profile
viewpoint

brycx/orion 161

Usable, easy and safe pure-Rust crypto

brycx/checkpwn 53

Check Have I Been Pwned and see if it's time for you to change passwords.

brycx/rigel 14

[UNMAINTAINED] HMAC-SHA512 implementation optimized for embedded devices

brycx/Test-Vector-Generation 2

Various generated test vectors.

brycx/advisory-db 0

Security advisory database for Rust crates published through crates.io

brycx/awesome-cryptography-rust 0

Collect libraries and packages about cryptography in Rust.

brycx/bcrypt-pbkdf 0

[UNMAINTAINED] The bcrypt_pbkdf password hashing algorithm in pure Rust.

brycx/branca 0

Authenticated and encrypted API tokens written in Rust. A secure JWT alternative.

brycx/crypto-bench 0

Benchmarks for crypto libraries (in Rust, or with Rust bindings)

push eventbrycx/orion-fuzz

brycx

commit sha e9ee85dcd7d54629e5449264511f21872da458dd

Update corpus

view details

push time in 9 days

push eventbrycx/orion-fuzz

brycx

commit sha 930c852c3fd675a22f1b1d52e7b3291f1ee1b49c

Update corpus

view details

push time in 19 days

push eventbrycx/orion-fuzz

brycx

commit sha 3602b21800d2ce13f14430a1c2849bd78d11ef06

Update corpus

view details

push time in 19 days

created tagbrycx/orion

tag0.15.2

Usable, easy and safe pure-Rust crypto

created time in a month

release brycx/orion

0.15.2

released time in a month

push eventbrycx/orion

brycx

commit sha 2075e4d696198945cef3be74c015c92079489f67

CONTRIBUTING: Remove old un-supported feature no_std

view details

brycx

commit sha 4e1fff7828a781984052c39cf67aaeaf3678e599

clippy: Rust 1.43 remove redundant import

view details

brycx

commit sha fa6d7a830c589c1a1ee4a8c2f7a61f9b21d39f07

fmt: Rust 1.43

view details

brycx

commit sha 8b35418df51d2507dadb752dd58335cc5f47d40b

hkdf: Make the upper bound for derived key more clear, instead of using magic number. Improve documentation around the same.

view details

Johannes

commit sha 24303cf973f4c546f2f17eb502f7d97e0279e4b2

Move clippy, rustfmt and baseline tests to GitHub Actions (#122) * CI: Remove cargo-audit from TravisCI as this was moved to GitHub Actions * CI: Move rustfmt and clippy to GitHub Actions * CI: Move basic tests from Travis to GitHub Actions * CI: Fix test commands

view details

Johannes

commit sha a67b2050b56b367b67995e3e71d061e6b27b8e08

clippy: Address warnings about redundant names in struct field initialization (#124)

view details

Johannes

commit sha fda1c1492ca45489576aa509af74713e54a2855b

Add random secret-key/nonce generation to stream cipher and AEAD tests (#123) * Add ability to randomly generate SecretKey and Nonce in (StreamCipher/Aead)TestRunner This must be implemented seperately from the test runner, and is therefor a pub function. The reason for this is, that the trait that let's us randomly generate these types, should only be available when testing. But since StreamCipherTestRunner is used in intergation tests (/tests), compiling it conditionally with cfg(test) would still make it inaccessible in /tests. Using cfg(debug_assertions) is not desired either, because we want to test in both release and debug mode. * (x)chacha20: Use new testing function to replace old quickcheck tests * (x)chacha20poly1305: Add tests for randomly generated secret-key/nonce. See previous commit for details * Tests: Fixed input length of 16 for new sk/n combination test. With some very small lengths, 'collisions' would occur.

view details

brycx

commit sha 52772c906d6baae71f486c2fd2c97215b1bfb96c

0.15.2

view details

push time in a month

push eventbrycx/orion-fuzz

brycx

commit sha 4386c051706e625b3cebc9358cb7711d3730c912

Update corpus

view details

push time in a month

push eventbrycx/orion

brycx

commit sha 52772c906d6baae71f486c2fd2c97215b1bfb96c

0.15.2

view details

push time in a month

delete branch brycx/orion

delete branch : issue-119

delete time in a month

push eventbrycx/orion

Johannes

commit sha fda1c1492ca45489576aa509af74713e54a2855b

Add random secret-key/nonce generation to stream cipher and AEAD tests (#123) * Add ability to randomly generate SecretKey and Nonce in (StreamCipher/Aead)TestRunner This must be implemented seperately from the test runner, and is therefor a pub function. The reason for this is, that the trait that let's us randomly generate these types, should only be available when testing. But since StreamCipherTestRunner is used in intergation tests (/tests), compiling it conditionally with cfg(test) would still make it inaccessible in /tests. Using cfg(debug_assertions) is not desired either, because we want to test in both release and debug mode. * (x)chacha20: Use new testing function to replace old quickcheck tests * (x)chacha20poly1305: Add tests for randomly generated secret-key/nonce. See previous commit for details * Tests: Fixed input length of 16 for new sk/n combination test. With some very small lengths, 'collisions' would occur.

view details

push time in a month

PR merged brycx/orion

Add random secret-key/nonce generation to stream cipher and AEAD tests testing

Fixes #119. See message of fb98f20a043e5090f2f034fc14deaeeb0986316c for more details on why this was implemented this way.

