ironclad
ironclad copied to clipboard
A cryptographic toolkit written in Common Lisp
Hello, As can be seen on ci.debian.net, with SBCL 2.2.6 on [armhf](https://ci.debian.net/packages/c/cl-ironclad/testing/armhf/) and [armel](https://ci.debian.net/packages/c/cl-ironclad/testing/armel/) the ironclad test suite is running out of heap. This didn't occur with SBCL 2.2.3, the...
I'm using `postmodern` which uses `ironclad` to make authentication. The problem is when I'm saving lisp image with `save-lisp-and-die`, the first attempt to reconnect to the database produces the following...
I know it's a somewhat daunting task but the absolute majority of Ironclad uses I've seen only need MD5, SHA1, and `byte-array-to-hex-string`. Frankly, I have no idea how to go...
Hi, I have a signature and a message I want to validate using the RSA public key of a CA. In order to verify the message I need to use...
Currently, only chacha with a 64-bit nonce is available through the API. Would there be interest in adding the 96-bit nonce variant which is popular in some RFCs? I believe...
I'd like to report that some tests are failing on ECL on macOS: ``` :info:test 61 out of 570 total tests failed: :KECCAK, :KECCAK/224, :KECCAK/256, :KECCAK/384, :SHA3, :SHA3/224, :info:test :SHA3/256,...
bcrypt is too slow in LispWorks: ```lisp (bcrypt:make-password "password" :cost 10 :identifier "2b") ``` Once optimizations are enabled, the performance becomes acceptable.
Some password hashing implementations require a specific key length. It would be great to have that parameter as another keyword argument on pbkdf2-hash-password. Currently I have to directly call pbkdf2-derive-key,...
Hello, I have tried to generate a key by openssl/ironclad kdf with password and salt. But crypto-js EvpKDF implementation is not compatible as described [here](https://stackoverflow.com/questions/66657689/how-to-decrypt-a-file-that-was-encrypted-with-cryptojs3-library-with-custom-ite), so I tested and cant...
(In the exhibit below, scroll to the right to see the mismatch.) ``` CL-USER> (asdf:test-system :aws-sign4) Expected presigned url: "https://examplebucket.s3.amazonaws.com/test.txt?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAIOSFODNN7EXAMPLE%2F20130524%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20130524T000000Z&X-Amz-Expires=86400&X-Amz-SignedHeaders=host&X-Amz-Signature=aeeed9bbccd4d02ee5c0109b86d86835f995330da4c265957d157751f604d404" Got: "https://examplebucket.s3.amazonaws.com/test.txt?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAIOSFODNN7EXAMPLE%2F20130524%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20130524T000000Z&X-Amz-Expires=86400&X-Amz-SignedHeaders=host&X-Amz-Signature=3\0\0\0\0\0\0\0\0\0\001\0\0\0\0\0\0\0\03\0\0\0\02\03\0\0\0\0\01\0\0\01\003\02\0\0\03\0\0\02\03\0\03\0\0\0\0\0\00" ``` Simply changing safety to 1 solves this:...