[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[task #16376] Submission of probebalistic argon

From: Martin
Subject: [task #16376] Submission of probebalistic argon
Date: Thu, 8 Jun 2023 09:53:59 -0400 (EDT)


                 Summary: Submission of probebalistic argon
                   Group: Savannah Administration
               Submitter: smoutwortel
               Submitted: Thu 08 Jun 2023 01:53:57 PM UTC
         Should Start On: Thu 08 Jun 2023 12:00:00 AM UTC
   Should be Finished on: Sun 18 Jun 2023 12:00:00 AM UTC
                Category: Project Approval
                Priority: 5 - Normal
                  Status: None
                 Privacy: Public
        Percent Complete: 0%
             Assigned to: None
             Open/Closed: Open
         Discussion Lock: Any
                  Effort: 0.00


Follow-up Comments:

Date: Thu 08 Jun 2023 01:53:57 PM UTC By: Martin <smoutwortel>
A new group has been registered at Savannah.
This group will remain inactive until a site admin approves
or discards the registration.

= Registration Administration =

Approving or discarding the registration must be done using the specific
[ Group
administration] page, accessible only to site
administrators logged in as superusers.

= Registration Details =

* Name: *probebalistic argon*
* System Name:  *hard-argon*
* Type: non-GNU software and documentation
* License: GNU General Public License v3 or later (    Using paragraph 1 of
section 7 in the AGPL the author grants you the power of attorney to sue
others for copyright, patent and/or trademark infringement of the work unless
the sued entity can proof to you to be in a agreement with the licensor that
lets them do these actions.
    Using term e of section 7 in the AGPL the authors refuses to grant you any
trademark rights under this license.



== Description: ==
C library for Implementing an extra layer of probabilistic protection on top
of argon2 by including various amounts of randomized data safed on different
Currently it only implements a little bit of it and doesn't safe it. This does
provide registration vs validation asymmetry and punishes wrong attempts.
I intent to use actually safed random data to implement post breach breach
detection system in the future.

== Other Software Required: ==
Argon2+CC0 1.0 Universal/Apache Public License
stdio.h + old bsd +
string.h + old bsd +
stdlib.h + old bsd +
time.h + old bsd +
stdint.h + bsd0 +

== Other Comments: ==
If you receive another submission with the system name "hardened-argon" reject
this one.

== Tarball URL: ==


Reply to this item at:


Message sent via Savannah

reply via email to

[Prev in Thread] Current Thread [Next in Thread]