Files
pcp/TODO

48 lines
1.4 KiB
Plaintext
Raw Normal View History

key++: normalize id and lc()
allow signing using an alternate secret key, like in pcpdecrypt()
2014-01-28 13:27:16 +01:00
malloc() new pointers in functions only if not NULL, e.g. pcp_gennonce()
2014-02-05 13:07:35 +01:00
check pub key count in pcp.c before calling verify signature, croak if count==0
Update pod key format spec.
vault checksum: add keysigs as well
2014-02-13 20:22:17 +01:00
enable formats for secret key exports as well
Add newlines to headers in define.h, so strlen() later catches the whole length.
Check is_utf8 license.
2014-02-25 12:26:54 +01:00
also found in https://gd.meizo.com/_files/lpc/ext/utf8.c
Symmetric decrypt mode tries to open vault
pcp_find_primary_secret() makes a copy ???
2014-02-25 19:52:59 +01:00
c++ destructor double free mess
2014-05-06 11:51:54 +02:00
cpptest 0 uses same Context for encryptor and decryptor,
must be another one for the latter!
2014-03-14 19:50:12 +01:00
Python binding, e.g.:
py % cdll.LoadLibrary("libsodium.so.8")
<CDLL 'libsodium.so.8', handle 800776c00 at 80192a3d0>
py % nacl = CDLL("libsodium.so.8")
py % hash = create_string_buffer('\000' * 64)
py % hash
<ctypes.c_char_Array_65 object at 0x80182c560>
py % hash.raw
'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x...
py % key = create_string_buffer('a' * 32)
py % nacl.crypto_hash_sha256(pointer(hash), pointer(key), 32)
0
py % hash.raw
';\xa3\xf5\xf4;\x92`&\x83\xc1\x9a\xeeb\xa2\x03B\xb0\x84\...
py %
after new z85 padding scheme: write z85 blocksize to output
as well? if a reader doesn't know the blocksize it won't be
able to decode it properly. Or no issue? Not sure yet...