jsteube
|
24d375073c
|
Revert -m 26610 to check for 0x20-0x7e and allow DEEP_COMP kernel functionality
|
2023-03-13 10:00:16 +00:00 |
|
jsteube
|
37923e79e9
|
Switch -m 26610 to hc_get_entropy() verification strategy
|
2023-03-12 21:52:11 +00:00 |
|
Your Name
|
c68602aa10
|
m26610 add check for second block of plaintext
|
2023-03-08 21:29:13 +01:00 |
|
Your Name
|
db9debdd19
|
resolve merge conflicts with master
|
2023-03-08 21:06:11 +01:00 |
|
Your Name
|
70885319f3
|
m26610 now also checking second block of plaintext, moved AES_GCM_decrypt to seperate function
|
2023-03-08 00:50:40 +01:00 |
|
Your Name
|
b035c6e408
|
m26610 second block of AES-GCM also decrypting
|
2023-03-08 00:15:51 +01:00 |
|
Your Name
|
b01f4e5c2e
|
corrected ASCII plaintext check from >=20 to >=0x20
|
2023-03-07 21:53:11 +01:00 |
|
Your Name
|
2b80abde6d
|
add comments on possible improvements
|
2023-02-27 15:32:59 +01:00 |
|
Your Name
|
dbe99851ec
|
added comments on speeding up the attack by reducing the ciphertext buffersize
|
2023-02-26 13:52:23 +01:00 |
|
Your Name
|
5208447e72
|
change hash-signature for 26610 (incompatible with 26600), remove debug print statements in attacks, add comments, add reference data
|
2023-02-26 13:31:38 +01:00 |
|
Your Name
|
248c4afc09
|
test hash works
|
2023-02-25 00:51:14 +01:00 |
|