Commit Graph

1416 Commits

Author SHA1 Message Date
Karel Miko
a2dd766ed5 IDEA cipher 2017-10-16 21:20:33 +02:00
Karel Miko
295bde14c1 update makefiles 2017-10-16 21:19:54 +02:00
Steffen Jaeckel
a6c8be292e Merge pull request #310 from libtom/pr/fix-changes
proper 1.18.0 date in changes
2017-10-12 19:41:52 +02:00
karel-m
437cb0207a proper 1.18.0 date in changes 2017-10-12 17:19:38 +02:00
Steffen Jaeckel
44b15a76aa add issue and PR templates 2017-10-10 18:08:35 +02:00
Steffen Jaeckel
976e7c4e31 Merge tag 'v1.18.0' into develop
libtomcrypt v1.18.0
2017-10-10 15:52:19 +02:00
Steffen Jaeckel
0676c9aec7 Merge branch 'release/1.18.0' 2017-10-10 15:51:36 +02:00
Steffen Jaeckel
c165f3a23a Update makefiles 2017-10-10 15:48:35 +02:00
Steffen Jaeckel
a7d0008f52 bump version 2017-10-10 15:48:35 +02:00
Steffen Jaeckel
b3c9f586dc also patch doc/Doxyfile automatically 2017-10-10 15:48:35 +02:00
Steffen Jaeckel
62143d96bd fix doxygen warning 2017-10-10 15:43:26 +02:00
Steffen Jaeckel
58b5e5c7ca improve README
[skip ci]
2017-10-10 15:19:23 +02:00
Steffen Jaeckel
ea5cb8bff6 make it possible to use LTC_NOTHING with a math provider 2017-10-10 15:19:01 +02:00
Steffen Jaeckel
233ef83530 suppress some warnings when compiling with mingw-gcc
[skip ci]
2017-10-10 14:29:34 +02:00
Steffen Jaeckel
e40482f82a review README.md and changes 2017-10-09 18:26:38 +02:00
Steffen Jaeckel
dd0bbdeac0 increase default value of Miller-Rabin rounds to 40 2017-10-09 17:58:47 +02:00
Steffen Jaeckel
4503ddcfb0 improve wording
[skip ci]
2017-10-08 01:05:12 +02:00
Steffen Jaeckel
6493f0fe94 Merge pull request #308 from libtom/pr/avoid-dulplicit-manes
Aviod duplicit rc4.c sober128.c
2017-10-08 00:57:47 +02:00
Steffen Jaeckel
bab6af73e5 fix check_source() 2017-10-07 18:09:13 +02:00
Karel Miko
2041f9528e update makefiles 2017-10-07 11:35:27 +02:00
Karel Miko
959121253d rename duplicit rc4.c sober128.c 2017-10-07 11:35:10 +02:00
Steffen Jaeckel
adcd6ee9fd only try to print the version from git if there's git installed 2017-10-03 19:54:27 +02:00
Steffen Jaeckel
58b71292c3 fixup caed025f8a
Simply always use an unsigned long long for ltc_mp_digit on 64-bit besides
when using MSVC.
2017-10-03 19:20:33 +02:00
Steffen Jaeckel
e438dbc3bf add ltc_mp_digit to sizes and tests 2017-10-03 18:43:32 +02:00
Steffen Jaeckel
caed025f8a define ltc_mp_digit as 'unsigned long' resp 'unsigned long long' for x32
This fixes #306
2017-10-03 18:42:26 +02:00
Steffen Jaeckel
cb34ef8626 fix-up LTC_FAST related defines/typedefs 2017-10-03 13:32:17 +02:00
Steffen Jaeckel
bb291cbbeb init_GMP() works perfectly fine 2017-10-02 14:06:42 +02:00
Steffen Jaeckel
01a61e64ef Merge pull request #302 from libtom/fix/pr/301
re-work PK crypto im- & export
2017-10-02 14:05:58 +02:00
Steffen Jaeckel
7f302dab54 make sure size is valid 2017-10-02 01:18:36 +02:00
Steffen Jaeckel
c702ac6f1c improve rsa_test a bit 2017-10-02 01:18:19 +02:00
Karel Miko
67f9064b71 missing rsa_free in _rsa_issue_301 test 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
ce7ae84d0d correctly fix decoding of SubjectPublicKeyInfo 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
db7d7a866e Revert "fix bit-length check in der_decode_raw_bit_string()"
This reverts commit 2b8d83ff93da0764f19f494de0a8211515428cef.
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
e5de0a0004 Revert "catch case where blen%8 != 0"
This reverts commit 548ee347c0d3366a41e5fa28ac3c0b44b362fdb5.
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
d1d9566250 format code 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
30b3a9a986 remove {MIN,MAX}_RSA_SIZE 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
40e4a66693 catch case where blen%8 != 0 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
3fef07c03e also clear bits in der_decode_raw_bit_string() 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
1d20c32a45 update README
[skip ci]
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
9cfbaa83a3 mostly remove MAX_RSA_SIZE 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
ab02d2e450 fix rsa_import() of MAX_RSA_SIZE'ed keys
The ASN1 encoded RSA key contains two MPI's therefore MAX_RSA_SIZE / 8
isn't enough.
2017-10-01 22:56:47 +02:00
Steffen Jaeckel
0500aaec45 add tests for MAX_RSA_SIZE sized openssl-standard RSA keys 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
efa089e211 fixup #290 2017-10-01 22:56:47 +02:00
Steffen Jaeckel
15eab9702b don't over-allocate that much in der_decode_subject_public_key_info() 2017-10-01 22:56:46 +02:00
Steffen Jaeckel
0b04279890 fix bit-length check in der_decode_raw_bit_string() 2017-10-01 22:56:46 +02:00
Steffen Jaeckel
062fc3ffe3 print info when doing a debug build 2017-10-01 22:56:46 +02:00
Rob Swindell
6da2211ee9 Update rsa_import.c
Bug-fix: MAX_RSA_SIZE is the maximum RSA key size in *bits* (as commented in tomcrypt_custom.h), so the proper conversion to bytes (as the argument value to XCALLOC) would be to divide by 8 (bits per byte), not multiply by 8. This excessive allocation (32 Kbytes instead of 512 bytes) is readily apparent in memory-constrained environments.
2017-10-01 22:56:46 +02:00
karel-m
c2f0675ede Merge pull request #304 from libtom/pr/fix-303
missing dsa_free
2017-10-01 17:24:08 +02:00
Karel Miko
98536fa5bf add missing dsa_free to _dsa_wycheproof_test - fixes #303 2017-10-01 15:40:19 +02:00
Steffen Jaeckel
f4802ef40a add ltc_math_descriptor to crypt_sizes 2017-09-30 13:01:08 +02:00