+119 -218

0 comment

6 changed files

brycx

pr closed time in a month

issue closedbrycx/orion

Add ability to randomly generate SecretKey and Nonce in (StreamCipher/Aead)TestRunner

StreamCipherTestRunner and AeadTestRunner cannot randomly generate secret keys and nonces. The tests to check that using different key/nonce pairs produce different ciphertexts, have to be done outside of the test runners (as is the case with StreamCipherTestRunner right now).

Preferably we want to pass secret keys and nonces to these test runners, such that they can be generated randomly. This will require modifications to both test runners and most likely also a trait for the secret keys and nonces.

closed time in a month

brycx

delete branch brycx/orion

delete branch : clippy

delete time in a month

push eventbrycx/orion

Johannes

commit sha a67b2050b56b367b67995e3e71d061e6b27b8e08

clippy: Address warnings about redundant names in struct field initialization (#124)

view details

push time in a month

PR merged brycx/orion

Address clippy warnings improvement
+4 -4

0 comment

1 changed file

brycx

pr closed time in a month

push eventbrycx/orion

brycx

commit sha 96ca2d6955e8f086bcbbe324ce8cfe458c291b2c

Tests: Fixed input length of 16 for new sk/n combination test. With some very small lengths, 'collisions' would occur.

view details

push time in a month

push eventbrycx/orion

brycx

commit sha 3509cc5387174ba87566f6496655b245c514776d

Tests: Fixed input length of 16 for new sk/n combination test. With some very small lengths, 'collisions' would occur.

view details

push time in a month

delete branch brycx/orion

delete branch : up-ci

delete time in a month

push eventbrycx/orion

Johannes

commit sha 24303cf973f4c546f2f17eb502f7d97e0279e4b2

Move clippy, rustfmt and baseline tests to GitHub Actions (#122) * CI: Remove cargo-audit from TravisCI as this was moved to GitHub Actions * CI: Move rustfmt and clippy to GitHub Actions * CI: Move basic tests from Travis to GitHub Actions * CI: Fix test commands

view details

push time in a month

PR merged brycx/orion

Move clippy, rustfmt and baseline tests to GitHub Actions testing
+75 -37

0 comment

3 changed files

brycx

pr closed time in a month

PR opened brycx/orion

Address clippy warnings improvement
+4 -4

0 comment

1 changed file

pr created time in a month

create barnchbrycx/orion

branch : clippy

created branch time in a month

PR opened brycx/orion

Add random secret-key/nonce generation to stream cipher and AEAD tests testing

Fixes #119. See message of fb98f20a043e5090f2f034fc14deaeeb0986316c for more details on why this was implemented this way.

+124 -218

0 comment

6 changed files

pr created time in a month

create barnchbrycx/orion

branch : issue-119

created branch time in a month

PR opened brycx/orion

Move clippy, rustfmt and baseline tests to GitHub Actions testing
+75 -37

0 comment

3 changed files

pr created time in a month

push eventbrycx/orion-fuzz

brycx

commit sha a31c2885d0e8d9e6b761e74f5a8d1c0fd444849c

Update corpus

view details

brycx

commit sha 7d8c2b0db17154a6c5c6020198aa38a0f0c41ce3

Update honggfuzz

view details

push time in a month

startedjedisct1/libsodium-xchacha20-siv

started time in a month

push eventbrycx/orion

brycx

commit sha a973394b7ebe7ab1ca05051413092f401effde13

CI: Fix test commands

view details

push time in 2 months

push eventbrycx/orion

brycx

commit sha 584922165da8c29432b0028bd5cc7d2a5e0074c0

CI: Move basic tests from Travis to GitHub Actions

view details

push time in 2 months

create barnchbrycx/orion

branch : up-ci

created branch time in 2 months

issue commentbrycx/checkpwn

Make checkpwn usable as a library

Hi @gsurrel,

Yes, this is something that could be done. I've talked about it previously with @mdtro, who also requested this a while back. IIRC there are some crates on crates.io that also do what checkpwn does, but as a library. Have you seen them already?

If you have and still want checkpwn to become available as a library (would be a new checkpwn-lib crate), I'm totally fine with that. Though this is not my use case for checkpwn and therefor, not top priority for me to get arranged. Meaning, I won't be able to dedicate all my time to this. Is this change something you're interested in contributing to perhaps?

gsurrel

comment created time in 2 months

issue commentbriansmith/ring

Any example on how to extract the AAD from the ciphertext before decryption?

