libtomcrypt icon indicating copy to clipboard operation
libtomcrypt copied to clipboard

LibTomCrypt is a fairly comprehensive, modular and portable cryptographic toolkit that provides developers with a vast array of well known published block ciphers, one-way hash functions, chaining mod...

Results 78 libtomcrypt issues
Sort by recently updated
recently updated
newest added

Hi, developers, thank you for your checking. It seems the **lock ltc_ecc_fp_lock** is not released correctly when **cache_entry == NULL** in the function **ltc_ecc_fp_save_state**? https://github.com/libtom/libtomcrypt/blob/673f5ce29015a9bba3c96792920a10601b5b0718/src/math/fp/ltc_ecc_fp_mulmod.c#L1412-L1433

* [x] documentation is added or updated * [x] tests are added or updated This PR adds support for the AES-NI instructions as discussed in e.g. #480 or #551

It would be nice to support deterministic ecc signatures - see https://tools.ietf.org/html/rfc6979 It is related only to `ecc_sign_hash_ex` as the verification works as usual. It can be done without any...

This modifies how the timing demo of RSA and ECC work. 1. it updates the timing output to be easier machine-readable. 1. it introduces reference-keys to measure the timing.

This PR is incomplete (as I am not sure if it is the proper fix). Cc: @sjaeckel @rmw42 TODO: - [ ] update doc - [ ] add a test...

Avoids undefined behaviour with right shift greater than 32 bits. (c99 6.5.7 "If the value of the right operand is negative or is *greater than or equal to the width*...

Let's have a valid signature like: 0x30,0x45,0x02,0x20,0x2b,0xa3,0xa8,0xbe,0x6b,0x94,0xd5,0xec,0x80,0xa6,0xd9,0xd1,0x19,0x0a, 0x43,0x6e,0xff,0xe5,0x0d,0x85,0xa1,0xee,0xe8,0x59,0xb8,0xcc,0x6a,0xf9,0xbd,0x5c,0x2e,0x18, 0x02,0x21,0x00,0xb3,0x29,0xf4,0x79,0xa2,0xbb,0xd0,0xa5,0xc3,0x84,0xee,0x14,0x93,0xb1,0xf5, 0x18,0x6a,0x87,0x13,0x9c,0xac,0x5d,0xf4,0x08,0x7c,0x13,0x4b,0x49,0x15,0x68,0x47,0xdb, Now let's patch the first `0x30` to `0x31` like: 0x31,0x45,0x02,0x20,0x2b,0xa3,0xa8,0xbe,0x6b,0x94,0xd5,0xec,0x80,0xa6,0xd9,0xd1,0x19,0x0a, 0x43,0x6e,0xff,0xe5,0x0d,0x85,0xa1,0xee,0xe8,0x59,0xb8,0xcc,0x6a,0xf9,0xbd,0x5c,0x2e,0x18, 0x02,0x21,0x00,0xb3,0x29,0xf4,0x79,0xa2,0xbb,0xd0,0xa5,0xc3,0x84,0xee,0x14,0x93,0xb1,0xf5, 0x18,0x6a,0x87,0x13,0x9c,0xac,0x5d,0xf4,0x08,0x7c,0x13,0x4b,0x49,0x15,0x68,0x47,0xdb, We still verify the patched signature whereas...

If LTC_BASE64_URL is unset it creates a zero length array, which isn't allowed by some compilers

### Checklist * [ ] documentation is added or updated * [x] tests are added or updated This is a PoC/RFC for adding the enc+auth mode [RFC5297 SIV - Synthetic...

feature

This si a note for myself to analyze what's wrong in the crash described here: https://bugzilla.redhat.com/show_bug.cgi?id=1850650