Commit Graph

5098 Commits

Author SHA1 Message Date
Jeffrey Walton
bf8a765c32
Fix Rijndael recursion overflow when -DCRYPTOPP_DISABLE_SSSE3 (GH #880, PR #886) 2019-09-28 21:37:58 -04:00
Jeffrey Walton
4c1b2dc424 Clear sign conversion warnings 2019-09-28 21:30:01 -04:00
Jeffrey Walton
9807a3268f Clear sign conversion warnings 2019-09-28 21:08:22 -04:00
Jeffrey Walton
1190da17ea Avoid circular dependency using AlignedAllocate (GH #885) 2019-09-28 18:22:11 -04:00
Jeffrey Walton
5be96f92f2 Clear shadow warning in MSVC 2019-09-28 16:57:22 -04:00
Jeffrey Walton
a20f725438 Add Certificate interface (GH #884)
The Certificate interface will allow the library or third parties to add concrete classes like X509Certificate with expected library support or integration
2019-09-28 16:09:06 -04:00
Jeffrey Walton
1d27ad529d Move 'make deps' to bottom of Makefile 2019-09-28 05:21:32 -04:00
Jeffrey Walton
54e39a7bcd Update documentation 2019-09-28 03:57:21 -04:00
Jeffrey Walton
f4d68353ca
Use AlignedDeallocate if T_Align16 in deallocate (GH #875)
This should match the behavior of allocate
2019-09-27 12:00:08 -04:00
Jeffrey Walton
b444c02886
Remove unneeded size check (GH #875) 2019-09-27 02:38:40 -04:00
Jeffrey Walton
f99c470cff Update documentation 2019-09-26 23:36:56 -04:00
Jeffrey Walton
9dd40fd2df Update documentation 2019-09-26 15:01:34 -04:00
Jeffrey Walton
7a22d8845d Update documentation 2019-09-26 13:45:31 -04:00
Jeffrey Walton
4e7d0c36df Update documentation 2019-09-26 11:57:08 -04:00
Jeffrey Walton
0c82df181c Update documentation 2019-08-31 07:46:19 -04:00
Jeffrey Walton
033f204a86 Fix .Net 2002 compile
This testing occurs on Windows XP. We are still rockin it
2019-08-27 14:44:27 -04:00
Jeffrey Walton
b067d16e88 Update documentation 2019-08-27 10:28:13 -04:00
Jeffrey Walton
29453dcf08
Update comments 2019-08-27 07:52:33 -04:00
Jeffrey Walton
56165883fc
Update comments 2019-08-27 07:08:07 -04:00
Jeffrey Walton
54c8819c70
Fix ElGamal compile on Linux 2019-08-27 06:44:02 -04:00
Jeffrey Walton
fcbfd68dfb
Add specialized Validate() to ElGamal
This was added for compatibility with BouncyCastle and other libraries. ElGamals paper and the HAC says to select x over the interval [1,p-1]. Crypto++ selects x over [1,q-1] as with other GFP schemes. Crypto++ fails to validate some of the keys of other libraries.
DL_PublicKey_GFP_OldFormat used to perform a reduction on x, but I think it treated a symptom and not the underlying cause. The underlying cause was, Crypto++ wass too strict in validating the parameter.
Note that wikipedia says to select the privaye key x over [1,q-1]. We are unable to find a reference for the practice, though it is OK.
