summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* lib: update webSessionEncryptionKeyrsiddharth2021-02-241-4/+4
| | | | Use RandomBytes to set `webSessionEncryptionKey`
* lib: randomBytes -> randomBytesWithLengthBetweenrsiddharth2021-02-242-3/+3
|
* lib: RandomKey -> RandomBytesrsiddharth2021-02-243-7/+7
|
* challenge: ch17.go: don't use lib.OracleKey and lib.OracleIVrsiddharth2021-02-242-13/+14
|
* lib: put rand functions in rand.gorsiddharth2021-02-242-49/+59
|
* challenge/c16.go: refactorrsiddharth2021-02-241-69/+58
| | | | Keep everything inside C16
* challenge/c15.go: gofmtrsiddharth2021-02-241-0/+1
|
* challenge/c14.go: refactorrsiddharth2021-02-241-108/+103
| | | | Keep everything inside C14
* challenge/c13.go: gofmtrsiddharth2021-02-241-0/+1
|
* challenge/c12.go: refactorrsiddharth2021-02-242-81/+87
| | | | Keep everything inside C12
* challenge/c11.go: gofmtrsiddharth2021-02-241-0/+1
|
* challenge/c10.go: refactorrsiddharth2021-02-241-22/+12
| | | | Keep everything inside C10
* challenge/c09.go: gofmtrsiddharth2021-02-241-0/+1
|
* challenge/c08.go: refactorrsiddharth2021-02-241-210/+210
| | | | Keep everything inside C8
* challenge/c07.go: refactorrsiddharth2021-02-241-6/+6
| | | | Keep everything inside C7
* challenge/c06.go: refactorrsiddharth2021-02-241-98/+96
| | | | Keep everything inside C6
* challenge/c05.go: refactorrsiddharth2021-02-242-7/+5
| | | | Keep everything inside C5
* challenge/c04.go: refactorrsiddharth2021-02-241-35/+32
| | | | Keep everything inside C4
* challenge/c03.go: gofmtrsiddharth2021-02-241-0/+1
|
* challenge/c02.go: gofmtrsiddharth2021-02-241-0/+1
|
* challenge/c01.go: gofmtrsiddharth2021-02-241-0/+1
|
* challenge/c17.go: update outputrsiddharth2021-02-211-0/+1
|
* challenge: do challenge 17rsiddharth2021-02-212-0/+187
|
* lib: add OracleIVrsiddharth2021-02-211-0/+6
|
* lib: update Pkcs7PaddingUndo, AESDecryptCBCrsiddharth2021-02-115-19/+29
| | | | | Add error as the second return value to Pkcs7PaddingUndo and AESDecryptCBC.
* lib: add CPErrorrsiddharth2021-02-111-0/+11
|
* lib: oracleKey -> OracleKeyrsiddharth2021-02-111-4/+4
|
* lib: randomInt -> RandomIntrsiddharth2021-02-111-4/+4
|
* README.md: update statusrsiddharth2021-02-011-1/+1
|
* challenge: update ch16rsiddharth2021-02-011-32/+16
| | | | | | | - Don't use AESDecryptCBC directly for the bitflap attack. - Use just function 1 (cbcBitFlipEncrypt) and 2 (cbcBitFlipDecryptHasAdmin) to modify the cipher to produce the needed ';admin=true;' in the de-ciphered text.
* challenge: do challenge 16rsiddharth2021-01-302-0/+122
|
* lib: add StrHasrsiddharth2021-01-301-0/+10
|
* lib: update StripSpaceCharsrsiddharth2021-01-301-0/+3
| | | | strip 'NUL' character too.
* lib: stripSpaceChars -> StripSpaceCharsrsiddharth2021-01-303-3/+3
|
* lib: add StrToUpperrsiddharth2021-01-271-0/+12
|
* challenge: update C15rsiddharth2021-01-261-2/+2
|
* challenge: do challenge 15rsiddharth2021-01-262-0/+42
|
* lib: update Pkcs7PaddingUndorsiddharth2021-01-261-1/+10
| | | | Add validation.
* challenge: add output for challenge 14rsiddharth2021-01-251-0/+7
|
* challenge: freshSheepBlock -> freshSheepBytesrsiddharth2021-01-252-8/+8
|
* challenge: do challenge 14rsiddharth2021-01-253-1/+131
|
* challenge: fix findUnknownStringCharacteristicsrsiddharth2021-01-191-1/+1
|
* lib: add HasConsecutiveMatchingBlocksrsiddharth2021-01-121-0/+14
|
* lib: add OracleAESVarEncryptECBrsiddharth2021-01-121-0/+6
| | | | For challenge 14. This will be used as the `AES-128-ECB` function.
* lib: add oracleRandomrsiddharth2021-01-121-0/+6
| | | | For challenge 14. This will be used as the `random-prefix`.
* lib: update randomBytesrsiddharth2021-01-121-14/+2
| | | | Use randomInt to get the random byte array length.
* lib: add randomIntrsiddharth2021-01-121-0/+19
|
* lib/web: update import statmentrsiddharth2020-12-211-3/+1
|
* challenge/ch13.go -> challenge/c13.gorsiddharth2020-12-211-0/+0
|
* do challenge 13rsiddharth2020-12-212-0/+32
|