bcrypt-users Mailing List for bcrypt - blowfish file encryption
Status: Beta
Brought to you by:
jwshelley
You can subscribe to this list here.
2003 |
Jan
|
Feb
|
Mar
(3) |
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(1) |
Oct
|
Nov
|
Dec
|
---|---|---|---|---|---|---|---|---|---|---|---|---|
2004 |
Jan
(1) |
Feb
|
Mar
|
Apr
|
May
(1) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2005 |
Jan
|
Feb
(2) |
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2006 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
(2) |
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2007 |
Jan
(1) |
Feb
|
Mar
|
Apr
(1) |
May
|
Jun
(2) |
Jul
(1) |
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2008 |
Jan
|
Feb
|
Mar
(1) |
Apr
(1) |
May
|
Jun
(1) |
Jul
(1) |
Aug
(3) |
Sep
|
Oct
(1) |
Nov
|
Dec
(3) |
2009 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
(2) |
Aug
|
Sep
(3) |
Oct
(1) |
Nov
|
Dec
(1) |
2010 |
Jan
(2) |
Feb
|
Mar
(2) |
Apr
|
May
(1) |
Jun
(2) |
Jul
|
Aug
|
Sep
|
Oct
(1) |
Nov
(3) |
Dec
|
2011 |
Jan
|
Feb
(2) |
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
(1) |
Sep
|
Oct
|
Nov
|
Dec
|
2012 |
Jan
|
Feb
(1) |
Mar
|
Apr
|
May
|
Jun
(5) |
Jul
(1) |
Aug
(4) |
Sep
|
Oct
|
Nov
(2) |
Dec
|
2013 |
Jan
|
Feb
(2) |
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2015 |
Jan
|
Feb
|
Mar
|
Apr
(1) |
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
(1) |
Dec
|
2016 |
Jan
|
Feb
(1) |
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
From: Dmitry N. <neb...@gm...> - 2016-02-16 06:09:36
|
Hello i have the old bcrypted file, and i can not decrypt it. i am pretty sure in my password, i decrypted another one just fine. they differs by this: file * ok.bfe: Encore not stripped damn.bfe: Encore - version 31875 and it is ungooglble. what should i do? Is it some obsolete algorythm or so? thanx |
From: David B. <dc...@ho...> - 2015-11-17 10:37:20
|
Hello there, bcrypt.spec.out:[rwfile.c:120]: (style) Variable 'state' is allocated memory that is never used. Source code is if ((state = malloc(257)) == NULL) memerror(); initstate((unsigned long) key, state, 256); but #define initstate(x,y,z) srand(x) Suggest remove unused allocation. There are a couple of other problems in the same file rwfile.c:147]: (error) Memory leak: garbage rwfile.c:147]: (error) Memory leak: state Regards David Binderman |
From: Yves C. <no...@x0...> - 2015-04-12 10:41:27
|
Hi, I am working on a more standard implementation of VimCrypt which use blowfish. So I took a look at bcrypt. I am currently working on Cygwin and Debian. In both distrib I get warning during the build process. I am not happy with that (see output below). Fortunately casa (https://github.com/casta/bcrypt) offered a nice github repo. It would be nice to switch to this new repository and link the debian package on it? Also we can add a travis.yml? On Cygwin: ``` $ wget http://bcrypt.sourceforge.net/bcrypt-1.1.tar.gz $ tar xvzf bcrypt-1.1.tar.gz $ cd bcrypt-1.1/ $ make gcc -O2 -Wall -c main.c main.c:15:14: warning: ‘optarg’ redeclared without dllimport attribute: previous dllimport ignored [-Wattributes] extern char *optarg; ^ main.c:16:12: warning: ‘optind’ redeclared without dllimport attribute: previous dllimport ignored [-Wattributes] extern int optind, optreset, opterr; ^ main.c:16:20: warning: ‘optreset’ redeclared without dllimport attribute: previous dllimport ignored [-Wattributes] extern int optind, optreset, opterr; ^ main.c:16:30: warning: ‘opterr’ redeclared without dllimport attribute: previous dllimport ignored [-Wattributes] extern int optind, optreset, opterr; ^ gcc -O2 -Wall -c blowfish.c gcc -O2 -Wall -c rwfile.c gcc -O2 -Wall -c keys.c keys.c: In function ‘mutateKey’: keys.c:88:23: warning: pointer targets in passing argument 2 of ‘Blowfish_Init’ differ in signedness [-Wpointer-sign] Blowfish_Init(&ctx, *key, strlen(*key)); ^ In file included from functions.h:11:0, from keys.c:12: blowfish.h:15:6: note: expected ‘unsigned char *’ but argument is of type ‘char *’ void Blowfish_Init(BLOWFISH_CTX *ctx, unsigned char *key, int keyLen); ^ gcc -O2 -Wall -c wrapbf.c wrapbf.c: In function ‘BFEncrypt’: wrapbf.c:31:24: warning: pointer targets in passing argument 2 of ‘Blowfish_Init’ differ in signedness [-Wpointer-sign] Blowfish_Init (&ctx, key, MAXKEYBYTES); ^ In file included from functions.h:11:0, from wrapbf.c:12: blowfish.h:15:6: note: expected ‘unsigned char *’ but argument is of type ‘char *’ void Blowfish_Init(BLOWFISH_CTX *ctx, unsigned char *key, int keyLen); ^ wrapbf.c: In function ‘BFDecrypt’: wrapbf.c:84:24: warning: pointer targets in passing argument 2 of ‘Blowfish_Init’ differ in signedness [-Wpointer-sign] Blowfish_Init (&ctx, mykey, MAXKEYBYTES); ^ In file included from functions.h:11:0, from wrapbf.c:12: blowfish.h:15:6: note: expected ‘unsigned char *’ but argument is of type ‘char *’ void Blowfish_Init(BLOWFISH_CTX *ctx, unsigned char *key, int keyLen); ^ gcc -O2 -Wall -c endian.c gcc -O2 -Wall -c wrapzl.c gcc -O2 -Wall -o bcrypt main.o blowfish.o rwfile.o keys.o