Karel Miko
a2dd766ed5
IDEA cipher
2017-10-16 21:20:33 +02:00
Karel Miko
295bde14c1
update makefiles
2017-10-16 21:19:54 +02:00
Steffen Jaeckel
a6c8be292e
Merge pull request #310 from libtom/pr/fix-changes
...
proper 1.18.0 date in changes
2017-10-12 19:41:52 +02:00
karel-m
437cb0207a
proper 1.18.0 date in changes
2017-10-12 17:19:38 +02:00
Steffen Jaeckel
44b15a76aa
add issue and PR templates
2017-10-10 18:08:35 +02:00
Steffen Jaeckel
976e7c4e31
Merge tag 'v1.18.0' into develop
...
libtomcrypt v1.18.0
2017-10-10 15:52:19 +02:00
Steffen Jaeckel
0676c9aec7
Merge branch 'release/1.18.0'
2017-10-10 15:51:36 +02:00
Steffen Jaeckel
c165f3a23a
Update makefiles
2017-10-10 15:48:35 +02:00
Steffen Jaeckel
a7d0008f52
bump version
2017-10-10 15:48:35 +02:00
Steffen Jaeckel
b3c9f586dc
also patch doc/Doxyfile automatically
2017-10-10 15:48:35 +02:00
Steffen Jaeckel
62143d96bd
fix doxygen warning
2017-10-10 15:43:26 +02:00
Steffen Jaeckel
58b5e5c7ca
improve README
...
[skip ci]
2017-10-10 15:19:23 +02:00
Steffen Jaeckel
ea5cb8bff6
make it possible to use LTC_NOTHING with a math provider
2017-10-10 15:19:01 +02:00
Steffen Jaeckel
233ef83530
suppress some warnings when compiling with mingw-gcc
...
[skip ci]
2017-10-10 14:29:34 +02:00
Steffen Jaeckel
e40482f82a
review README.md and changes
2017-10-09 18:26:38 +02:00
Steffen Jaeckel
dd0bbdeac0
increase default value of Miller-Rabin rounds to 40
2017-10-09 17:58:47 +02:00
Steffen Jaeckel
4503ddcfb0
improve wording
...
[skip ci]
2017-10-08 01:05:12 +02:00
Steffen Jaeckel
6493f0fe94
Merge pull request #308 from libtom/pr/avoid-dulplicit-manes
...
Aviod duplicit rc4.c sober128.c
2017-10-08 00:57:47 +02:00
Steffen Jaeckel
bab6af73e5
fix check_source()
2017-10-07 18:09:13 +02:00
Karel Miko
2041f9528e
update makefiles
2017-10-07 11:35:27 +02:00
Karel Miko
959121253d
rename duplicit rc4.c sober128.c
2017-10-07 11:35:10 +02:00
Steffen Jaeckel
adcd6ee9fd
only try to print the version from git if there's git installed
2017-10-03 19:54:27 +02:00
Steffen Jaeckel
58b71292c3
fixup caed025f8a
...
Simply always use an unsigned long long for ltc_mp_digit on 64-bit besides
when using MSVC.
2017-10-03 19:20:33 +02:00
Steffen Jaeckel
e438dbc3bf
add ltc_mp_digit to sizes and tests
2017-10-03 18:43:32 +02:00
Steffen Jaeckel
caed025f8a
define ltc_mp_digit as 'unsigned long' resp 'unsigned long long' for x32
...
This fixes #306
2017-10-03 18:42:26 +02:00
Steffen Jaeckel
cb34ef8626
fix-up LTC_FAST related defines/typedefs
2017-10-03 13:32:17 +02:00
Steffen Jaeckel
bb291cbbeb
init_GMP() works perfectly fine
2017-10-02 14:06:42 +02:00
Steffen Jaeckel
01a61e64ef
Merge pull request #302 from libtom/fix/pr/301
...
re-work PK crypto im- & export
2017-10-02 14:05:58 +02:00
Steffen Jaeckel
7f302dab54
make sure size is valid
2017-10-02 01:18:36 +02:00
Steffen Jaeckel
c702ac6f1c
improve rsa_test a bit
2017-10-02 01:18:19 +02:00
Karel Miko
67f9064b71
missing rsa_free in _rsa_issue_301 test
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
ce7ae84d0d
correctly fix decoding of SubjectPublicKeyInfo
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
db7d7a866e
Revert "fix bit-length check in der_decode_raw_bit_string()"
...
This reverts commit 2b8d83ff93da0764f19f494de0a8211515428cef.
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
e5de0a0004
Revert "catch case where blen%8 != 0"
...
This reverts commit 548ee347c0d3366a41e5fa28ac3c0b44b362fdb5.
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
d1d9566250
format code
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
30b3a9a986
remove {MIN,MAX}_RSA_SIZE
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
40e4a66693
catch case where blen%8 != 0
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
3fef07c03e
also clear bits in der_decode_raw_bit_string()
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
1d20c32a45
update README
...
[skip ci]
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
9cfbaa83a3
mostly remove MAX_RSA_SIZE
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
ab02d2e450
fix rsa_import() of MAX_RSA_SIZE'ed keys
...
The ASN1 encoded RSA key contains two MPI's therefore MAX_RSA_SIZE / 8
isn't enough.
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
0500aaec45
add tests for MAX_RSA_SIZE sized openssl-standard RSA keys
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
efa089e211
fixup #290
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
15eab9702b
don't over-allocate that much in der_decode_subject_public_key_info()
2017-10-01 22:56:46 +02:00
Steffen Jaeckel
0b04279890
fix bit-length check in der_decode_raw_bit_string()
2017-10-01 22:56:46 +02:00
Steffen Jaeckel
062fc3ffe3
print info when doing a debug build
2017-10-01 22:56:46 +02:00
Rob Swindell
6da2211ee9
Update rsa_import.c
...
Bug-fix: MAX_RSA_SIZE is the maximum RSA key size in *bits* (as commented in tomcrypt_custom.h), so the proper conversion to bytes (as the argument value to XCALLOC) would be to divide by 8 (bits per byte), not multiply by 8. This excessive allocation (32 Kbytes instead of 512 bytes) is readily apparent in memory-constrained environments.
2017-10-01 22:56:46 +02:00
karel-m
c2f0675ede
Merge pull request #304 from libtom/pr/fix-303
...
missing dsa_free
2017-10-01 17:24:08 +02:00
Karel Miko
98536fa5bf
add missing dsa_free to _dsa_wycheproof_test - fixes #303
2017-10-01 15:40:19 +02:00
Steffen Jaeckel
f4802ef40a
add ltc_math_descriptor to crypt_sizes
2017-09-30 13:01:08 +02:00