In terms of AEAD constructions like ChaCha20Poly1305, the AAD is not a part of the ciphertext. It is only authenticated. So when decrypting something using an AEAD, the AAD that is passed during decryption must be the same, as the AAD passed during encryption. The docs for Aad also mention this:

The additionally authenticated data (AAD) for an opening or sealing operation. This data is authenticated but is not encrypted.

assafmo

comment created time in 2 months

Pull request review commentbrycx/checkpwn

Wrapped Error type in Box

 fn main() {     for argument in argvs.iter_mut() {         argument.zeroize();     }-    // Only one request every 1500 milliseconds from any given IP+    // Only one request every 1600 milliseconds from any given IP

HIBP limits at 1500 milliseconds. Adding another 100 was just to give it some extra room, but maybe the comment should mention that 1500 is the official limit instead? If so, we need to change it in main.rs as well.

mdtro

comment created time in 2 months

push eventbrycx/orion

brycx

commit sha 8b35418df51d2507dadb752dd58335cc5f47d40b

hkdf: Make the upper bound for derived key more clear, instead of using magic number. Improve documentation around the same.

view details

push time in 2 months

startedhdevalence/cpace

started time in 2 months

startedjedisct1/rust-cpace

started time in 2 months

push eventbrycx/orion

brycx

commit sha 4e1fff7828a781984052c39cf67aaeaf3678e599

clippy: Rust 1.43 remove redundant import

view details

brycx

commit sha fa6d7a830c589c1a1ee4a8c2f7a61f9b21d39f07

fmt: Rust 1.43

view details

push time in 2 months

issue openedbrycx/orion

Investigate using haybale-pitchfork to test constant-time execution

haybale-pitchfork uses symbolic execution with LLVM IR to verify constant-time execution.

created time in 3 months

release brycx/checkpwn

0.3.7

released time in 3 months

created tagbrycx/checkpwn

tag0.3.7

Check Have I Been Pwned and see if it's time for you to change passwords.

created time in 3 months

push eventbrycx/checkpwn

brycx

commit sha c2d5807c292347ab09cf44279c292a7c698aa286

v0.3.7

view details

push time in 3 months

push eventbrycx/checkpwn

Johannes

commit sha aa70ef2cf65852f7ca668caef6f221ee7dad91a9

HIBP API v3 (#24) * fixed minor typo in comment * beginning of configuration functionality * updated create_dir_all match to return actual directory name * support for writing api key to config file * Use API v3 * Responses for breached accounts are truncated by default in API v3 * Responses for breached accounts include unverified breaches by default in API v3 * Refactor format_req * Re-add old breach evalution logic from 0.3.2 release of checkpwn * Add INVALID_API_KEY error and handling thereof * Insert header * Update README with instructions on registering and updating an API key * refactored, but still running into serialization issue on the Config struct * print success message upon writing config * handle overwriting existing configuratioon file if desired * updated USAGE_ERROR to include the register feature * NIT spelling * Integrate @mdtro functionality with new account checking logic * Config::load_config() should use env var when in CI * Test: Fix stdout assert * NIT * NIT * NIT * Use API key in CI when not release build Co-authored-by: mdtro <matt@matttrostel.com>

view details

push time in 3 months

PR merged brycx/checkpwn

HIBP API v3

Fixes #13.

See #23. This re-enables the ability to check accounts after registering an API key.

CI fails for unknown reasons, but local tests are all good. Seems the cause was the tests run with assert_cmd were not #[test].

+287 -38

0 comment

7 changed files

brycx

pr closed time in 3 months

issue closedbrycx/checkpwn

HIBP commercial API

HIBP is moving to a paid version of its account API, which means that you now need to purchase an API key to make calls to its API (See the blogpost here). I will most likely not be purchasing such a key and will therefor not be able to test any features adding this.

If anybody is interested in this feature being added and willing to provide an API key for this, I would be willing to implement it.

The change to the commercial API does not affect the password API. In other words, you may still check for breached passwords with checkpwn pass.

closed time in 3 months

brycx

push eventbrycx/checkpwn

brycx

commit sha f996e32c8f1ef034772e0e8bfbcaf276e3293ea3

Use API key in CI when not release build

view details

push time in 3 months

push eventbrycx/checkpwn

brycx

commit sha 674e487ab380c5e71b94ee006b96a84c17f20b80

NIT

view details

push time in 3 months

push eventbrycx/checkpwn

brycx

commit sha acd275be8fa8d38402686cfb33a85fad0cb889e2

NIT

view details

push time in 3 months

push eventbrycx/checkpwn

brycx

commit sha f0e49bd5e6a09b4e3191683ca31a757cda0b2959

NIT

view details

push time in 3 months

PR opened brycx/checkpwn

HIBP API v3

Fixes #13.