wrapbf.o endian.o wrapzl.o -L/usr/local/lib -lz ``` On Debain ``` $ make gcc -O2 -Wall -c main.c gcc -O2 -Wall -c blowfish.c gcc -O2 -Wall -c rwfile.c gcc -O2 -Wall -c keys.c keys.c: In function ‘mutateKey’: keys.c:88:23: warning: pointer targets in passing argument 2 of ‘Blowfish_Init’ differ in signedness [-Wpointer-sign] Blowfish_Init(&ctx, *key, strlen(*key)); ^ In file included from functions.h:11:0, from keys.c:12: blowfish.h:15:6: note: expected ‘unsigned char *’ but argument is of type ‘char *’ void Blowfish_Init(BLOWFISH_CTX *ctx, unsigned char *key, int keyLen); ^ gcc -O2 -Wall -c wrapbf.c wrapbf.c: In function ‘BFEncrypt’: wrapbf.c:31:24: warning: pointer targets in passing argument 2 of ‘Blowfish_Init’ differ in signedness [-Wpointer-sign] Blowfish_Init (&ctx, key, MAXKEYBYTES); ^ In file included from functions.h:11:0, from wrapbf.c:12: blowfish.h:15:6: note: expected ‘unsigned char *’ but argument is of type ‘char *’ void Blowfish_Init(BLOWFISH_CTX *ctx, unsigned char *key, int keyLen); ^ wrapbf.c: In function ‘BFDecrypt’: wrapbf.c:84:24: warning: pointer targets in passing argument 2 of ‘Blowfish_Init’ differ in signedness [-Wpointer-sign] Blowfish_Init (&ctx, mykey, MAXKEYBYTES); ^ In file included from functions.h:11:0, from wrapbf.c:12: blowfish.h:15:6: note: expected ‘unsigned char *’ but argument is of type ‘char *’ void Blowfish_Init(BLOWFISH_CTX *ctx, unsigned char *key, int keyLen); ^ gcc -O2 -Wall -c endian.c gcc -O2 -Wall -c wrapzl.c gcc -O2 -Wall -o bcrypt main.o blowfish.o rwfile.o keys.o wrapbf.o endian.o wrapzl.o -L/usr/local/lib -lz ``` |
From: <jsh...@br...> - 2013-02-03 22:21:16
|
Dear Bcrypt Git, Happy Birthday and Best Wishes. j Quoting Liviu Andronic <lan...@gm...>: > Dear all, > For those using Ubuntu, I've set up a Launchpad PPA for daily builds > of bcrypt on github. > > https://launchpad.net/~landronimirc/+archive/bcrypt-git > > Please let me know if you encounter issues with the setup. Regards, > Liviu > > > On Fri, Aug 10, 2012 at 12:14 PM, Guillaume Castagnino > <gca...@de...> wrote: >> Hi, >> >> >> Since some time, I use a home-made patched version of bcrypt to fix some >> memory issues I get (especially, reduce the very high memory usage [1], >> that may interest some people). >> >> I just cleaned up my fixes and set up a git repository at github: >> https://github.com/casta/bcrypt >> >> I also did some source code reorganization to suits my needs, and >> dropped the windows specific code: I do the windows build using mingw >> that works very well and allow to use the same source code for both Unix >> and Windows versions. >> >> Currently tested on windows (7) and Linux (ubuntu 11.04, 12.04 and >> Gentoo) >> >> There is still room for improvement, especially at the compression step: >> use a stream instead of allocating the entire file at the same time, but >> this would need a lot more code changes. >> >> >> Feel free to comment, use, fork again... And thanks to the original >> authors ! >> >> >> [1] >> https://github.com/casta/bcrypt/commit/e9c9c5b6b94815e1b39de90207f5df3913ee4cb4 >> >> -- >> Guillaume Castagnino >> gca...@de... >> >> >> ------------------------------------------------------------------------------ >> Live Security Virtual Conference >> Exclusive live event will cover all the ways today's security and >> threat landscape has changed and how IT managers can respond. Discussions >> will include endpoint security, mobile security and the latest in malware >> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >> _______________________________________________ >> Bcrypt-users mailing list >> Bcr...@li... >> https://lists.sourceforge.net/lists/listinfo/bcrypt-users > > > > -- > Do you know how to read? > http://www.alienetworks.com/srtest.cfm > http://goodies.xfce.org/projects/applications/xfce4-dict#speed-reader > Do you know how to write? > http://garbl.home.comcast.net/~garbl/stylemanual/e.htm#e-mail > > ------------------------------------------------------------------------------ > Everyone hates slow websites. So do we. > Make your web apps faster with AppDynamics > Download AppDynamics Lite for free today: > http://p.sf.net/sfu/appdyn_d2d_jan > _______________________________________________ > Bcrypt-users mailing list > Bcr...@li... > https://lists.sourceforge.net/lists/listinfo/bcrypt-users > |
From: Liviu A. <lan...@gm...> - 2013-02-02 22:15:18
|