2019-08-27 06:38:25 -04:00
Jeffrey Walton
90b0699edd
Add private key test data for ElGamal 2019-08-27 06:10:38 -04:00
Jeffrey Walton
e06e3bd7a9
Fix ECP::Double and brainpoolP256r1 (GH #878) 2019-08-26 18:33:26 -04:00
Jeffrey Walton
66a6994e99
Add asserts to pubkey.h 2019-08-26 14:44:52 -04:00
Jeffrey Walton
8fa8ec9913
Update documentation 2019-08-25 12:20:21 -04:00
Jeffrey Walton
db6d6b38b8
Update documentation 2019-08-25 12:00:28 -04:00
Jeffrey Walton
72f2b72920
Add test data from bug report (GH #876) 2019-08-24 18:00:03 -04:00
Jeffrey Walton
f78c3c00d2
Regenerate ElGamal test data 2019-08-24 17:49:41 -04:00
Jeffrey Walton
ff941db163
Update documentation 2019-08-24 16:59:39 -04:00
Jeffrey Walton
a2c06c35b8
Use ASN1::elGamal() in ElGamal keys (GH #876) 2019-08-24 16:17:03 -04:00
Jeffrey Walton
a7e83e6bf4
Update asserts in gfpcrypt.cpp 2019-08-24 15:48:14 -04:00
Jeffrey Walton
3d96234038
Fix typedef for MSVC (GH #876) 2019-08-24 06:44:14 -04:00
Jeffrey Walton
29e3818fd2
Add typedef for ElGamal::PrivateKey and ElGamal::PublicKey (GH #876) 2019-08-24 04:44:22 -04:00
Jeffrey Walton
b80693d532
Add OID for ElGamal encryption (GH #876) 2019-08-24 03:18:29 -04:00
Jeffrey Walton
8130bd7a24
Update comments 2019-08-19 08:30:11 -04:00
Jeffrey Walton
b9ff95f35a
Add define for CRYPTOPP_BOOL_ARM64 2019-08-18 04:27:25 -04:00
Jeffrey Walton
6545754337
Check size_t to DWORD and ULONG conversions
DWORD and ULONG are 32-bit. The conversion from size_t could fail, and the RNG would return a truncated result. I think it is low risk, but the test for the conversion test is cheap.
2019-08-17 21:19:04 -04:00
Jeffrey Walton
d49c1a1605
Update documentation 2019-08-17 14:49:03 -04:00
Jeffrey Walton
e22700f741
Fix use of MaxDerivedKeyLength (GH #874) 2019-08-16 07:12:14 -04:00
Jeffrey Walton
c0a5a06a82
Fix use of MaxDerivedKeyLength (GH #874)
Also fix memcpy with NULL buffer
2019-08-16 06:45:30 -04:00
Jeffrey Walton
2ba9d3d00f
Restore former Test_RandomNumberGenerator behavior
There's no need to special case for HURD. No one uses it
2019-08-12 14:55:05 -04:00
Jeffrey Walton
7606c35fda
Update comments 2019-08-12 06:32:21 -04:00
Jeffrey Walton
ea08de08d6
Add missing pumpAll to Test_RandomNumberGenerator 2019-08-12 06:27:10 -04:00
Jeffrey Walton
197f5fb1df
Add ASSERT to check m_fd for values <0
We are seeing RNG falures on HURD, but we are not throwing when constructing BlockingRng or NonblockingRng. This is despite the fact that /dev/urandom is missing during testing. NonblockingRng should always thwo when /dev/urandom is missing.
2019-08-12 05:40:22 -04:00
Jeffrey Walton
6028587b9f
Tighten Test_RandomNumberGenerator test
Debian HURD was slipping between the cracks. HURD appeared to be a minor failure because entropy on the heap improved the test result. After we zero'd the block, it was a catastrophic failure.
2019-08-12 05:34:11 -04:00
Jeffrey Walton
34e49627b7 Use C++ dynamic initialization if available 2019-08-12 00:11:41 -04:00
Jeffrey Walton
2d6895acb4 Update documentation 2019-08-11 22:37:15 -04:00
Jeffrey Walton
247418eec0 Use Bash arithmetic operators 2019-08-11 14:54:14 -04:00
Jeffrey Walton
11c5d14f85
Whitespace check-in 2019-08-10 03:24:52 -04:00
Jeffrey Walton
04b2a20c5d
Restore ECP ABI (GH #869)
Placing AdditionFunction as an inner class of ECP broke the ABI. We need to maintain the ABI so distros can patch Crypto++ 8.2.
2019-08-09 17:34:14 -04:00