Mirek Kratochvil
5b77413a7f
keyring: updating the version was not needed
2013-09-30 12:14:02 +02:00
Mirek Kratochvil
f0e7db7980
Changelog: update
2013-09-30 12:06:38 +02:00
Mirek Kratochvil
d7192caad0
serialization: bump message version strings
2013-09-30 12:06:19 +02:00
Mirek Kratochvil
5333b6e1f8
algos_sig: fix min() macro name collision with STL
2013-09-30 12:00:06 +02:00
Mirek Kratochvil
3deffb0ebe
build: crypto++ support is now optional
...
possibly also evading "traditional" hash functions. Cubehash is good.
2013-09-30 11:49:42 +02:00
Mirek Kratochvil
1488927e73
keyring: use cubehash for KeyID
...
This creates incompatible keyrings, so keyring identifiers now have a
version string appended to them.
2013-09-30 11:48:04 +02:00
Mirek Kratochvil
04bbfb49ce
cubehash: some basic optimization
2013-09-30 07:21:36 +02:00
Mirek Kratochvil
72bcc1080a
algos_sig: new cubehash-based algorithms
2013-09-29 20:53:24 +02:00
Mirek Kratochvil
c65557724e
algos_enc: new cubehash-based algorithms
2013-09-29 20:48:59 +02:00
Mirek Kratochvil
d48665750a
cubehash: remove forgotten debugging
2013-09-29 20:34:05 +02:00
Mirek Kratochvil
20b73496d7
cubehash: new hash algorithm
2013-09-29 19:52:46 +02:00
Mirek Kratochvil
d8aeb39165
configure.ac: remove now unneeded CC check
2013-09-15 16:29:20 +02:00
Mirek Kratochvil
93dbf55f72
changelog notice
2013-09-15 16:19:07 +02:00
Mirek Kratochvil
04b37ce053
minor version bump
2013-09-15 16:11:11 +02:00
Mirek Kratochvil
18e91e78e5
configure.ac: check for crypto++ headers
2013-09-15 16:10:26 +02:00
Mirek Kratochvil
fae3342e18
main: remove now unnecessary licensing information
2013-09-15 15:58:01 +02:00
Mirek Kratochvil
414d203d18
tiger_hash: use crypto++ lib instead of bundle
2013-09-15 15:50:25 +02:00
Mirek Kratochvil
3af363faf3
rmd_hash: use crypto++ lib instead of bundle
2013-09-15 15:35:47 +02:00
Mirek Kratochvil
23e741c73e
sha_hash: remove unnecessary stdint include
2013-09-15 15:35:15 +02:00
Mirek Kratochvil
47ccc8dcf0
algos_enc: forgotten stdint include
2013-09-15 15:33:47 +02:00
Mirek Kratochvil
95de70acbc
sha_hash: use crypto++ lib instead of bundled one
2013-09-15 15:25:17 +02:00
Mirek Kratochvil
93dee89a4a
algos_enc: do not collide with library min() macro
2013-09-15 15:09:01 +02:00
Mirek Kratochvil
4d3b95c2ab
version bump to 1.3
2013-09-13 14:06:29 +02:00
Mirek Kratochvil
c03772863d
README fix of formatting
2013-09-13 13:59:53 +02:00
Mirek Kratochvil
542d17852e
unixification: correct README and ChangeLog
2013-09-12 13:34:03 +02:00
Mirek Kratochvil
54c9129ab1
actions: handle possible keyring saving failures
2013-09-12 13:16:57 +02:00
Mirek Kratochvil
815fec23cb
man: notice about the big file problem
2013-09-12 12:55:15 +02:00
Mirek Kratochvil
09136ef046
actions: better keyring opening behavior
...
This delays opening (and locking) the keyring until all input has been
processed, and all possible errors that would make a chance that the
keyring doesn't have to be opened have been checked for.
Whole purpose was to enable codecrypt to be chained with pipes in UNIX-y way,
like this primitive certificate creation:
(echo "At `date` I certify this is The Key:" ; ccr -pa -F "the key") | ccr -s
2013-09-12 12:41:54 +02:00
Mirek Kratochvil
d1421926f9
actions: neatified message for failed verification
2013-09-12 12:30:38 +02:00
Mirek Kratochvil
329953d575
keyring: better open/close behavior
2013-09-12 12:18:17 +02:00
Mirek Kratochvil
54e45bd3d4
style modifications because of newer astyle
2013-09-12 12:15:21 +02:00
Mirek Kratochvil
93cd8f377f
keyring: squash opening and loading into one func
2013-09-12 12:14:58 +02:00
Mirek Kratochvil
7e32564119
man page: small clarification
2013-09-12 11:59:32 +02:00
Mirek Kratochvil
3ca398b760
fix autotools warnings from autogen.sh
2013-09-12 09:50:26 +02:00
Mirek Kratochvil
eea476925f
README: add link to online manpage
2013-08-05 09:51:04 +02:00
Mirek Kratochvil
66e1245440
autogen.sh: little readification
2013-07-26 09:59:09 +02:00
Mirek Kratochvil
60749aa4cf
sencode: add integer size limits
2013-07-26 09:54:55 +02:00
Mirek Kratochvil
66d7d84b13
fix CXXFLAGS="-Wall" warnings
2013-07-23 15:58:02 +02:00
Mirek Kratochvil
36b68d90c1
std namespace cleaning
2013-06-21 20:35:59 +02:00
Mirek Kratochvil
79c4ea8e93
interesting papers
2013-05-27 18:26:24 +02:00
Mirek Kratochvil
1a2d25e555
main: correct licensing information
2013-05-27 18:23:20 +02:00
Mirek Kratochvil
f0412c9eb4
version bump
2013-05-25 22:26:52 +02:00
Mirek Kratochvil
9c9e49ae7b
fmtseq: forgotten include
2013-05-25 20:03:42 +02:00
Mirek Kratochvil
9a268d231b
forgotten styleup
2013-05-25 19:27:49 +02:00
Mirek Kratochvil
d8a284fe4a
upgrade docs after algo names changed
2013-05-25 19:27:22 +02:00
Mirek Kratochvil
b5ae7ca4dd
algos_sig: added H=20 fmtseq variant
...
...that provide around 1 million signatures per key. That seems more
than sufficient for human usage.
Note that generating the key takes 16 times longer than for already
present algorithms (that have H=16). On my computer, it is around 4
minutes for fmtseq128N20 and 16 minutes for fmtseq256N20.
2013-05-25 19:19:22 +02:00
Mirek Kratochvil
0980ee827a
sha2: fix the ugly warning
...
memcpy() is better than dereferencing a type-punned-pointer for
simulating memcpy()
2013-05-25 18:56:07 +02:00
Mirek Kratochvil
7270e90cf1
manual page
2013-05-25 18:52:27 +02:00
Mirek Kratochvil
18449bdc8a
arcfour: greatly increase discard parameters
...
Okay, this thing got public so it's time to make the RC4 rugged. Not
that I'd know about something that would break current implementation,
but it's nice to at least do the recommended discard correctly.
We'll probably be adding better symmetric ciphers anyway.
Note that this is an incompatible change (again). FMTSeq private keys
will need to be replaced. Existing signature validity doesn't change.
Encrypted messages will not be possible to decrypt.
2013-05-25 17:13:33 +02:00
Mirek Kratochvil
deb52397a3
version bump
2013-05-18 10:57:34 +02:00