Dear all, For those using Ubuntu, I've set up a Launchpad PPA for daily builds of bcrypt on github. https://launchpad.net/~landronimirc/+archive/bcrypt-git Please let me know if you encounter issues with the setup. Regards, Liviu On Fri, Aug 10, 2012 at 12:14 PM, Guillaume Castagnino <gca...@de...> wrote: > Hi, > > > Since some time, I use a home-made patched version of bcrypt to fix some > memory issues I get (especially, reduce the very high memory usage [1], > that may interest some people). > > I just cleaned up my fixes and set up a git repository at github: > https://github.com/casta/bcrypt > > I also did some source code reorganization to suits my needs, and > dropped the windows specific code: I do the windows build using mingw > that works very well and allow to use the same source code for both Unix > and Windows versions. > > Currently tested on windows (7) and Linux (ubuntu 11.04, 12.04 and > Gentoo) > > There is still room for improvement, especially at the compression step: > use a stream instead of allocating the entire file at the same time, but > this would need a lot more code changes. > > > Feel free to comment, use, fork again... And thanks to the original > authors ! > > > [1] > https://github.com/casta/bcrypt/commit/e9c9c5b6b94815e1b39de90207f5df3913ee4cb4 > > -- > Guillaume Castagnino > gca...@de... > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > Bcrypt-users mailing list > Bcr...@li... > https://lists.sourceforge.net/lists/listinfo/bcrypt-users -- Do you know how to read? http://www.alienetworks.com/srtest.cfm http://goodies.xfce.org/projects/applications/xfce4-dict#speed-reader Do you know how to write? http://garbl.home.comcast.net/~garbl/stylemanual/e.htm#e-mail |
From: Liviu A. <lan...@gm...> - 2012-11-27 17:43:54
|
On Mon, Nov 26, 2012 at 1:28 PM, Guillaume Castagnino <gca...@de...> wrote: > Just to notice you that Michael Stapelberg[1] has done a very good job > on bcrypt[2]: now it uses chunks for all operations. So it unlocks the > old bcrypt limit on the file size. You can now encrypt files larger than > your RAM! It now needs more or less 1Mb of RAM to work, no matter what > the filesize is. > Great news! Are there plans to make a formal release in the near future? Liviu |
From: Guillaume C. <gca...@de...> - 2012-11-26 12:41:46
|
Hi, Just to notice you that Michael Stapelberg[1] has done a very good job on bcrypt[2]: now it uses chunks for all operations. So it unlocks the old bcrypt limit on the file size. You can now encrypt files larger than your RAM! It now needs more or less 1Mb of RAM to work, no matter what the filesize is. Great thanks to him :) [1] https://github.com/mstap [2] https://github.com/casta/bcrypt/commit/bba6aa07009cb2a565825ebf52ed998e76359bc0 Le vendredi 10 août 2012 12:14:20 Guillaume Castagnino a écrit : > Hi, > > > Since some time, I use a home-made patched version of bcrypt to fix > some memory issues I get (especially, reduce the very high memory > usage [1], that may interest some people). > > I just cleaned up my fixes and set up a git repository at github: > https://github.com/casta/bcrypt > > I also did some source code reorganization to suits my needs, and > dropped the windows specific code: I do the windows build using mingw > that works very well and allow to use the same source code for both > Unix and Windows versions. > > Currently tested on windows (7) and Linux (ubuntu 11.04, 12.04 and > Gentoo) > > There is still room for improvement, especially at the compression > step: use a stream instead of allocating the entire file at the same > time, but this would need a lot more code changes. > > > Feel free to comment, use, fork again... And thanks to the original > authors ! > > > [1] > https://github.com/casta/bcrypt/commit/e9c9c5b6b94815e1b39de90207f5df3 > 913ee4cb4 -- Guillaume Castagnino gca...@de... |
From: Ron M. <qui...@gm...> - 2012-08-11 02:18:01
|
This is great news! Exciting to see some work done on this great project =) On Fri, Aug 10, 2012 at 4:05 PM, <jsh...@br...> wrote: > Forkhacked! Godspeed! > > Quoting Guillaume Castagnino <gca...@de...>: > > > Hi, > > > > > > Since some time, I use a home-made patched version of bcrypt to fix some > > memory issues I get (especially, reduce the very high memory usage [1], > > that may interest some people). > > > > I just cleaned up my fixes and set up a git repository at github: > > https://github.com/casta/bcrypt > > > > I also did some source code reorganization to suits my needs, and > > dropped the windows specific code: I do the windows build using mingw > > that works very well and allow to use the same source code for both Unix > > and Windows versions. > > > > Currently tested on windows (7) and Linux (ubuntu 11.04, 12.04 and > > Gentoo) > > > > There is still room for improvement, especially at the compression step: > > use a stream instead of allocating the entire file at the same time, but > > this would need a lot more code changes. > > > > > > Feel free to comment, use, fork again... And thanks to the original > > authors ! > > > > > > [1] > > > https://github.com/casta/bcrypt/commit/e9c9c5b6b94815e1b39de90207f5df3913ee4cb4 > > > > -- > > Guillaume Castagnino > > gca...@de... > > > > > > > ------------------------------------------------------------------------------ > > Live Security Virtual Conference > > Exclusive live event will cover all the ways today's security and > > threat landscape has changed and how IT managers can respond. Discussions > > will include endpoint security, mobile security and the latest in malware > > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > > _______________________________________________ > > Bcrypt-users mailing list > > Bcr...@li... > > https://lists.sourceforge.net/lists/listinfo/bcrypt-users > > > > > > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > Bcrypt-users mailing list > Bcr...@li... > https://lists.sourceforge.net/lists/listinfo/bcrypt-users > -- There are 10 types of people in the world: those who understand binary, and those who don't... |
