X-Git-Url: http://www.git.cypherpunks.ru/?a=blobdiff_plain;f=www.texi;h=c57317bcc0509ac22fa33671be5a0add269a9bcd;hb=d8d7da8827cc499bb2b2568fb410429915cd0975;hp=a474681e5b44a8131ceaaf91045eba190d1e1e86;hpb=fb71887b57f108674ce2c12b887e0c3396557689;p=pygost.git diff --git a/www.texi b/www.texi index a474681..c57317b 100644 --- a/www.texi +++ b/www.texi @@ -3,7 +3,7 @@ @settitle PyGOST @copying -Copyright @copyright{} 2015-2016 @email{stargrave@@stargrave.org, Sergey Matveev} +Copyright @copyright{} 2015-2017 @email{stargrave@@stargrave.org, Sergey Matveev} @end copying @node Top @@ -15,7 +15,9 @@ It is @url{https://www.gnu.org/philosophy/pragmatic.html, copylefted} @url{https://www.gnu.org/philosophy/free-sw.html, free software}: licenced under @url{https://www.gnu.org/licenses/gpl-3.0.html, GPLv3+}. -You can read about GOST algorithms @url{http://www.cypherpunks.ru/gost/, more}. +You can read about GOST algorithms @url{http://gost.cypherpunks.ru/, more}. + +Site is also available as @url{http://ynvvto3unx63wbqmwg7mpdgy3ebven7ihhse6bh5yudwllugd6oa.b32.i2p/, I2P service}. Currently supported algorithms are: @@ -37,10 +39,10 @@ Currently supported algorithms are: (@url{https://tools.ietf.org/html/rfc7091.html, RFC 7091}) public key signature function @item various 34.10 curve parameters included -@item VKO GOST R 34.10-2001 Diffie-Hellman function +@item VKO GOST R 34.10-2001 key agreement function (@url{https://tools.ietf.org/html/rfc4357.html, RFC 4357}) -@item VKO GOST R 34.10-2012 Diffie-Hellman function - (@url{http://tc26.ru/methods/recommendation/%D0%A2%D0%9A26%D0%90%D0%9B%D0%93.pdf, ТК26}) +@item VKO GOST R 34.10-2012 key agreement function + (@url{https://tools.ietf.org/html/rfc7836.html, RFC 7836}) @item 28147-89 and CryptoPro key wrapping (@url{https://tools.ietf.org/html/rfc4357.html, RFC 4357}) @item 28147-89 CryptoPro key meshing for CFB mode @@ -49,7 +51,9 @@ Currently supported algorithms are: (using GOST algorithms with X.509) compatibility helpers @item GOST R 34.12-2015 128-bit block cipher Кузнечик (Kuznechik) (@url{https://tools.ietf.org/html/rfc7801.html, RFC 7801}) -@item GOST R 34.13-2015 padding methods +@item GOST R 34.12-2015 64-bit block cipher Магма (Magma) +@item GOST R 34.13-2015 padding methods and block cipher modes of operation + (ECB, CTR, OFB, CBC, CFB, MAC) @item PEP247-compatible hash/MAC functions @end itemize @@ -88,12 +92,34 @@ mailing list. Announcements also go to this mailing list. @unnumbered News @table @strong +@item 3.6 +Fixed source files installation during @command{setup.py install} invocation. + +@item 3.5 +Dummy release: added long description in package metadata. + +@item 3.4 +Small mypy stubs related fixes. + +@item 3.3 + @itemize + @item @code{GOST3412Kuz} renamed to @code{GOST3412Kuznechik} + @item @code{GOST3412Magma} implements GOST R 34.12-2015 Magma 64-bit + block cipher + @end itemize + +@item 3.2 +34.13-2015 block cipher modes of operation implementations. + +@item 3.1 +Fixed mypy stubs related to PEP247-successors. + @item 3.0 @itemize @item @code{gost3411_94} renamed to @code{gost341194} - @item @code{gost3411_2012} renamed and splitted to + @item @code{gost3411_2012} renamed and split