Steffen Jaeckel
f9e90f5b1c
revert the change of MAXBLOCKSIZE
...
Currently this only plays a role in HMAC which still uses dynamic
allocation depending on the real blocksize defined by the hash
algorithm.
2017-12-05 17:46:08 +01:00
Steffen Jaeckel
f122e9b887
Merge pull request #329 from libtom/pr/sha3-blocksize
...
Correct SHA3 block sizes
(cherry picked from commit 64d028832b36559af753f8c341c53720e5b33aba)
2017-12-05 17:43:46 +01:00
Steffen Jaeckel
13d91e7c8b
Merge pull request #327 from libtom/fix/ccm_segfault
...
Fix ccm_memory() cleaning user-supplied key
(cherry picked from commit 85ac227862eceb3b22c0852a7dc363d46c2dd532)
2017-12-05 09:23:06 +01:00
Steffen Jaeckel
368dc60ff3
Merge pull request #326 from libtom/pr/ccm_process
...
fixes #323 ccm_process fails to process input buffer longer than 256
(cherry picked from commit 7c4c61d7ef3cbf8ff8ebaad9976224364a688b3c)
2017-12-05 09:21:52 +01:00
Karel Miko
153b897984
helper.pl - detect sizeof without brackets
...
(cherry picked from commit b7e35e9f57f5747d497e1101a624092b8b633302)
2017-12-05 09:21:27 +01:00
Karel Miko
f10c2055dc
helper.pl - improved detection of static functions without _
...
(cherry picked from commit 5c34fb2bad2cc23fc2c038158a606d7b83c33170)
2017-12-05 09:21:17 +01:00
Karel Miko
a674de7408
Merge branch 'diamondo25-patch-2' into develop
...
Fix not defined warnings (-Wundef)
(cherry picked from commit 617698e54459ec9f31c894ba83c6f4dfc5570291)
2017-12-05 09:20:41 +01:00
karel-m
7f6af93798
Merge pull request #320 from diamondo25/patch-1
...
Remove duplicate prototypes
(cherry picked from commit b4eae5231dfbbc2f34509a8e09f7111d189c25df)
2017-12-05 09:20:15 +01:00
karel-m
00ca140c57
Merge pull request #316 from libtom/pr/register-all
...
register_all_* should return CRYPT_OK on success
(cherry picked from commit e4763d940a03a18ec56810152c3dda79991258ac)
2017-12-05 09:19:40 +01:00
Steffen Jaeckel
521d0737ea
fix typo
...
(cherry picked from commit 442bb90a51621deb38a5f9dce890db0f3b312e49)
2017-12-05 09:17:30 +01:00
Steffen Jaeckel
a7d0008f52
bump version
2017-10-10 15:48:35 +02:00
Steffen Jaeckel
62143d96bd
fix doxygen warning
2017-10-10 15:43:26 +02:00
Steffen Jaeckel
ea5cb8bff6
make it possible to use LTC_NOTHING with a math provider
2017-10-10 15:19:01 +02:00
Steffen Jaeckel
dd0bbdeac0
increase default value of Miller-Rabin rounds to 40
2017-10-09 17:58:47 +02:00
Karel Miko
959121253d
rename duplicit rc4.c sober128.c
2017-10-07 11:35:10 +02:00
Steffen Jaeckel
58b71292c3
fixup caed025f8a
...
Simply always use an unsigned long long for ltc_mp_digit on 64-bit besides
when using MSVC.
2017-10-03 19:20:33 +02:00
Steffen Jaeckel
e438dbc3bf
add ltc_mp_digit to sizes and tests
2017-10-03 18:43:32 +02:00
Steffen Jaeckel
caed025f8a
define ltc_mp_digit as 'unsigned long' resp 'unsigned long long' for x32
...
This fixes #306
2017-10-03 18:42:26 +02:00
Steffen Jaeckel
cb34ef8626
fix-up LTC_FAST related defines/typedefs
2017-10-03 13:32:17 +02:00
Steffen Jaeckel
bb291cbbeb
init_GMP() works perfectly fine
2017-10-02 14:06:42 +02:00
Steffen Jaeckel
7f302dab54
make sure size is valid
2017-10-02 01:18:36 +02:00
Steffen Jaeckel
ce7ae84d0d
correctly fix decoding of SubjectPublicKeyInfo
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
db7d7a866e
Revert "fix bit-length check in der_decode_raw_bit_string()"
...