From: <jsh...@br...> - 2012-08-10 22:21:16
|
Forkhacked! Godspeed! Quoting Guillaume Castagnino <gca...@de...>: > Hi, > > > Since some time, I use a home-made patched version of bcrypt to fix some > memory issues I get (especially, reduce the very high memory usage [1], > that may interest some people). > > I just cleaned up my fixes and set up a git repository at github: > https://github.com/casta/bcrypt > > I also did some source code reorganization to suits my needs, and > dropped the windows specific code: I do the windows build using mingw > that works very well and allow to use the same source code for both Unix > and Windows versions. > > Currently tested on windows (7) and Linux (ubuntu 11.04, 12.04 and > Gentoo) > > There is still room for improvement, especially at the compression step: > use a stream instead of allocating the entire file at the same time, but > this would need a lot more code changes. > > > Feel free to comment, use, fork again... And thanks to the original > authors ! > > > [1] > https://github.com/casta/bcrypt/commit/e9c9c5b6b94815e1b39de90207f5df3913ee4cb4 > > -- > Guillaume Castagnino > gca...@de... > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > Bcrypt-users mailing list > Bcr...@li... > https://lists.sourceforge.net/lists/listinfo/bcrypt-users > |
From: Liviu A. <lan...@gm...> - 2012-08-10 20:50:15
|
Hello On Fri, Aug 10, 2012 at 12:14 PM, Guillaume Castagnino <gca...@de...> wrote: > Since some time, I use a home-made patched version of bcrypt to fix some > memory issues I get (especially, reduce the very high memory usage [1], > that may interest some people). > > I just cleaned up my fixes and set up a git repository at github: > https://github.com/casta/bcrypt > I think this is great news! Thanks. > I also did some source code reorganization to suits my needs, and > dropped the windows specific code: I do the windows build using mingw > that works very well and allow to use the same source code for both Unix > and Windows versions. > I've always looked with watery eyes towards bcrypt as a cross-platform solution to encrypting/decrypting files. However being 10 years late in bug fixing releases, it made me feel queasy about adopting it seriously. With someone (you) taking over maintenance, it suddenly becomes much more attractive. > Currently tested on windows (7) and Linux (ubuntu 11.04, 12.04 and > Gentoo) > I will give it a spin on Ubuntu and Windows, too. > There is still room for improvement, especially at the compression step: > use a stream instead of allocating the entire file at the same time, but > this would need a lot more code changes. > > > Feel free to comment, use, fork again... And thanks to the original > authors ! > For subsequent steps I was wondering whether the original author (cc'ed) would agree to let you take over maintenance of the SF code and thus remove the need for a fork altogether. Either way, I think it would be important to perform an "official" release---either as part of the SF trunk, or as part of your own fork---so as to revive interest in the project. This will also allow distros to pick up and package the code containing bug fixes. (And I will likely create an Ubuntu PPA for the new release of bcrypt. I will also look into the possibility of creating a bcrypt plugin for emelFM2, and it would be just awesome if someone looked into a plugin for Total Commander on Windows.) Thanks a lot for your efforts. Regards Liviu > > [1] > https://github.com/casta/bcrypt/commit/e9c9c5b6b94815e1b39de90207f5df3913ee4cb4 > > -- > Guillaume Castagnino > gca...@de... > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > Bcrypt-users mailing list > Bcr...@li... > https://lists.sourceforge.net/lists/listinfo/bcrypt-users -- Do you know how to read? http://www.alienetworks.com/srtest.cfm http://goodies.xfce.org/projects/applications/xfce4-dict#speed-reader Do you know how to write? http://garbl.home.comcast.net/~garbl/stylemanual/e.htm#e-mail |
From: Guillaume C. <gca...@de...> - 2012-08-10 10:27:27
|
Hi, Since some time, I use a home-made patched version of bcrypt to fix some memory issues I get (especially, reduce the very high memory usage [1], that may interest some people). I just cleaned up my fixes and set up a git repository at github: https://github.com/casta/bcrypt I also did some source code reorganization to suits my needs, and dropped the windows specific code: I do the windows build using mingw that works very well and allow to use the same source code for both Unix and Windows versions. Currently tested on windows (7) and Linux (ubuntu 11.04, 12.04 and Gentoo) There is still room for improvement, especially at the compression step: use a stream instead of allocating the entire file at the same time, but this would need a lot more code changes. Feel free to comment, use, fork again... And thanks to the original authors ! [1] https://github.com/casta/bcrypt/commit/e9c9c5b6b94815e1b39de90207f5df3913ee4cb4 -- Guillaume Castagnino gca...@de... |
