Compare commits

...

10 commits

Author SHA1 Message Date
Mirek Kratochvil 08e8bd6f16 avoid using namespace std to prevent future compat problems 2022-09-25 12:25:58 +02:00
Mirek Kratochvil 64585f261e maintenance note 2021-04-23 20:18:13 +02:00
Mirek Kratochvil 89908fed4a push some forgotten formatting changes 2019-02-01 10:57:10 +01:00
Mirek Kratochvil 7c3e802a71 continue the good practice with replacing unneccessary op[] 2019-02-01 10:49:46 +01:00
Mirek Kratochvil 41f2bb4db7 Merge remote-tracking branch 'nico/master' 2019-02-01 10:44:19 +01:00
Tom Li ada0c16f70
hash.h: fix std::vector access violation.
Signed-off-by: Tom Li <tomli@tomli.me>
2019-01-09 23:10:02 +08:00
Tom Li f7ae29ccc2
keyring.cpp: fix std::vector access violation
Signed-off-by: Tom Li <tomli@tomli.me>
2019-01-09 23:09:54 +08:00
Tom Li 6e53922328
cube_hash.h: finalize CubeHash if there's no incomplete block.
Previously, we assume the existence of a incomplete block at
end of the input. However, it's possible that input's an exact
multiple of block size. In this case, the first argument of
process_final_incomplete_block() will be one-past-the-last
element, the second argument will be zero. This' an ill-defined
call, and it will trigger an assertion failure of std::vector

Assertion '__builtin_expect(__n < this->size(), true)' failed.

This commit introduced a check. If we see the length of the last
incomplete block is zero, we call

    process_final_incomplete_block(NULL, 0);

which immediately finalizes CubeHash without hashing additional
data.

Although it should be changed to

    state.process_final_incomplete_block (a.data() + a.size(),
                                          a.size() - i);

It hides the possibility of passing an out-of-bound element to
the function, so it's better to be explicit.

Signed-off-by: Tom Li <tomli@tomli.me>
2019-01-09 23:05:28 +08:00
Tom Li 7021f6c734
sc.h: correct access violation in load_key_vector(), close #2.
In load_key_vector(), the program passes a std::vector<byte> to
a C-style function, load_key (const byte*begin, const byte*end)
by creating references

    load_key (& (K[0]), & (K[K.size()]));

However, accessing the one-past-the-last element in a std::vector
via [] is not allowed in C++, it triggers an assertion failure.

    Assertion '__builtin_expect(__n < this->size(), true)' failed.

In this commit, we use K.data() and K.data() + K.size() to expose
the underlying pointers and pass them to the C function.

Signed-off-by: Tom Li <tomli@tomli.me>
2019-01-02 11:42:04 +08:00
Mirek Kratochvil 4441f8e514 document existing python bindings 2018-10-18 14:37:48 +02:00
9 changed files with 37 additions and 33 deletions

View file

@ -3,6 +3,9 @@
The post-quantum cryptography tool.
Codecrypt is currently unmaintained, although I still successfully use it. If
you are interested in developing/maintaining it, ping me.
#### About
This is a GnuPG-like unix program for encryption and signing that uses only
@ -31,6 +34,10 @@ Go read http://pqcrypto.org/
- Arch linux: see https://aur.archlinux.org/packages/codecrypt/
- *Windows port* is maintained separately here: https://github.com/mike805/codecrypt-win32
Language wrappers:
- Python bindings: https://github.com/mike805/codecrypt-python/
#### Documentation
There is a complete, UNIXy manual page supplied with the package. You can view

View file

@ -37,12 +37,14 @@ public:
state.init();
for (i = 0; i + B <= a.size(); i += B)
state.process_block (& (a[i]));
state.process_block (a.data() + i);
state.process_final_incomplete_block (a.data() + i,
a.size() - i);
state.process_final_incomplete_block (& (a[i]), a.size() - i);
std::vector<byte> result;
result.resize (H, 0);
state.get_hash (& (result[0]));
state.get_hash (result.data());
return result;
}
};
@ -75,7 +77,7 @@ public:
}
}
while (apos + B <= asize) {
state.process_block (& (a[apos]));
state.process_block (a + apos);
apos += B;
}
for (; apos < asize; ++apos, ++bpos)
@ -86,7 +88,7 @@ public:
state.process_final_incomplete_block (buf, bpos);
std::vector<byte> result;
result.resize (H, 0);
state.get_hash (& (result[0]));
state.get_hash (result.data());
return result;
}
};

View file

@ -48,7 +48,7 @@ public:
virtual ~hash_proc() {}
void eat (const std::vector<byte>&a) {
return eat (& (a[0]), & (a[a.size()]));
return eat (a.data(), a.data() + a.size());
}
typedef std::map<std::string, factoryof<hash_proc>*> suite_t;

View file

@ -21,9 +21,7 @@
#include "hashfile.h"
#include <map>
using namespace std;
#include <stdint.h>
#include <cstdint>
#include "hash.h"
#include "iohelpers.h"
@ -72,7 +70,7 @@ public:
* list of hash functions available
*/
typedef map<string, instanceof<hash_proc> > hashmap;
typedef std::map<std::string, instanceof<hash_proc> > hashmap;
void fill_hashmap (hashmap&t)
{
@ -89,7 +87,7 @@ void fill_hashmap (hashmap&t)
t["SIZE64"] = new size64proc;
}
bool hashfile::create (istream&in)
bool hashfile::create (std::istream&in)
{
hashes.clear();
@ -120,7 +118,7 @@ bool hashfile::create (istream&in)
}
}
int hashfile::verify (istream&in)
int hashfile::verify (std::istream&in)
{
hashmap hm_all, hm;
fill_hashmap (hm_all);

