NIIBE Yutaka
43980d1c81
RSA in a single step.
2017-10-05 17:06:50 +09:00
NIIBE Yutaka
3adbe30c4d
RSA key generation in two steps.
2017-10-04 09:44:19 +09:00
NIIBE Yutaka
d9ec8778fc
Don't use malloc if not needed.
2017-10-03 16:12:41 +09:00
NIIBE Yutaka
ca7f4c8758
More USB fix for GNU/Linux.
2017-10-02 15:29:45 +09:00
NIIBE Yutaka
62f27f319c
Fix for GNU/Linux.
2017-09-28 15:25:06 +09:00
Anthony Romano
a51ac8593b
call-rsa: free modulus buffers on error paths.
...
* MPI_CHK jumps to cleanup on ret != 0, so p_q_modulus is never freed if
rsa_gen_key fails (detected via scan-build).
* modulus_calc never freed its modulus buffer on error.
Signed-off-by: Anthony Romano <anthony.romano@coreos.com >
2017-07-18 13:15:42 +09:00
NIIBE Yutaka
5795dc9877
rename status-code.h
2016-10-13 11:03:50 +09:00
NIIBE Yutaka
d423678f59
fix cleanup_pop
2015-09-10 14:23:07 +09:00
NIIBE Yutaka
115a7ba67a
fix cancellation
2015-09-10 14:14:37 +09:00
NIIBE Yutaka
edf1a0cdd7
always enable keygen
2015-07-18 13:55:28 +09:00
NIIBE Yutaka
0e510b32c1
Fix EdDSA signature counter
2015-02-10 09:58:45 +09:00
NIIBE Yutaka
d6e70ab0f4
fix key page release
2014-12-15 12:12:54 +09:00
NIIBE Yutaka
0d59d31230
Don't use fixed len for RSA computation
2014-12-12 11:19:24 +09:00
NIIBE Yutaka
84c25e5767
another way to mitigate timing attack
2013-10-06 09:28:58 +09:00
NIIBE Yutaka
533ac62846
PolarSSL update to 1.2.9 (RSA blinding)
2013-10-05 12:30:55 +09:00
NIIBE Yutaka
093917927b
Use pseudo random generator for primality test
2013-10-01 11:53:00 +09:00
NIIBE Yutaka
4db6994fa0
fix memory handling
2013-07-19 12:16:14 +09:00
NIIBE Yutaka
ee7d72743e
port to chopstx
2013-06-20 16:19:49 +09:00
NIIBE Yutaka
a5f4068872
Follow new API of PolarSSL
2013-03-19 15:37:02 +09:00
NIIBE Yutaka
bccc17e23c
Gnuk specific change to rsa
2013-03-19 14:38:12 +09:00
NIIBE Yutaka
bf727758df
fix for new API of PolarSSL
2013-03-19 14:22:43 +09:00
NIIBE Yutaka
a368a45a0d
ecdsa implementation
2013-02-20 16:49:56 +09:00
NIIBE Yutaka
daeac800d8
more change for new ChibiOS/RT
2013-02-18 15:07:13 +09:00
NIIBE Yutaka
a796e9f145
RSA change
2012-07-05 09:32:46 +09:00
NIIBE Yutaka
c61a63dbb6
external authenticate incompatible change to SHA256
2012-06-16 14:33:22 +09:00
NIIBE Yutaka
a2855c9442
use mpi_lset instead of mpi_read_string
2012-06-14 08:53:05 +09:00
NIIBE Yutaka
956e89d10a
keygen is configure option
2012-06-13 09:07:26 +09:00
NIIBE Yutaka
39a3cb8b09
implement key generation
2012-06-07 13:12:27 +09:00
NIIBE Yutaka
fa2ae42e69
SHA1 for external authentication
2012-05-31 13:09:57 +09:00
NIIBE Yutaka
2215a6dd2c
challenge/response definition change
2012-05-31 12:34:11 +09:00
NIIBE Yutaka
6ba65c8d8b
rsa_verify function
2012-05-29 12:14:10 +09:00
NIIBE Yutaka
21debc0567
no ext lc and le but short APDU only
2012-01-20 18:18:23 +09:00
NIIBE Yutaka
87e4fd50c1
New API between gpg and ccid layer
2012-01-18 18:59:16 +09:00
NIIBE Yutaka
f3a3808608
merge call-rsa.c change in the branch of rsa_1024_support.
2011-11-01 11:21:25 +09:00
NIIBE Yutaka
b100828665
USB CCID/ICC implementation changes
2010-12-07 14:34:25 +09:00
NIIBE Yutaka
f67604e7ba
new password management
2010-11-30 10:04:30 +09:00
NIIBE Yutaka
8a88c279bf
Implement "INTERNAL AUTHENTICATE" command.
2010-10-16 09:22:18 +09:00
NIIBE Yutaka
8f029f96e9
call-rsa.c
2010-09-12 16:18:59 +09:00
Kaz Kojima
e512507c80
Apply changes by Kaz Kojima
2010-09-12 16:16:30 +09:00
NIIBE Yutaka
90a1f0379a
decipher works now.
2010-09-08 14:24:12 +09:00
NIIBE Yutaka
38e0533156
works again
2010-09-05 18:10:54 +09:00