Commit Graph

  • 80d211ac9f add cmake files from https://github.com/noloader/cryptopp-cmake.git Commit: 7ea79f1b961ff2fad043965ee757a647b5d63af1 cmake Arne Schroeder 2019-09-15 09:04:51 +0200
  • 06b8b290c0
    Merge eae151922f into 0c82df181c Răzvan Cojocaru 2019-08-31 16:26:40 +0000
  • 0c82df181c Update documentation master Jeffrey Walton 2019-08-31 07:46:19 -0400
  • 033f204a86 Fix .Net 2002 compile This testing occurs on Windows XP. We are still rockin it Jeffrey Walton 2019-08-27 14:44:27 -0400
  • b067d16e88 Update documentation Jeffrey Walton 2019-08-27 10:28:13 -0400
  • 29453dcf08
    Update comments Jeffrey Walton 2019-08-27 07:52:33 -0400
  • 56165883fc
    Update comments Jeffrey Walton 2019-08-27 07:08:07 -0400
  • 54c8819c70
    Fix ElGamal compile on Linux Jeffrey Walton 2019-08-27 06:44:02 -0400
  • fcbfd68dfb
    Add specialized Validate() to ElGamal This was added for compatibility with BouncyCastle and other libraries. ElGamals paper and the HAC says to select x over the interval [1,p-1]. Crypto++ selects x over [1,q-1] as with other GFP schemes. Crypto++ fails to validate some of the keys of other libraries. DL_PublicKey_GFP_OldFormat used to perform a reduction on x, but I think it treated a symptom and not the underlying cause. The underlying cause was, Crypto++ wass too strict in validating the parameter. Note that wikipedia says to select the privaye key x over [1,q-1]. We are unable to find a reference for the practice, though it is OK. Jeffrey Walton 2019-08-27 06:38:25 -0400
  • 90b0699edd
    Add private key test data for ElGamal Jeffrey Walton 2019-08-27 06:10:38 -0400
  • e06e3bd7a9
    Fix ECP::Double and brainpoolP256r1 (GH #878) Jeffrey Walton 2019-08-26 18:33:26 -0400
  • 66a6994e99
    Add asserts to pubkey.h Jeffrey Walton 2019-08-26 14:44:52 -0400
  • eae151922f Add support for mcrypt's blowfish-compat Razvan Cojocaru 2019-08-24 14:27:55 +0300
  • 8fa8ec9913
    Update documentation Jeffrey Walton 2019-08-25 12:20:21 -0400
  • db6d6b38b8
    Update documentation Jeffrey Walton 2019-08-25 12:00:28 -0400
  • 72f2b72920
    Add test data from bug report (GH #876) Jeffrey Walton 2019-08-24 18:00:03 -0400
  • f78c3c00d2
    Regenerate ElGamal test data Jeffrey Walton 2019-08-24 17:49:41 -0400
  • ff941db163
    Update documentation Jeffrey Walton 2019-08-24 16:59:39 -0400
  • a2c06c35b8
    Use ASN1::elGamal() in ElGamal keys (GH #876) Jeffrey Walton 2019-08-24 16:17:03 -0400
  • a7e83e6bf4
    Update asserts in gfpcrypt.cpp Jeffrey Walton 2019-08-24 15:48:14 -0400
  • 3d96234038
    Fix typedef for MSVC (GH #876) Jeffrey Walton 2019-08-24 06:44:14 -0400
  • 29e3818fd2
    Add typedef for ElGamal::PrivateKey and ElGamal::PublicKey (GH #876) Jeffrey Walton 2019-08-24 04:44:22 -0400
  • b80693d532
    Add OID for ElGamal encryption (GH #876) Jeffrey Walton 2019-08-24 03:18:29 -0400
  • 8130bd7a24
    Update comments Jeffrey Walton 2019-08-19 08:30:11 -0400
  • b9ff95f35a
    Add define for CRYPTOPP_BOOL_ARM64 Jeffrey Walton 2019-08-18 04:27:25 -0400
  • 6545754337