View file

@ -43,8 +43,8 @@ std::string keyring::get_keyid (const std::string&pubkey)
cube256hash hf;
std::vector<byte> tmp =
hf (std::vector<byte>
(&pubkey[0],
&pubkey[pubkey.length()]));
(pubkey.data(),
pubkey.data() + pubkey.length()));
r.resize (tmp.size() * 2, ' ');
for (size_t i = 0; i < tmp.size(); ++i) {

View file

@ -86,7 +86,7 @@ void print_help (char*pname)
out (" -n, --no-action on import, only show what would be imported");
out (" -w, --with-lock specify the symmetric key for (un)locking the secrets");
out (" -w @SPEC ask for password and expand it to a symmetric key");
out(" of type SPEC for (un)locking the secret");
out (" of type SPEC for (un)locking the secret");
outeol;
out (" With -S and -w, using `@' as the key file name will cause the program to");
out (" interactively ask for a password and derive the symmetric key from it.");
@ -334,11 +334,11 @@ int main (int argc, char**argv)
fill_algorithm_suite (AS);
//default local user key from environment
if(user.empty()) {
const char*u=getenv("CCR_USER");
if(u) user=u;
if (user.empty()) {
const char*u = getenv ("CCR_USER");
if (u) user = u;
}
/*
* cin/cout redirection
*/

View file

@ -20,11 +20,12 @@
#include "mce_qcmdpc.h"
#include "fft.h"
#include <list>
#include <cmath>
#include "fft.h"
using namespace mce_qcmdpc;
using namespace std;
int mce_qcmdpc::generate (pubkey&pub, privkey&priv, prng&rng,
uint block_size, uint block_count, uint wi,
@ -43,7 +44,7 @@ int mce_qcmdpc::generate (pubkey&pub, privkey&priv, prng&rng,
* (1+x^n).
*/
vector<dcx> H_last_inv;
std::vector<dcx> H_last_inv;
for (;;) {
//retry generating the rightmost block until it is invertible
@ -100,7 +101,7 @@ int mce_qcmdpc::generate (pubkey&pub, privkey&priv, prng&rng,
priv.H[i] = Hb;
//compute inv(H[last])*H[i]
vector<dcx> H;
std::vector<dcx> H;
fft (Hb, H);
for (j = 0; j < block_size; ++j)
H[j] *= H_last_inv[j];
@ -152,7 +153,7 @@ int pubkey::encrypt (const bvector&in, bvector&out, const bvector&errors)
if (G[i].size() != bs) return 1; //prevent mangled keys
//first, the checksum part
vector<dcx> bcheck, Pd, Gd;
std::vector<dcx> bcheck, Pd, Gd;
bcheck.resize (bs, dcx (0, 0)); //initially zero
bvector block;
@ -189,9 +190,6 @@ int privkey::decrypt (const bvector & in, bvector & out)
return decrypt (in, out, tmp_errors);
}
#include <vector>
#include <list>
int privkey::decrypt (const bvector & in_orig, bvector & out, bvector & errors)
{
uint i, j;
@ -208,7 +206,7 @@ int privkey::decrypt (const bvector & in_orig, bvector & out, bvector & errors)
* probabilistic decoding!
*/
vector<dcx> synd_diag, tmp, Htmp;
std::vector<dcx> synd_diag, tmp, Htmp;
synd_diag.resize (bs, dcx (0, 0));
//precompute the syndrome
@ -225,7 +223,7 @@ int privkey::decrypt (const bvector & in_orig, bvector & out, bvector & errors)
fft (synd_diag, syndrome);
//precompute sparse matrix indexes
vector<list<uint> > Hsp;
std::vector<std::list<uint> > Hsp;
Hsp.resize (blocks);
for (i = 0; i < blocks; ++i)
for (j = 0; j < bs; ++j)
@ -242,7 +240,7 @@ int privkey::decrypt (const bvector & in_orig, bvector & out, bvector & errors)
* FFT would be a cool candidate.
*/
vector<unsigned> unsat, round_unsat;
std::vector<unsigned> unsat, round_unsat;
unsat.resize (cs, 0);
for (uint blk = 0; blk < blocks; ++blk)

View file

@ -50,7 +50,7 @@ public:
}
void load_key_vector (const std::vector<byte>&K) {
load_key (& (K[0]), & (K[K.size()]));
load_key (K.data(), K.data() + K.size());
}
typedef std::map<std::string, factoryof<streamcipher>*> suite_t;

View file

@ -22,7 +22,6 @@
#include <algorithm>
#include <cctype> //for tolower()
using namespace std;
bool algorithm_name_matches (const std::string& search,
const std::string&name)
@ -34,7 +33,7 @@ bool algorithm_name_matches (const std::string& search,
return true;
}
bool matches_icase (string name, string s)
bool matches_icase (std::string name, std::string s)
{
transform (name.begin(), name.end(), name.begin(), ::tolower);
transform (s.begin(), s.end(), s.begin(), ::tolower);