X-Git-Url: http://www.git.cypherpunks.ru/?a=blobdiff_plain;f=www.texi;h=6840b0e62c1432bc704a84ea3c01f81bbd23b2b7;hb=d46cf8e38114e224e5b4cb9a23105dbf7d24a484;hp=43092e2a762749496bd13871bd0acb93fd00b349;hpb=d7ddc1e040f48d6b67ec55a9242a9aaa2853c569;p=pygost.git diff --git a/www.texi b/www.texi index 43092e2..6840b0e 100644 --- a/www.texi +++ b/www.texi @@ -3,7 +3,7 @@ @settitle PyGOST @copying -Copyright @copyright{} 2015-2018 @email{stargrave@@stargrave.org, Sergey Matveev} +Copyright @copyright{} 2015-2020 @email{stargrave@@stargrave.org, Sergey Matveev} @end copying @node Top @@ -14,8 +14,8 @@ GOST is GOvernment STandard of Russian Federation (and Soviet Union). It is @url{https://www.gnu.org/philosophy/pragmatic.html, copylefted} @url{https://www.gnu.org/philosophy/free-sw.html, free software}: -licenced under @url{https://www.gnu.org/licenses/gpl-3.0.html, GPLv3+}. -You can read about GOST algorithms @url{http://gost.cypherpunks.ru/, more}. +licenced under @url{https://www.gnu.org/licenses/gpl-3.0.html, GPLv3}. +You can read about GOST algorithms @url{http://www.gost.cypherpunks.ru/, more}. Currently supported algorithms are: @@ -38,13 +38,15 @@ Currently supported algorithms are: (@url{https://tools.ietf.org/html/rfc7091.html, RFC 7091}) public key signature function @item various 34.10 curve parameters included +@item Coordinates conversion from twisted Edwards to Weierstrass + form and vice versa @item VKO GOST R 34.10-2001 key agreement function (@url{https://tools.ietf.org/html/rfc4357.html, RFC 4357}) @item VKO GOST R 34.10-2012 key agreement function (@url{https://tools.ietf.org/html/rfc7836.html, RFC 7836}) @item 28147-89 and CryptoPro key wrapping (@url{https://tools.ietf.org/html/rfc4357.html, RFC 4357}) -@item 28147-89 CryptoPro key meshing for CFB mode +@item 28147-89 CryptoPro key meshing for CFB and CBC modes (@url{https://tools.ietf.org/html/rfc4357.html, RFC 4357}) @item @url{https://tools.ietf.org/html/rfc4491.html, RFC 4491} (using GOST algorithms with X.509) compatibility helpers @@ -58,10 +60,9 @@ Currently supported algorithms are: Example 34.10-2012 keypair generation, signing and verifying: -@verbatim ->>> from pygost.gost3410 import CURVE_PARAMS ->>> from pygost.gost3410 import GOST3410Curve ->>> curve = GOST3410Curve(*CURVE_PARAMS["GostR3410_2012_TC26_ParamSetA"]) +@example +>>> from pygost.gost3410 import CURVES +>>> curve = CURVES["id-tc26-gost-3410-12-512-paramSetA"] >>> from os import urandom >>> prv_raw = urandom(32) >>> from pygost.gost3410 import prv_unmarshal @@ -73,21 +74,22 @@ Example 34.10-2012 keypair generation, signing and verifying: >>> print "Public key is:", hexenc(pub_marshal(pub)) >>> from pygost import gost34112012256 >>> data_for_signing = b"some data" ->>> dgst = gost34112012256.new(data_for_signing).digest() +>>> dgst = gost34112012256.new(data_for_signing).digest()[::-1] >>> from pygost.gost3410 import sign >>> signature = sign(curve, prv, dgst, mode=2012) >>> from pygost.gost3410 import verify >>> verify(curve, pub, dgst, signature, mode=2012) True -@end verbatim +@end example Please send questions, bug reports and patches to -@url{https://lists.cypherpunks.ru/mailman/listinfo/gost, gost} +@url{http://lists.cypherpunks.ru/mailman/listinfo/gost, gost} mailing list. Announcements also go to this mailing list. @insertcopying +@include faq.texi @include news.texi -@include download.texi +@include install.texi @bye