This reverts commit 2b8d83ff93da0764f19f494de0a8211515428cef.
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
e5de0a0004
Revert "catch case where blen%8 != 0"
...
This reverts commit 548ee347c0d3366a41e5fa28ac3c0b44b362fdb5.
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
d1d9566250
format code
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
30b3a9a986
remove {MIN,MAX}_RSA_SIZE
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
40e4a66693
catch case where blen%8 != 0
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
3fef07c03e
also clear bits in der_decode_raw_bit_string()
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
9cfbaa83a3
mostly remove MAX_RSA_SIZE
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
ab02d2e450
fix rsa_import() of MAX_RSA_SIZE'ed keys
...
The ASN1 encoded RSA key contains two MPI's therefore MAX_RSA_SIZE / 8
isn't enough.
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
15eab9702b
don't over-allocate that much in der_decode_subject_public_key_info()
2017-10-01 22:56:46 +02:00
Steffen Jaeckel
0b04279890
fix bit-length check in der_decode_raw_bit_string()
2017-10-01 22:56:46 +02:00
Rob Swindell
6da2211ee9
Update rsa_import.c
...
Bug-fix: MAX_RSA_SIZE is the maximum RSA key size in *bits* (as commented in tomcrypt_custom.h), so the proper conversion to bytes (as the argument value to XCALLOC) would be to divide by 8 (bits per byte), not multiply by 8. This excessive allocation (32 Kbytes instead of 512 bytes) is readily apparent in memory-constrained environments.
2017-10-01 22:56:46 +02:00
Steffen Jaeckel
f4802ef40a
add ltc_math_descriptor to crypt_sizes
2017-09-30 13:01:08 +02:00
Steffen Jaeckel
07c5e6b0a4
bump version
2017-09-27 21:37:21 +02:00
Steffen Jaeckel
4a8bfc0a21
introduce CRYPT_INPUT_TOO_LONG
2017-09-27 21:34:11 +02:00
Steffen Jaeckel
13cb43ad4c
initialize 'flags' etc. to invalid values before trying to decode
2017-09-27 21:34:11 +02:00
Steffen Jaeckel
20c6bf812b
bump version
2017-09-25 16:56:57 +02:00
Karel Miko
83e7f4a1c7
keep dh_key.x instead of free'ing it
...
the approach before probably saves some bytes on the heap, but it's
inconsistent in regards to what we normally do
2017-09-25 15:35:29 +02:00
Steffen Jaeckel
f7c0b25146
add missing math constants
2017-09-23 11:42:05 +02:00
Steffen Jaeckel
312247fa0b
better comments for PKCS#5
2017-09-21 18:37:37 +02:00
Steffen Jaeckel
da4f854329
make sure chacha_crypt() can only be called after setting the IV
2017-09-21 18:37:37 +02:00
Steffen Jaeckel
342a10cc14
make PK_MAX_RETRIES a config option
2017-09-21 18:37:37 +02:00
Steffen Jaeckel
4f7747eaec
DSA not DH
2017-09-20 15:06:40 +02:00
Steffen Jaeckel
c210f24853
IV is short for 'initialization vector'
2017-09-20 15:06:40 +02:00
Steffen Jaeckel
a9d9466694
beautify some strings
...
[skip-ci]
2017-09-20 15:06:28 +02:00
Karel Miko
155e29dd68
dsa_verify_hash must set stat=0 on any error
2017-09-20 11:58:32 +02:00
Karel Miko
5057af3ef1
fix char* vs. const char*
2017-09-18 12:35:03 +02:00
Karel Miko
3b663a199f
fix char* vs. const char* (tests related part)
2017-09-18 09:24:19 +02:00
Karel Miko
5e71849942
properly exit dsa_int_validate_pqg
2017-09-14 20:07:32 +02:00