From: Ron M. <qui...@gm...> - 2012-07-13 15:51:33
|
I was using bcrypt to encrypt some larger files > 2GB and I kept getting the "Can't allocate enough memory. Bailing out" message. I knew I had plenty of memory to encrypt the file I was trying to encrypt. So I did some debugging and it looks like the problem is a negative value getting passed to malloc on line 71 of rwfile.c. This happens because of an integer overflow because readsize is defined as a signed integer, I changed it to an unsigned long and it hasn't had any problems so far. Hope this helps someone, -Ron -- There are 10 types of people in the world: those who understand binary, and those who don't... http://quizno50.001webs.com/ |
From: Stephen L. <sal...@at...> - 2012-06-16 23:06:44
|
I would also love to 'have some tutorials' if possible, just for relearning and the such! ----- Original Message ---- From: Liviu Andronic <lan...@gm...> To: Bcrypt users list. <bcr...@li...> Sent: Sat, June 16, 2012 5:53:30 PM Subject: Re: [Bcrypt-users] bcrypt in The Economist On Fri, Jun 15, 2012 at 8:29 AM, Schmidt, Christian Thorge <ct...@ra...> wrote: > The article talks about the "bcrypt Hash" (1) function, not our beloved > little blowfish encryption tool. > You're right! Sorry for the (understandable) confusion. > And sadly, bcrypt seems to be unmaintained. Everything it does openssl (2) > can do too, and better/more "open". bcrypt appears to be used mainly because > there are binaries for all three major OSes readily available and the > learning curve (if so to speak) to use it is low(er) then openssl's. > Do you know some tutorials that explain how to do bcrypt-like file encryption using openssl? Regards Liviu > Does anyone know the part of the code where bcrypt generates the actual key > used to blowfish-encrypt the file from the password given? > > Regards, > Christian. > > (1) http://en.wikipedia.org/wiki/Bcrypt > (2) http://www.openssl.org/ > > > On Wed, Jun 13, 2012 at 4:58 PM, Liviu Andronic <lan...@gm...> > wrote: >> >> Dear all >> You may be curious to know that 'bcrypt' was recently mentioned in a >> The Economist article [1]. >> [1] http://www.economist.com/blogs/babbage/2012/06/password-theft >> >> Regards >> Liviu >> >> PS Is there *any* development still going on on bcrypt? It seems like >> a very nice utility, which unfortunately contains bugs that were >> reported over the last decade or so. >> >> >> -- >> Do you know how to read? >> http://www.alienetworks.com/srtest.cfm >> http://goodies.xfce.org/projects/applications/xfce4-dict#speed-reader >> Do you know how to write? >> http://garbl.home.comcast.net/~garbl/stylemanual/e.htm#e-mail >> >> >> ------------------------------------------------------------------------------ >> Live Security Virtual Conference >> Exclusive live event will cover all the ways today's security and >> threat landscape has changed and how IT managers can respond. Discussions >> will include endpoint security, mobile security and the latest in malware >> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >> _______________________________________________ >> Bcrypt-users mailing list >> Bcr...@li... >> https://lists.sourceforge.net/lists/listinfo/bcrypt-users > > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > Bcrypt-users mailing list > Bcr...@li... > https://lists.sourceforge.net/lists/listinfo/bcrypt-users > -- Do you know how to read? http://www.alienetworks.com/srtest.cfm http://goodies.xfce.org/projects/applications/xfce4-dict#speed-reader Do you know how to write? http://garbl.home.comcast.net/~garbl/stylemanual/e.htm#e-mail ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Bcrypt-users mailing list Bcr...@li... https://lists.sourceforge.net/lists/listinfo/bcrypt-users |
From: Liviu A. <lan...@gm...> - 2012-06-16 22:53:27
|
On Fri, Jun 15, 2012 at 8:29 AM, Schmidt, Christian Thorge <ct...@ra...> wrote: > The article talks about the "bcrypt Hash" (1) function, not our beloved > little blowfish encryption tool. > You're right! Sorry for the (understandable) confusion. > And sadly, bcrypt seems to be unmaintained. Everything it does openssl (2) > can do too, and better/more "open". bcrypt appears to be used mainly because > there are binaries for all three major OSes readily available and the > learning curve (if so to speak) to use it is low(er) then openssl's. > Do you know some tutorials that explain how to do bcrypt-like file encryption using openssl? Regards Liviu > Does anyone know the part of the code where bcrypt generates the actual key > used to blowfish-encrypt the file from the password given? > > Regards, > Christian. > > (1) http://en.wikipedia.org/wiki/Bcrypt > (2) http://www.openssl.org/ > > > On Wed, Jun 13, 2012 at 4:58 PM, Liviu Andronic <lan...