See #23. This re-enables the ability to check accounts after registering an API key.

CI fails for unknown reasons, but local tests are all good.

+288 -39

0 comment

7 changed files

pr created time in 3 months

push eventbrycx/checkpwn

brycx

commit sha 8877b7725425345a03bf1d3600fb4709a684d645

Add GitHub Actions security audit

view details

push time in 3 months

push eventbrycx/checkpwn

brycx

commit sha 34c941a6343340002f8ec76dc896dfb65bd1710e

Test: Fix stdout assert

view details

push time in 3 months

push eventbrycx/checkpwn

brycx

commit sha 05801de88aa6e7685607a5b8c04b6dc0c365d393

Config::load_config() should use env var when in CI

view details

push time in 3 months

push eventbrycx/checkpwn

brycx

commit sha d0107a41e1c7288bbffdc9980114268323e7f957

NIT spelling

view details

brycx

commit sha c5944fee9e16dbb1bac58aac106b9417fb0043ad

Integrate @mdtro functionality with new account checking logic

view details

push time in 3 months

push eventbrycx/checkpwn

mdtro

commit sha 29f889759213906c885beb26a744a8faac6e1362

fixed minor typo in comment

view details

mdtro

commit sha c0b7f0024880f1563836f0993c6a6943f35d7a42

beginning of configuration functionality

view details

mdtro

commit sha 0510048eccf1577deb3cc2b99bcb4b676d3418eb

updated create_dir_all match to return actual directory name

view details

mdtro

commit sha 717ad20d49983a0ba6ca52271ff4cd74fe61bdb8

support for writing api key to config file

view details

mdtro

commit sha 0891c770a1cc78f53c6c718599a12420fc958d3f

refactored, but still running into serialization issue on the Config struct

view details

mdtro

commit sha b52bb0e17e6a72573ec9ef88d5e8ebb30f2c7d2f

print success message upon writing config

view details

mdtro

commit sha b0c0f7dafcafe514ca72d1b6b3a7cdeaeaac6f99

handle overwriting existing configuratioon file if desired

view details

mdtro

commit sha 80b844e247f90781770c790fd69b975c5672d570

updated USAGE_ERROR to include the register feature

view details

Johannes

commit sha 4f0d10db21bad055ab668c8d90893dbe54527cf0

Merge branch 'api-header' into register-token-feature

view details

Johannes

commit sha b03bdf7f4698891c5faf0f549c6f1daf7f3030ca

Merge pull request #23 from mdtro/register-token-feature Register API Key Feature

view details

push time in 3 months

PR merged brycx/checkpwn

Register API Key Feature

Fixes #13 The HIBP API now requires an API key to use.

This PR provides functionality to checkpwn in config.rs:

  • implements a Config struct to serialize and de-serialize configurations
  • saving the API key to a configuration file with save_config()
  • reading and serializing the API key into a Config struct with load_config()
+121 -4

0 comment

5 changed files

mdtro

pr closed time in 3 months

push eventmdtro/checkpwn

Johannes

commit sha f17557cb706ef0466bd5ee128b9d780020b43399

Use HIBP padded passwords (#20)

view details

brycx

commit sha ffa271bcda7d1659045757d9cf17c6fad2aee608

v0.3.5

view details

brycx

commit sha bb82f86d4c2198c3ba9f3de10547f999ca7c1402

v0.3.6: Bump dependencies due to bumpalo vulnerability

view details

brycx

commit sha 91edf30becaff300ddd0f7dac2bc7b90c683441a

Use API v3

view details

brycx

commit sha a9fc94f47e04711dd5a4f670e4e5a69589fcecf2

Responses for breached accounts are truncated by default in API v3

view details

brycx

commit sha 94d58e386878b1a101d1beae206d27f54f216c9d

Responses for breached accounts include unverified breaches by default in API v3

view details

brycx

commit sha d0ec0abd744f50a4aa48ea7bca957b490dd82a70

Refactor format_req

view details

brycx

commit sha 64a859b971967c6f734d0add963696aa11e8b0e0

Re-add old breach evalution logic from 0.3.2 release of checkpwn

view details

brycx

commit sha 033174576809b313891c0efacb3b0e39fb749acb

Add INVALID_API_KEY error and handling thereof

view details

brycx

commit sha 709c6ebd86f1af4ff70efb4fe2a168d69d7bca53

Insert header

view details

brycx

commit sha 7d449e798d81505f1a7e600f6447c8448fd43c7e

Update README with instructions on registering and updating an API key

view details

Johannes

commit sha 4f0d10db21bad055ab668c8d90893dbe54527cf0

Merge branch 'api-header' into register-token-feature

view details

push time in 3 months

more