1
0
mirror of https://github.com/biergaizi/codecrypt synced 2024-06-27 09:18:16 +00:00
Commit Graph

275 Commits

Author SHA1 Message Date
Mirek Kratochvil
542d17852e unixification: correct README and ChangeLog 2013-09-12 13:34:03 +02:00
Mirek Kratochvil
54c9129ab1 actions: handle possible keyring saving failures 2013-09-12 13:16:57 +02:00
Mirek Kratochvil
815fec23cb man: notice about the big file problem 2013-09-12 12:55:15 +02:00
Mirek Kratochvil
09136ef046 actions: better keyring opening behavior
This delays opening (and locking) the keyring until all input has been
processed, and all possible errors that would make a chance that the
keyring doesn't have to be opened have been checked for.

Whole purpose was to enable codecrypt to be chained with pipes in UNIX-y way,
like this primitive certificate creation:

(echo "At `date` I certify this is The Key:" ; ccr -pa -F "the key") | ccr -s
2013-09-12 12:41:54 +02:00
Mirek Kratochvil
d1421926f9 actions: neatified message for failed verification 2013-09-12 12:30:38 +02:00
Mirek Kratochvil
329953d575 keyring: better open/close behavior 2013-09-12 12:18:17 +02:00
Mirek Kratochvil
54e45bd3d4 style modifications because of newer astyle 2013-09-12 12:15:21 +02:00
Mirek Kratochvil
93cd8f377f keyring: squash opening and loading into one func 2013-09-12 12:14:58 +02:00
Mirek Kratochvil
7e32564119 man page: small clarification 2013-09-12 11:59:32 +02:00
Mirek Kratochvil
3ca398b760 fix autotools warnings from autogen.sh 2013-09-12 09:50:26 +02:00
Mirek Kratochvil
eea476925f README: add link to online manpage 2013-08-05 09:51:04 +02:00
Mirek Kratochvil
66e1245440 autogen.sh: little readification 2013-07-26 09:59:09 +02:00
Mirek Kratochvil
60749aa4cf sencode: add integer size limits 2013-07-26 09:54:55 +02:00
Mirek Kratochvil
66d7d84b13 fix CXXFLAGS="-Wall" warnings 2013-07-23 15:58:02 +02:00
Mirek Kratochvil
36b68d90c1 std namespace cleaning 2013-06-21 20:35:59 +02:00
Mirek Kratochvil
79c4ea8e93 interesting papers 2013-05-27 18:26:24 +02:00
Mirek Kratochvil
1a2d25e555 main: correct licensing information 2013-05-27 18:23:20 +02:00
Mirek Kratochvil
f0412c9eb4 version bump 2013-05-25 22:26:52 +02:00
Mirek Kratochvil
9c9e49ae7b fmtseq: forgotten include 2013-05-25 20:03:42 +02:00
Mirek Kratochvil
9a268d231b forgotten styleup 2013-05-25 19:27:49 +02:00
Mirek Kratochvil
d8a284fe4a upgrade docs after algo names changed 2013-05-25 19:27:22 +02:00
Mirek Kratochvil
b5ae7ca4dd algos_sig: added H=20 fmtseq variant
...that provide around 1 million signatures per key. That seems more
than sufficient for human usage.

Note that generating the key takes 16 times longer than for already
present algorithms (that have H=16). On my computer, it is around 4
minutes for fmtseq128N20 and 16 minutes for fmtseq256N20.
2013-05-25 19:19:22 +02:00
Mirek Kratochvil
0980ee827a sha2: fix the ugly warning
memcpy() is better than dereferencing a type-punned-pointer for
simulating memcpy()
2013-05-25 18:56:07 +02:00
Mirek Kratochvil
7270e90cf1 manual page 2013-05-25 18:52:27 +02:00
Mirek Kratochvil
18449bdc8a arcfour: greatly increase discard parameters
Okay, this thing got public so it's time to make the RC4 rugged. Not
that I'd know about something that would break current implementation,
but it's nice to at least do the recommended discard correctly.