@gm...> > wrote: >> >> Dear all >> You may be curious to know that 'bcrypt' was recently mentioned in a >> The Economist article [1]. >> [1] http://www.economist.com/blogs/babbage/2012/06/password-theft >> >> Regards >> Liviu >> >> PS Is there *any* development still going on on bcrypt? It seems like >> a very nice utility, which unfortunately contains bugs that were >> reported over the last decade or so. >> >> >> -- >> Do you know how to read? >> http://www.alienetworks.com/srtest.cfm >> http://goodies.xfce.org/projects/applications/xfce4-dict#speed-reader >> Do you know how to write? >> http://garbl.home.comcast.net/~garbl/stylemanual/e.htm#e-mail >> >> >> ------------------------------------------------------------------------------ >> Live Security Virtual Conference >> Exclusive live event will cover all the ways today's security and >> threat landscape has changed and how IT managers can respond. Discussions >> will include endpoint security, mobile security and the latest in malware >> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >> _______________________________________________ >> Bcrypt-users mailing list >> Bcr...@li... >> https://lists.sourceforge.net/lists/listinfo/bcrypt-users > > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > Bcrypt-users mailing list > Bcr...@li... > https://lists.sourceforge.net/lists/listinfo/bcrypt-users > -- Do you know how to read? http://www.alienetworks.com/srtest.cfm http://goodies.xfce.org/projects/applications/xfce4-dict#speed-reader Do you know how to write? http://garbl.home.comcast.net/~garbl/stylemanual/e.htm#e-mail |
From: <jsh...@br...> - 2012-06-15 17:26:16
|
Hack as much as you like. |
From: Schmidt, C. T. <ct...@ra...> - 2012-06-15 06:52:31
|
The article talks about the "bcrypt Hash" (1) function, not our beloved little blowfish encryption tool. And sadly, bcrypt seems to be unmaintained. Everything it does openssl (2) can do too, and better/more "open". bcrypt appears to be used mainly because there are binaries for all three major OSes readily available and the learning curve (if so to speak) to use it is low(er) then openssl's. Does anyone know the part of the code where bcrypt generates the actual key used to blowfish-encrypt the file from the password given? Regards, Christian. (1) http://en.wikipedia.org/wiki/Bcrypt (2) http://www.openssl.org/ On Wed, Jun 13, 2012 at 4:58 PM, Liviu Andronic <lan...@gm...>wrote: > Dear all > You may be curious to know that 'bcrypt' was recently mentioned in a > The Economist article [1]. > [1] http://www.economist.com/blogs/babbage/2012/06/password-theft > > Regards > Liviu > > PS Is there *any* development still going on on bcrypt? It seems like > a very nice utility, which unfortunately contains bugs that were > reported over the last decade or so. > > > -- > Do you know how to read? > http://www.alienetworks.com/srtest.cfm > http://goodies.xfce.org/projects/applications/xfce4-dict#speed-reader > Do you know how to write? > http://garbl.home.comcast.net/~garbl/stylemanual/e.htm#e-mail > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > Bcrypt-users mailing list > Bcr...@li... > https://lists.sourceforge.net/lists/listinfo/bcrypt-users > |
From: Liviu A. <lan...@gm...> - 2012-06-13 14:59:15
|
Dear all You may be curious to know that 'bcrypt' was recently mentioned in a The Economist article [1]. [1] http://www.economist.com/blogs/babbage/2012/06/password-theft Regards Liviu PS Is there *any* development still going on on bcrypt? It seems like a very nice utility, which unfortunately contains bugs that were reported over the last decade or so. -- Do you know how to read? http://www.alienetworks.com/srtest.cfm http://goodies.xfce.org/projects/applications/xfce4-dict#speed-reader Do you know how to write? http://garbl.home.comcast.net/~garbl/stylemanual/e.htm#e-mail |
From: spencer <spe...@gm...> - 2012-02-28 16:57:01
|
Hello, I'm trying to decrypt a file, using bcrypt. This file was made using 'Secrets', it's an android application written in Java. And it used the uses the standard Java implementation of Bcrypt to encrypt serialised data which is then written to file. Do you think there's any hope of using bcrypt (as in this implementation) to get at the data? I've tried to simply rename the file with a .bfe extension. But no luck. Any ideas? Spencer |
From: <m.a...@ut...> - 2011-08-29 12:46:06
|
Dear Madame/Sir, I need to decrypt some .bfe formated files and I already downloaded bcrypt-1.1. regarding to readme file, I faced the error: "Download Forbidden We cannot send this file to your location" downloading "zlib-1.1.4-bin.zip". Your help will be highly appreciated. Best regards, Mehran Aflakparast |
From: Susan C. <Sus...@sa...> - 2011-02-25 18:58:36
|
