329 make sure chacha_crypt() can only be called after setting the IV 2017-09-21 18:37:37 +02:00
Steffen Jaeckel
342a10cc14 make PK_MAX_RETRIES a config option 2017-09-21 18:37:37 +02:00
Steffen Jaeckel
4f7747eaec DSA not DH 2017-09-20 15:06:40 +02:00
Steffen Jaeckel
c210f24853 IV is short for 'initialization vector' 2017-09-20 15:06:40 +02:00
Steffen Jaeckel
a9d9466694 beautify some strings
[skip-ci]
2017-09-20 15:06:28 +02:00
Karel Miko
155e29dd68 dsa_verify_hash must set stat=0 on any error 2017-09-20 11:58:32 +02:00
Karel Miko
5057af3ef1 fix char* vs. const char* 2017-09-18 12:35:03 +02:00
Karel Miko
3b663a199f fix char* vs. const char* (tests related part) 2017-09-18 09:24:19 +02:00
Karel Miko
5e71849942 properly exit dsa_int_validate_pqg 2017-09-14 20:07:32 +02:00