Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | lib: update webSessionEncryptionKey | rsiddharth | 2021-02-24 | 1 | -4/+4 |
| | | | | Use RandomBytes to set `webSessionEncryptionKey` | ||||
* | lib: randomBytes -> randomBytesWithLengthBetween | rsiddharth | 2021-02-24 | 2 | -3/+3 |
| | |||||
* | lib: RandomKey -> RandomBytes | rsiddharth | 2021-02-24 | 3 | -7/+7 |
| | |||||
* | challenge: ch17.go: don't use lib.OracleKey and lib.OracleIV | rsiddharth | 2021-02-24 | 2 | -13/+14 |
| | |||||
* | lib: put rand functions in rand.go | rsiddharth | 2021-02-24 | 2 | -49/+59 |
| | |||||
* | challenge/c16.go: refactor | rsiddharth | 2021-02-24 | 1 | -69/+58 |
| | | | | Keep everything inside C16 | ||||
* | challenge/c15.go: gofmt | rsiddharth | 2021-02-24 | 1 | -0/+1 |
| | |||||
* | challenge/c14.go: refactor | rsiddharth | 2021-02-24 | 1 | -108/+103 |
| | | | | Keep everything inside C14 | ||||
* | challenge/c13.go: gofmt | rsiddharth | 2021-02-24 | 1 | -0/+1 |
| | |||||
* | challenge/c12.go: refactor | rsiddharth | 2021-02-24 | 2 | -81/+87 |
| | | | | Keep everything inside C12 | ||||
* | challenge/c11.go: gofmt | rsiddharth | 2021-02-24 | 1 | -0/+1 |
| | |||||
* | challenge/c10.go: refactor | rsiddharth | 2021-02-24 | 1 | -22/+12 |
| | | | | Keep everything inside C10 | ||||
* | challenge/c09.go: gofmt | rsiddharth | 2021-02-24 | 1 | -0/+1 |
| | |||||
* | challenge/c08.go: refactor | rsiddharth | 2021-02-24 | 1 | -210/+210 |
| | | | | Keep everything inside C8 | ||||
* | challenge/c07.go: refactor | rsiddharth | 2021-02-24 | 1 | -6/+6 |
| | | | | Keep everything inside C7 | ||||
* | challenge/c06.go: refactor | rsiddharth | 2021-02-24 | 1 | -98/+96 |
| | | | | Keep everything inside C6 | ||||
* | challenge/c05.go: refactor | rsiddharth | 2021-02-24 | 2 | -7/+5 |
| | | | | Keep everything inside C5 | ||||
* | challenge/c04.go: refactor | rsiddharth | 2021-02-24 | 1 | -35/+32 |
| | | | | Keep everything inside C4 | ||||
* | challenge/c03.go: gofmt | rsiddharth | 2021-02-24 | 1 | -0/+1 |
| | |||||
* | challenge/c02.go: gofmt | rsiddharth | 2021-02-24 | 1 | -0/+1 |
| | |||||
* | challenge/c01.go: gofmt | rsiddharth | 2021-02-24 | 1 | -0/+1 |
| | |||||
* | challenge/c17.go: update output | rsiddharth | 2021-02-21 | 1 | -0/+1 |
| | |||||
* | challenge: do challenge 17 | rsiddharth | 2021-02-21 | 2 | -0/+187 |
| | |||||
* | lib: add OracleIV | rsiddharth | 2021-02-21 | 1 | -0/+6 |
| | |||||
* | lib: update Pkcs7PaddingUndo, AESDecryptCBC | rsiddharth | 2021-02-11 | 5 | -19/+29 |
| | | | | | Add error as the second return value to Pkcs7PaddingUndo and AESDecryptCBC. | ||||
* | lib: add CPError | rsiddharth | 2021-02-11 | 1 | -0/+11 |
| | |||||
* | lib: oracleKey -> OracleKey | rsiddharth | 2021-02-11 | 1 | -4/+4 |
| | |||||
* | lib: randomInt -> RandomInt | rsiddharth | 2021-02-11 | 1 | -4/+4 |
| | |||||
* | README.md: update status | rsiddharth | 2021-02-01 | 1 | -1/+1 |
| | |||||
* | challenge: update ch16 | rsiddharth | 2021-02-01 | 1 | -32/+16 |
| | | | | | | | - Don't use AESDecryptCBC directly for the bitflap attack. - Use just function 1 (cbcBitFlipEncrypt) and 2 (cbcBitFlipDecryptHasAdmin) to modify the cipher to produce the needed ';admin=true;' in the de-ciphered text. | ||||
* | challenge: do challenge 16 | rsiddharth | 2021-01-30 | 2 | -0/+122 |
| | |||||
* | lib: add StrHas | rsiddharth | 2021-01-30 | 1 | -0/+10 |
| | |||||
* | lib: update StripSpaceChars | rsiddharth | 2021-01-30 | 1 | -0/+3 |
| | | | | strip 'NUL' character too. | ||||
* | lib: stripSpaceChars -> StripSpaceChars | rsiddharth | 2021-01-30 | 3 | -3/+3 |
| | |||||
* | lib: add StrToUpper | rsiddharth | 2021-01-27 | 1 | -0/+12 |
| | |||||
* | challenge: update C15 | rsiddharth | 2021-01-26 | 1 | -2/+2 |
| | |||||
* | challenge: do challenge 15 | rsiddharth | 2021-01-26 | 2 | -0/+42 |
| | |||||
* | lib: update Pkcs7PaddingUndo | rsiddharth | 2021-01-26 | 1 | -1/+10 |
| | | | | Add validation. | ||||
* | challenge: add output for challenge 14 | rsiddharth | 2021-01-25 | 1 | -0/+7 |
| | |||||
* | challenge: freshSheepBlock -> freshSheepBytes | rsiddharth | 2021-01-25 | 2 | -8/+8 |
| | |||||
* | challenge: do challenge 14 | rsiddharth | 2021-01-25 | 3 | -1/+131 |
| | |||||
* | challenge: fix findUnknownStringCharacteristics | rsiddharth | 2021-01-19 | 1 | -1/+1 |
| | |||||
* | lib: add HasConsecutiveMatchingBlocks | rsiddharth | 2021-01-12 | 1 | -0/+14 |
| | |||||
* | lib: add OracleAESVarEncryptECB | rsiddharth | 2021-01-12 | 1 | -0/+6 |
| | | | | For challenge 14. This will be used as the `AES-128-ECB` function. | ||||
* | lib: add oracleRandom | rsiddharth | 2021-01-12 | 1 | -0/+6 |
| | | | | For challenge 14. This will be used as the `random-prefix`. | ||||
* | lib: update randomBytes | rsiddharth | 2021-01-12 | 1 | -14/+2 |
| | | | | Use randomInt to get the random byte array length. | ||||
* | lib: add randomInt | rsiddharth | 2021-01-12 | 1 | -0/+19 |
| | |||||
* | lib/web: update import statment | rsiddharth | 2020-12-21 | 1 | -3/+1 |
| | |||||
* | challenge/ch13.go -> challenge/c13.go | rsiddharth | 2020-12-21 | 1 | -0/+0 |
| | |||||
* | do challenge 13 | rsiddharth | 2020-12-21 | 2 | -0/+32 |
| |