Does anyone know 1. Whether this code and the encryption is US origin and 2. Whether anyone has filed a TSU notice or otherwise received an export classification for bcrypt? If you would please send an email if you know the answer to either of these, I would appreciate your response. Regards, Susan ----------------------------------------------------------------------------------------------------------------- Susan Waters Carr Legal Counsel ▪ Legal Division Tel: 919-531-0396 ▪ Fax: 919-677-4444 ▪ sus...@sa... SAS Institute Inc. ▪ SAS Campus Dr. ▪ Cary, North Carolina, 27513 www.sas.com SAS® … THE POWER TO KNOW® This message and any attachments contain information that may be confidential and privileged. Unless you are the addressee (or authorized to receive for the addressee), you may not use, copy, print or disclose to anyone the message or any information contained in the message. If you have received this e-mail in error, please advise the sender by reply and delete the message and any attachments. Thank you. |
From: Lucien P. <dru...@gm...> - 2011-02-10 02:40:30
|
I'm testing building Bcrypt on Mac OS 10.6 using the MacPorts zlib (1.2.5_0+universal) in /opt/local/lib, and it has successfully decrypted the sample files... However, it makes me a tad bit nervous to see warnings, so what should I expect? I got: $ make gcc -O2 -Wall -c main.c gcc -O2 -Wall -c blowfish.c gcc -O2 -Wall -c rwfile.c gcc -O2 -Wall -c keys.c keys.c: In function ‘mutateKey’: keys.c:88: warning: pointer targets in passing argument 2 of ‘Blowfish_Init’ differ in signedness gcc -O2 -Wall -c wrapbf.c wrapbf.c: In function ‘BFEncrypt’: wrapbf.c:31: warning: pointer targets in passing argument 2 of ‘Blowfish_Init’ differ in signedness wrapbf.c: In function ‘BFDecrypt’: wrapbf.c:84: warning: pointer targets in passing argument 2 of ‘Blowfish_Init’ differ in signedness gcc -O2 -Wall -c endian.c gcc -O2 -Wall -c wrapzl.c gcc -O2 -Wall -o bcrypt main.o blowfish.o rwfile.o keys.o wrapbf.o endian.o wrapzl.o -L/opt/local/lib -lz |
From: Schmidt, C. T. <ct...@ra...> - 2010-11-15 11:51:49
|
Dear all, I'd like to find the actual hex key for the blowfish encryption that bcrypt uses for a given password. The reason is I'd like to switch away from bcrypt to openssl but I have a bunch of legacy systems which do not have openssl on them so I can't reliably just do away with bcrypt compatibility. Any way to make bcrypt print the hex key it is going to apply for it's encryption/decryption? Thanks & regards, Christian. |
From: Schmidt, C. T. <ct...@ra...> - 2010-11-15 11:46:04
|
Simply make a batch-file containing this: FOR /R "c:\some\dir" %%f IN (*.*) DO ( type S:\crypt\encpass.txt|bcrypt %%f ) edit c:\some\dir to whatever your directory is and also make a file encpass.txt which holds your password in the same directory as the batch file, then call the batch script and off it goes. my windows batch skills are fairly limited, but then again so is the windows batch ;) but this worls for us for some time now. Cheers, Christian. On Mon, Nov 15, 2010 at 11:39, Laan-2, S.W. van der < S.W...@um...> wrote: > Dear all, > > > > I’ve installed bcrypt for Windows 32 bits on my Windows 7 64 bits machine. > It all works, I’ve decrypted some files and it seems to work – the files are > come out as they’re supposed to. But… I’d like to decrypt a whole batch of > files, actually I’ve got hundreds… Is there any command to do this by? I was > thinking of something in the line of: > > > > bcrypt.exe –rc C:\files\*.bfe > > > > I’ve tried this, but it didn’t work. Any suggestions? > > > > I am using the standard command console of Windows 7. > > > > In principle I do not have the option to use Linux… > > > > Thanks. > > > > Kind regards, > > > > Sander > > > > *Sander W. van der Laan, MSc.*** > > * * > > PhD-candidate > > Division Heart & Lungs, Experimental Cardiology Laboratory > > University Medical Center Utrecht > > > > Tel (+31) (0)88 75 507 59 > > Mob (+31) (0)6 429 83 769 > > s.w...@um... > > Present at UMC Utrecht: Monday, Thursday, and Friday > > > > *Office:*** > > Matthias van Geuns Building > > Room 8.05 > > Bolognalaan 48, 3584 CJ Utrecht, the Netherlands > > > > *Postaddress:*** > > UMC Utrecht > > Room G02.523 > > Heidelberglaan 100, 3584 CX Utrecht, the Netherlands > > > > This email and its attachments are confidential and may contain legally > privileged information. You should not disclose the contents to any other > person. If you are not the intended recipient, please notify the sender > immediately and delete this email from your system. > > > > Please consider the environment before printing. > > > ------------------------------ > > * De informatie opgenomen in dit bericht kan vertrouwelijk zijn en is > uitsluitend bestemd voor de geadresseerde. Indien u dit bericht onterecht > ontvangt, wordt u verzocht de inhoud niet te gebruiken en de afzender direct > te informeren door het bericht te retourneren. Het Universitair Medisch > Centrum Utrecht is een publiekrechtelijke rechtspersoon in de zin van de > W.H.W. (Wet Hoger Onderwijs en Wetenschappelijk Onderzoek) en staat > geregistreerd bij de Kamer van Koophandel voor Midden-Nederland onder nr. > 30244197. * > > * Denk s.v.p aan het milieu voor u deze e-mail