summaryrefslogtreecommitdiffstats
path: root/lib
Commit message (Collapse)AuthorAgeFilesLines
* lib: add MTRand.UnTempersiddharth2021-08-171-0/+21
|
* lib: rng.go: remove MTSeed, MTExtract, and friendssiddharth2021-08-171-46/+0
|
* lib: add MTRand type and methodssiddharth2021-08-171-0/+50
| | | | This is going to replace MTSeed and MTExtract functions.
* challenge: do challenge 22siddharth2021-07-011-0/+11
|
* challenge: do challenge 21siddharth2021-06-271-0/+69
|
* lib: update AlphaPunchScoresiddharth2021-06-191-20/+1
| | | | | - Use AsciiScores for scores - Remove isAlphaPunch
* lib: add PrintableAscii, AsciiScoressiddharth2021-06-191-0/+27
| | | | Extracted from challenge 19
* lib: update RepeatingXORsiddharth2021-06-191-11/+5
| | | | | | - Change input type to []byte. - Change retur type to []byte. - Update RepeatingXOR calls in challenge 5 an 6.
* lib/byte.go: fix copyrightsiddharth2021-06-061-1/+1
|
* lib: add `ByteIsUpper`siddharth2021-06-061-0/+7
|
* lib: update `BytesInCommon`siddharth2021-06-051-2/+4
| | | | | Ensure that the returned `common` array does not point to any of the []byte arrays in `bbytes`.
* lib/byte.go: update `BytesInCommon` docsiddharth2021-06-051-1/+2
|
* lib: add byte.gosiddharth2021-06-051-0/+31
| | | | | - Add `ByteInBytes` function - Add `BytesInCommon` function
* lib: add ByteToUpperrsiddharth2021-03-061-5/+9
|
* lib: add AESGenCTRFuncrsiddharth2021-03-031-0/+23
|
* lib: add AESEncryptCTRrsiddharth2021-03-031-5/+16
|
* lib: add AESDecryptCTRrsiddharth2021-03-011-0/+25
|
* lib: remove oracle.gorsiddharth2021-02-241-36/+0
| | | | Move functions into C12 and C14 where they're used.
* lib: remove OracleAESRandomEncryptrsiddharth2021-02-242-33/+1
| | | | Move function into C11 where it is used.
* lib: remove web.gorsiddharth2021-02-241-94/+0
| | | | Move all its functions to C13 where it is used.
* lib: update webSessionEncryptionKeyrsiddharth2021-02-241-4/+4
| | | | Use RandomBytes to set `webSessionEncryptionKey`
* lib: randomBytes -> randomBytesWithLengthBetweenrsiddharth2021-02-242-3/+3
|
* lib: RandomKey -> RandomBytesrsiddharth2021-02-242-5/+5
|
* challenge: ch17.go: don't use lib.OracleKey and lib.OracleIVrsiddharth2021-02-241-10/+4
|
* lib: put rand functions in rand.gorsiddharth2021-02-242-49/+59
|
* lib: add OracleIVrsiddharth2021-02-211-0/+6
|
* lib: update Pkcs7PaddingUndo, AESDecryptCBCrsiddharth2021-02-112-7/+7
| | | | | Add error as the second return value to Pkcs7PaddingUndo and AESDecryptCBC.
* lib: add CPErrorrsiddharth2021-02-111-0/+11
|
* lib: oracleKey -> OracleKeyrsiddharth2021-02-111-4/+4
|
* lib: randomInt -> RandomIntrsiddharth2021-02-111-4/+4
|
* lib: add StrHasrsiddharth2021-01-301-0/+10
|
* lib: update StripSpaceCharsrsiddharth2021-01-301-0/+3
| | | | strip 'NUL' character too.
* lib: stripSpaceChars -> StripSpaceCharsrsiddharth2021-01-303-3/+3
|
* lib: add StrToUpperrsiddharth2021-01-271-0/+12
|
* lib: update Pkcs7PaddingUndorsiddharth2021-01-261-1/+10
| | | | Add validation.
* challenge: do challenge 14rsiddharth2021-01-251-1/+1
|
* lib: add HasConsecutiveMatchingBlocksrsiddharth2021-01-121-0/+14
|
* lib: add OracleAESVarEncryptECBrsiddharth2021-01-121-0/+6
| | | | For challenge 14. This will be used as the `AES-128-ECB` function.
* lib: add oracleRandomrsiddharth2021-01-121-0/+6
| | | | For challenge 14. This will be used as the `random-prefix`.
* lib: update randomBytesrsiddharth2021-01-121-14/+2
| | | | Use randomInt to get the random byte array length.
* lib: add randomIntrsiddharth2021-01-121-0/+19
|
* lib/web: update import statmentrsiddharth2020-12-211-3/+1
|
* lib: add web.gorsiddharth2020-12-201-0/+96
| | | | For challenge 13.
* lib/str: add StrSplitAtrsiddharth2020-12-201-0/+17
|
* lib/str: add NumToStrrsiddharth2020-12-201-0/+9
|
* lib/str: add NumToCharrsiddharth2020-12-201-0/+8
|
* lib/aes: add OracleAESEncryptECBrsiddharth2020-12-131-0/+18
|
* lib/blocks: rename CipherIsECB -> CipherUsesECBrsiddharth2020-12-121-1/+1
|
* lib/blocks: BlockIsECB -> CipherIsECBrsiddharth2020-12-091-1/+1
|
* lib/oracle.go: add OracleAESRandomEncryptrsiddharth2020-12-091-0/+68
|