    Check size_t to DWORD and ULONG conversions DWORD and ULONG are 32-bit. The conversion from size_t could fail, and the RNG would return a truncated result. I think it is low risk, but the test for the conversion test is cheap. Jeffrey Walton 2019-08-17 21:19:04 -0400
  • d49c1a1605
    Update documentation Jeffrey Walton 2019-08-17 14:49:03 -0400
  • e22700f741
    Fix use of MaxDerivedKeyLength (GH #874) Jeffrey Walton 2019-08-16 07:12:14 -0400
  • c0a5a06a82
    Fix use of MaxDerivedKeyLength (GH #874) Also fix memcpy with NULL buffer Jeffrey Walton 2019-08-16 06:45:30 -0400
  • 2ba9d3d00f
    Restore former Test_RandomNumberGenerator behavior There's no need to special case for HURD. No one uses it Jeffrey Walton 2019-08-12 14:55:05 -0400
  • 7606c35fda
    Update comments Jeffrey Walton 2019-08-12 06:32:21 -0400
  • ea08de08d6
    Add missing pumpAll to Test_RandomNumberGenerator Jeffrey Walton 2019-08-12 06:27:10 -0400
  • 197f5fb1df
    Add ASSERT to check m_fd for values <0 We are seeing RNG falures on HURD, but we are not throwing when constructing BlockingRng or NonblockingRng. This is despite the fact that /dev/urandom is missing during testing. NonblockingRng should always thwo when /dev/urandom is missing. Jeffrey Walton 2019-08-12 05:40:22 -0400
  • 6028587b9f
    Tighten Test_RandomNumberGenerator test Debian HURD was slipping between the cracks. HURD appeared to be a minor failure because entropy on the heap improved the test result. After we zero'd the block, it was a catastrophic failure. Jeffrey Walton 2019-08-12 05:34:11 -0400
  • 34e49627b7 Use C++ dynamic initialization if available Jeffrey Walton 2019-08-12 00:11:41 -0400
  • 2d6895acb4 Update documentation Jeffrey Walton 2019-08-11 22:37:15 -0400
  • 247418eec0 Use Bash arithmetic operators Jeffrey Walton 2019-08-11 14:54:14 -0400
  • 11c5d14f85
    Whitespace check-in Jeffrey Walton 2019-08-10 03:24:52 -0400
  • 04b2a20c5d
    Restore ECP ABI (GH #869) Placing AdditionFunction as an inner class of ECP broke the ABI. We need to maintain the ABI so distros can patch Crypto++ 8.2. Jeffrey Walton 2019-08-09 17:34:14 -0400
  • 7ac5791199
    Fix cryptest.sh when swap is 0 If there is enough RAM then we don't need a swap file. I've got a Core i7-8800 with 64 GB or RAM that does not need a swap file. Jeffrey Walton 2019-08-09 17:18:58 -0400
  • 242df465e8
    Update comments Jeffrey Walton 2019-08-07 23:30:48 -0400
  • c4700ae0b9
    Avoid bitwise operation on boolean values Jeffrey Walton 2019-08-07 23:27:33 -0400
  • 348e8e3b30
    Clear unreachable code warnings under VC++ Jeffrey Walton 2019-08-07 22:54:32 -0400
  • 1a5155fd96
    Split public key benchmarks into integers and elliptic curves Jeffrey Walton 2019-08-07 04:20:37 -0400
  • f3dd3d2559
    Avoid temporary ECP::Point in ECP Addition and Double This regains a lot of performance lost to the const-timeness (GH #869) Jeffrey Walton 2019-08-07 02:43:13 -0400
  • b5fe6ab383
    Clear parenthesis warning with GCC Jeffrey Walton 2019-08-07 01:57:59 -0400
  • 7dc3b73e92
    Add rdseed.asm to FileList.txt Jeffrey Walton 2019-08-06 23:25:01 -0400
  • 7bba334641