to @code{gost34112012256}, @code{gost34112012512} - @item @code{GOST34112012} splitted to + @item @code{GOST34112012} split to @code{GOST34112012256}, @code{GOST34112012512} @item @code{gost3410.kek} moved to separate @code{gost3410_vko.kek_34102001} @@ -167,8 +193,8 @@ No additional dependencies except Python 2.7/3.x interpreter are required. Preferable way is to download tarball with the signature: @verbatim -% wget http://www.cypherpunks.ru/pygost/pygost-2.3.tar.xz -% wget http://www.cypherpunks.ru/pygost/pygost-2.3.tar.xz.sig +% wget http://pygost.cypherpunks.ru/pygost-2.3.tar.xz +% wget http://pygost.cypherpunks.ru/pygost-2.3.tar.xz.sig % gpg --verify pygost-2.3.tar.xz.sig pygost-2.3.tar.xz % xz -d < pygost-2.3.tar.xz | tar xf - % cd pygost-2.3 @@ -178,6 +204,36 @@ Preferable way is to download tarball with the signature: @multitable {XXXXX} {XXXX KiB} {link sign} {xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx} {xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx} @headitem Version @tab Size @tab Tarball @tab SHA256 checksum @tab Streebog-256 checksum +@item 3.6 @tab 43 KiB +@tab @url{pygost-3.6.tar.xz, link} @url{pygost-3.6.tar.xz.sig, sign} +@tab @code{37EA8A31 B308DBC6 B3229922 ABA0355F 46008BEC 2649BF98 11F62091 17BD94B3} +@tab @code{47495afde7218e5d01160800daa0f9c786f5c95579686b0ce5a37fb7550bc735} + +@item 3.5 @tab 43 KiB +@tab @url{pygost-3.5.tar.xz, link} @url{pygost-3.5.tar.xz.sig, sign} +@tab @code{14E504AE 81E74DDD 122E5BF1 0B9E25D7 82D51AB6 5ED43533 0BF276A4 8A7C7AA4} +@tab @code{eb2106523cf8ed1b462d7a0a57f771f94759047a7e0e5a0b96ee35b24293e264} + +@item 3.4 @tab 43 KiB +@tab @url{pygost-3.4.tar.xz, link} @url{pygost-3.4.tar.xz.sig, sign} +@tab @code{89715612 8A197071 AD7689FA 96F89304 19E42F76 87632309 B47E5FDE 1AD6126D} +@tab @code{e590ddc7485e6f99658f26ac23cd2266648f27efa584a33f93abec8b80e1771d} + +@item 3.3 @tab 41 KiB +@tab @url{pygost-3.3.tar.xz, link} @url{pygost-3.3.tar.xz.sig, sign} +@tab @code{D118F539 537CCD5D 9CCE850E DD8EFD8E ACDA9D6E 0C113A0F C575574A F4BD452A} +@tab @code{8400a3714b70dddfef03f6fe96325e73ac25db814d052a44dbd8f2ce5ddb05bb} + +@item 3.2 @tab 41 KiB +@tab @url{pygost-3.2.tar.xz, link} @url{pygost-3.2.tar.xz.sig, sign} +@tab @code{6779D1B1 A4E2B1C3 49CA39F8 425FC962 AF2ED133 BB495343 0F83764B E2624087} +@tab @code{0a39880ad00ca11d112fef096b81a42a85ce4e5b25c48d1f643858b1e0c520d6} + +@item 3.1 @tab 39 KiB +@tab @url{pygost-3.1.tar.xz, link} @url{pygost-3.1.tar.xz.sig, sign} +@tab @code{ACCCF1A9 F4B345FF 01595248 5B793DAC FCF71D1F 32A6ABCF 32042DDB 20897BC5} +@tab @code{823961b6c2a1abe83f6d828397002e68d711a08ce115f21ddff81a294882cd46} + @item 3.0 @tab 39 KiB @tab @url{pygost-3.0.tar.xz, link} @url{pygost-3.0.tar.xz.sig, sign} @tab @code{0AB10703 6960962D 30BD1646 ACC8D44B E9CBD8A8 4F25DF25 91F26383 DE28875F} @@ -206,7 +262,7 @@ authenticity to be sure that you retrieved trusted and untampered software. @url{https://www.gnupg.org/, The GNU Privacy Guard} is used for that purpose. -For the very first time it it necessary to get signing public key and +For the very first time it is necessary to get signing public key and import it. It is provided below, but you should check alternative resources.