We'll probably be adding better symmetric ciphers anyway.

Note that this is an incompatible change (again). FMTSeq private keys
will need to be replaced. Existing signature validity doesn't change.
Encrypted messages will not be possible to decrypt.
2013-05-25 17:13:33 +02:00
Mirek Kratochvil
deb52397a3 version bump 2013-05-18 10:57:34 +02:00
Mirek Kratochvil
8c185c51ad mce_qd: compute check matrix on the fly
codecrypt is usually invoked only with one prepare() and decrypt(), so
this basically saves several megs of memory and cuts needed computation
time in half.
2013-05-18 10:52:57 +02:00
Mirek Kratochvil
79b17b8724 polynomial: degree computation dumbness reduced 2013-05-18 10:52:12 +02:00
Mirek Kratochvil
be13fe8dca gf2m: lowlevel speedups 2013-05-18 10:51:47 +02:00
Mirek Kratochvil
1ef1b4277b ios: don't print unnecessary newlines 2013-05-18 09:21:49 +02:00
Mirek Kratochvil
105a7731d3 bvector: massive ranking/unranking speedup 2013-05-18 09:08:24 +02:00
Mirek Kratochvil
456718e301 bvector: unranking fixed 2013-05-17 15:18:25 +02:00
Mirek Kratochvil
3f73ba54c4 algos_enc: use faster unranking for decryption 2013-05-17 15:16:42 +02:00
Mirek Kratochvil
93d6cccd4f algorithm: remove identification
it's gonna be used some other way
2013-05-03 14:42:58 +02:00
Mirek Kratochvil
c18f9399a6 version bump
and some cleaning stuff
2013-05-03 14:38:21 +02:00
Mirek Kratochvil
63d51911f9 algos_enc: also pad beginning of the message
to avoid possible known plaintext attacks on the symmetric cipher when
beginning of the ciphertext is known (which is a common situation, e.g.
when sign+encrypting)
2013-05-03 14:26:00 +02:00
Mirek Kratochvil
bf14ac95ad tiger: header file astyled 2013-05-01 16:48:29 +02:00
Mirek Kratochvil
1553c09d20 algos_enc: mceqd192 variant to match fmtseq192 2013-05-01 16:44:31 +02:00
Mirek Kratochvil
24bd5bd185 algos_sig: new support for fmtseq192
It's quite rational to have such algorithm. 256-bit security is usually
an overkill, and this has two times smaller signatures (around 9.5kB) is
_so_ much faster. Use it.
2013-05-01 16:25:37 +02:00
Mirek Kratochvil
9b101c9548 tiger: added tiger192 hash func 2013-05-01 16:11:45 +02:00
Mirek Kratochvil
b087848a2f sha_hash: also wrapped sha384 2013-05-01 15:49:40 +02:00
Mirek Kratochvil
805a275df7 main: some clarifications 2013-04-27 00:56:34 +02:00
Mirek Kratochvil
6e3bfbe6d3 actions: fix renaming pubkeys 2013-04-23 21:00:41 +02:00
Mirek Kratochvil
542bf554fa action: fix naming on import 2013-04-23 20:59:02 +02:00
Mirek Kratochvil
80fcaf5569 actions: pubkeys/secrets typo fix 2013-04-23 09:47:32 +02:00
Mirek Kratochvil
41c17cf569 README update 2013-04-23 08:56:12 +02:00
Mirek Kratochvil
b52befc547 version bump for packaging 2013-04-23 08:26:40 +02:00
Mirek Kratochvil
aa03f01530 actions: detachsign stdin/stdout support 2013-04-23 08:07:51 +02:00
Mirek Kratochvil
e19ba185b7 algos_enc: padding for hiding message length 2013-04-22 14:56:20 +02:00
Mirek Kratochvil
5633358195 README: fix 2013-04-22 13:51:10 +02:00