X-Git-Url: http://www.git.cypherpunks.ru/?a=blobdiff_plain;f=README;h=c10bcbdb1770a4b1b6caa6bb736d70d4dcf71f5a;hb=0fcc8bc147ada51d2a9a912f18ac362d54b7d49a;hp=bb035862fe9445fafeae4b242fe066ef29d98b35;hpb=3491d9dc10cee0ead694d45eb5e4760e236762f7;p=pygost.git diff --git a/README b/README index bb03586..c10bcbd 100644 --- a/README +++ b/README @@ -8,13 +8,14 @@ GOST is GOvernment STandard of Russian Federation (and Soviet Union). * GOST R 34.11-94 hash function (RFC 5831) * GOST R 34.11-94 based PBKDF2 function * GOST R 34.11-2012 Стрибог (Streebog) hash function (RFC 6986) +* GOST R 34.11-2012 based PBKDF2 function (Р 50.1.111-2016) * GOST R 34.10-2001 (RFC 5832) public key signature function * GOST R 34.10-2012 (RFC 7091) public key signature function * various 34.10 curve parameters included * VKO GOST R 34.10-2001 key agreement function (RFC 4357) * VKO GOST R 34.10-2012 key agreement function (RFC 7836) * 28147-89 and CryptoPro key wrapping (RFC 4357) -* 28147-89 CryptoPro key meshing for CFB mode (RFC 4357) +* 28147-89 CryptoPro key meshing for CFB and CBC modes (RFC 4357) * RFC 4491 (using GOST algorithms with X.509) compatibility helpers * GOST R 34.12-2015 128-bit block cipher Кузнечик (Kuznechik) (RFC 7801) * GOST R 34.12-2015 64-bit block cipher Магма (Magma) @@ -28,7 +29,7 @@ Example 34.10-2012 keypair generation, signing and verifying: >>> from pygost.gost3410 import CURVE_PARAMS >>> from pygost.gost3410 import GOST3410Curve - >>> curve = GOST3410Curve(*CURVE_PARAMS["GostR3410_2012_TC26_ParamSetA"]) + >>> curve = GOST3410Curve(*CURVE_PARAMS["id-tc26-gost-3410-12-512-paramSetA"]) >>> from os import urandom >>> prv_raw = urandom(32) >>> from pygost.gost3410 import prv_unmarshal