    Whitespace check-in Jeffrey Walton 2019-08-06 21:42:43 -0400
  • b1c691b53a
    Fix RDSEED hang on x86 (GH #872) (#873) Jeffrey Walton 2019-08-06 21:01:22 -0400
  • e83c390284
    Fix rdrand.obj recipe Jeffrey Walton 2019-08-06 20:19:38 -0400
  • f49fb1fceb
    Fix RDSEED hang on x86 (GH #872) I am not sure why splitting rdrand.asm (with RDRAND and RDSEED) into rdrand.asm (with RDRAND) and rdseed.asm (with RDSEED) fixes this problem... Jeffrey Walton 2019-08-06 19:24:37 -0400
  • 5655a3c7c0
    Update comments Jeffrey Walton 2019-08-06 17:36:46 -0400
  • e5ab7919f9
    Remove unneeded T in ECP Add() Switch to 'R' variable in AdditionFunction to avoid shadow warnings Jeffrey Walton 2019-08-06 03:28:53 -0400
  • 0ded32192e
    Avoid branches in Montgomery Add() (GH #869) Jeffrey Walton 2019-08-06 03:14:03 -0400
  • 5ae70e22b9
    Avoid branches in Montgomery Double() (GH #869) Jeffrey Walton 2019-08-06 01:23:37 -0400
  • df18c5b745 Add Debug and Release linker flags Jeffrey Walton 2019-08-06 00:20:59 -0400
  • 41864fd49e Use local labels for RDRAND and RDSEED code (GH #872) This did not fix the issue, but it is something on the TODO list. Jeffrey Walton 2019-08-06 00:18:56 -0400
  • a01711e347 Fix CopyToRoot target with spaces in path Jeffrey Walton 2019-08-05 13:27:54 -0400
  • c9ef9420e7
    Fix ECP leakage in Add() and Double() (GH #869, PR #871) Jeffrey Walton 2019-08-05 03:51:58 -0400
  • 1f4968b24d
    Update AuthenticatedKeyAgreementWithRolesValidate messages Jeffrey Walton 2019-08-05 03:19:12 -0400
  • 176b8af327
    Fix DL_GroupParameters_EC<T>::Element operator<< Jeffrey Walton 2019-08-05 02:40:25 -0400
  • bb8e4cb74c
    Cleanup Add and Double return values Jeffrey Walton 2019-08-05 02:05:11 -0400
  • 88b37cff04
    Remove debug output from AuthenticatedKeyAgreementWithRolesValidate Jeffrey Walton 2019-08-05 01:32:01 -0400
  • 21518778c5
    Update after fixing Add and Double Jeffrey Walton 2019-08-05 01:19:22 -0400
  • 64a6f53b65
    Fix incorrect result when using Add and Double Jeffrey Walton 2019-08-05 01:15:57 -0400
  • 9be8c7074c
    Add test instantiations for ECMQV, ECHMQV and ECFHMQV Jeffrey Walton 2019-08-04 16:51:17 -0400
  • 3dfeb39343
    Use member variable m_ecp Jeffrey Walton 2019-08-04 15:27:26 -0400
  • 99c0f694b2
    Cleanup seed code in test.cpp Jeffrey Walton 2019-08-04 14:37:48 -0400
  • 4c123ab0e3
    Add key agreement dump on failure Jeffrey Walton 2019-08-04 02:21:26 -0400
  • d4bcc4c707
    Make global seed deteminsitic from the command line Jeffrey Walton 2019-08-04 02:20:15 -0400
  • 86e4199923
    Cleanup ecp.cpp Jeffrey Walton 2019-08-04 01:06:57 -0400
  • b2a47cebc0 Merge branch 'master' of https://github.com/weidai11/cryptopp Jeffrey Walton 2019-08-04 00:16:23 -0400
  • b3eb4c6a69
    Fix AuthenticatedKeyAgreementWithRolesValidate messages Jeffrey Walton 2019-08-03 23:59:25 -0400
  • 1f7787c925 Merge branch 'master' of https://github.com/weidai11/cryptopp Jeffrey Walton 2019-08-03 23:53:46 -0400
  • 5aac8506bd
    Use recipient rather than responder in authenticated key agreement The recipient may not respond (though they do in the case of these key agreement schemes) Jeffrey Walton 2019-08-03 23:52:50 -0400