afdrukt. * > ------------------------------ > > * This message may contain confidential information and is intended > exclusively for the addressee. If you receive this message unintentionally, > please do not use the contents but notify the sender immediately by return > e-mail. University Medical Center Utrecht is a legal person by public law > and is registered at the Chamber of Commerce for Midden-Nederland under no. > 30244197. * > > * Please consider the environment before printing this e-mail. * > > > ------------------------------------------------------------------------------ > Centralized Desktop Delivery: Dell and VMware Reference Architecture > Simplifying enterprise desktop deployment and management using > Dell EqualLogic storage and VMware View: A highly scalable, end-to-end > client virtualization framework. Read more! > http://p.sf.net/sfu/dell-eql-dev2dev > _______________________________________________ > Bcrypt-users mailing list > Bcr...@li... > https://lists.sourceforge.net/lists/listinfo/bcrypt-users > > |
From: Laan-2, S.W. v. d. <S.W...@um...> - 2010-11-15 10:55:20
|
Dear all, I've installed bcrypt for Windows 32 bits on my Windows 7 64 bits machine. It all works, I've decrypted some files and it seems to work - the files are come out as they're supposed to. But... I'd like to decrypt a whole batch of files, actually I've got hundreds... Is there any command to do this by? I was thinking of something in the line of: bcrypt.exe -rc C:\files\*.bfe I've tried this, but it didn't work. Any suggestions? I am using the standard command console of Windows 7. In principle I do not have the option to use Linux... Thanks. Kind regards, Sander Sander W. van der Laan, MSc. PhD-candidate Division Heart & Lungs, Experimental Cardiology Laboratory University Medical Center Utrecht Tel (+31) (0)88 75 507 59 Mob (+31) (0)6 429 83 769 s.w...@um... Present at UMC Utrecht: Monday, Thursday, and Friday Office: Matthias van Geuns Building Room 8.05 Bolognalaan 48, 3584 CJ Utrecht, the Netherlands Postaddress: UMC Utrecht Room G02.523 Heidelberglaan 100, 3584 CX Utrecht, the Netherlands This email and its attachments are confidential and may contain legally privileged information. You should not disclose the contents to any other person. If you are not the intended recipient, please notify the sender immediately and delete this email from your system. Please consider the environment before printing. ------------------------------------------------------------------------------ De informatie opgenomen in dit bericht kan vertrouwelijk zijn en is uitsluitend bestemd voor de geadresseerde. Indien u dit bericht onterecht ontvangt, wordt u verzocht de inhoud niet te gebruiken en de afzender direct te informeren door het bericht te retourneren. Het Universitair Medisch Centrum Utrecht is een publiekrechtelijke rechtspersoon in de zin van de W.H.W. (Wet Hoger Onderwijs en Wetenschappelijk Onderzoek) en staat geregistreerd bij de Kamer van Koophandel voor Midden-Nederland onder nr. 30244197. Denk s.v.p aan het milieu voor u deze e-mail afdrukt. ------------------------------------------------------------------------------ This message may contain confidential information and is intended exclusively for the addressee. If you receive this message unintentionally, please do not use the contents but notify the sender immediately by return e-mail. University Medical Center Utrecht is a legal person by public law and is registered at the Chamber of Commerce for Midden-Nederland under no. 30244197. Please consider the environment before printing this e-mail. |
From: Martin M. <Mar...@mo...> - 2010-10-15 16:00:31
|
Hi, I seem to have encountered a problem where bcrypt fails when it is run on a machine that has Microsoft Office 2007 installed. Is there any way to work around this issue? Thanks! The information contained in this message may be CONFIDENTIAL and is intended for the addressee only. Any unauthorised use, dissemination of the information, or copying of this message is prohibited. If you are not the addressee, please notify the sender immediately by return e-mail and delete this message. Although this e-mail and any attachments are believed to be free of any virus, or other defect which might affect any computer or system into which they are received and opened, it is the responsibility of the recipient to ensure that they are virus free and no responsibility is accepted by Moneysupermarket.com Financial Group Limited for any loss or damage from receipt or use thereof. The views expressed are of the individual, and do not necessarily reflect the views of Moneysupermarket.com Financial Group Limited. Moneysupermarket.com Limited is an appointed representative of Moneysupermarket.com Financial Group Limited, which is authorised and regulated by the Financial Services Authority (FSA FRN 303190). Moneysupermarket.com Financial Group Limited, registered in England No. 3157344. Registered Office: Moneysupermarket House, St. David’s Park, Ewloe, CH5 3UZ. Telephone 01244 665700. |