  • 489dc00501 Merge branch 'master' of https://github.com/weidai11/cryptopp Jeffrey Walton 2019-08-03 23:25:50 -0400
  • 0b42a18cde
    Update documentation Jeffrey Walton 2019-08-03 23:25:15 -0400
  • 85c9fd98e8 Merge branch 'master' of https://github.com/weidai11/cryptopp Jeffrey Walton 2019-08-03 22:59:33 -0400
  • 4e6dd922f7
    Update documentation Jeffrey Walton 2019-08-03 22:33:46 -0400
  • b19fae25e1 Merge branch 'master' of https://github.com/weidai11/cryptopp Jeffrey Walton 2019-08-03 22:27:50 -0400
  • c3e0d123b2
    Update documentation Jeffrey Walton 2019-08-03 22:08:07 -0400
  • 37c0fb7ba8
    Update documentation Jeffrey Walton 2019-08-03 22:05:01 -0400
  • 057c2b434b
    Update documentation Jeffrey Walton 2019-08-03 21:58:26 -0400
  • 26946157a0 Merge branch 'master' of https://github.com/weidai11/cryptopp Jeffrey Walton 2019-08-03 19:23:49 -0400
  • 47a58050c6
    Update documentation Jeffrey Walton 2019-08-03 19:22:17 -0400
  • 79824ec639 Merge branch 'master' of https://github.com/weidai11/cryptopp Jeffrey Walton 2019-08-03 17:02:02 -0400
  • 2e6ccd7fb1
    Fix authenticated key agreement domain parameter consistency test Jeffrey Walton 2019-08-03 17:01:02 -0400
  • 122e3df252 Merge branch 'master' of https://github.com/weidai11/cryptopp Jeffrey Walton 2019-08-03 16:34:11 -0400
  • 7eeb954b23
    Add AuthenticatedKeyAgreementValidateWithRoles free standing test function Jeffrey Walton 2019-08-03 16:32:36 -0400
  • 3c5cb828b1
    Spelling Jeffrey Walton 2019-08-03 15:38:39 -0400
  • b6d7590ba5 Merge branch 'master' of https://github.com/weidai11/cryptopp Jeffrey Walton 2019-08-03 03:34:04 -0400
  • 84c4ae429f
    Fix const-ness in HMQV and FHMQV Jeffrey Walton 2019-08-03 03:24:26 -0400
  • 0163c52588
    Whitespace check-in Jeffrey Walton 2019-08-03 02:41:27 -0400
  • 9366be5615 Use complete addition algorithms in ECP (GH #869) This is the initial cut-in of complete addition algorithms according to https://eprint.iacr.org/2015/1060.pdf. There are two outstanding problems. First, HMQV and FHMQV are failing self tests. We need to investigate further. Second, we cannot use the new algorithms on paths where a Montgomery representation is used. We need to investigate further. This cut-in will allow us to proceed on evaluating the timing leaks. Jeffrey Walton 2019-08-02 23:21:04 -0400
  • 176cab0dc5
    Update comments Reference the bug report in DL_SignerBase::SignAndRestart for future readers Jeffrey Walton 2019-07-29 10:36:29 -0400
  • f68f00f560 Fix ECDSA scalar multiplication leakage of bit-length. (GH #870) Ján Jančár 2019-07-29 16:12:14 +0200
  • 80c59bcdb2 Fix ECDSA scalar multiplication leakage of bit-length. J08nY 2019-07-29 11:50:32 +0200
  • 739e5799e3 Whitespace check-in Jeffrey Walton 2019-07-27 15:56:15 -0400
  • e4c402ace9
    Clear truncation warning in rng.cpp (PR #867) Jeffrey Walton 2019-07-25 04:52:24 -0400
  • 12382a14be Use fixed size temporary in LC_RNG for consistency across platforms (#867) Andrew Marshall 2019-07-23 17:39:52 +0100