summaryrefslogtreecommitdiff
path: root/pelican/content
diff options
context:
space:
mode:
Diffstat (limited to 'pelican/content')
-rw-r--r--pelican/content/AlphaBoard.md2
-rw-r--r--pelican/content/DNSSEC-Requirements.md103
-rw-r--r--pelican/content/Dashboard.md32
-rw-r--r--pelican/content/DevBridgeBoard.md2
-rw-r--r--pelican/content/NoisyDiode.md2
-rw-r--r--pelican/content/UpgradeToKSNG.md2
6 files changed, 123 insertions, 20 deletions
diff --git a/pelican/content/AlphaBoard.md b/pelican/content/AlphaBoard.md
index fe597b9..f0e0f1a 100644
--- a/pelican/content/AlphaBoard.md
+++ b/pelican/content/AlphaBoard.md
@@ -37,5 +37,5 @@ Modified: 2019-01-22 08:46
| 14 | Red | FPGA LED 3 |
| 15 | Green | FPGA LED 1 |
| 16 | Yellow | FPGA LED 2 |
-| 17 | Blue | FPGA LED 0. [Toggles with sys_clk when FMC is active.](https://trac.cryptech.is/browser/core/comm/fmc/src/rtl/fmc_indicator.v) |
+| 17 | Blue | FPGA LED 0. [Toggles with sys_clk when FMC is active.](https://git.cryptech.is/core/comm/fmc/tree/src/rtl/fmc_indicator.v) |
| 18 | Green | Power OK |
diff --git a/pelican/content/DNSSEC-Requirements.md b/pelican/content/DNSSEC-Requirements.md
new file mode 100644
index 0000000..cef61c4
--- /dev/null
+++ b/pelican/content/DNSSEC-Requirements.md
@@ -0,0 +1,103 @@
+Title: DNSSEC/Requirements
+Author: trac
+Date: 2016-12-15 22:44
+
+# DNSSEC Requirements
+
+## Questions
+
+
+- Should we even support SHA-1?
+- GOST?
+
+
+## Must implement
+
+Target DNSSEC Algorithms:
+
+
+- RSA/SHA-256 (RFC 5702)
+- RSA/SHA-512 (RFC 5702)
+
+
+Algorithms:
+
+
+- Hash: SHA-256
+- Hash: SHA-512
+- Sign: RSA
+
+
+Required PKCS11 Mechs:
+
+
+- CKM_RSA_PKCS_KEY_PAIR_GEN
+- CKM_SHA256_RSA_PKCS
+- CKM_SHA512_RSA_PKCS
+- CKM_RSA_PKCS (possible cross-check hash with CKM_SHA256 and CKM_SHA512 before signing)
+- CKM_SHA256
+- CKM_SHA512
+
+
+## Should implement
+
+Target DNSSEC Algorithms:
+
+
+- ECDSA/P-256/SHA-256 (RFC 6605)
+- ECDSA/P-384/SHA-384 (RFC 6605)
+
+
+Algorithms:
+
+
+- Hash: SHA-256
+- Hash: SHA-384
+- Sign: P-256
+- Sign: P-384
+
+
+Required PKCS11 Mechs:
+
+
+- CKM_EC_KEY_PAIR_GEN
+- CKM_ECDSA_SHA256
+- CKM_ECDSA_SHA384
+- CKM_ECDSA (possible cross-check hash with CKM_SHA256 and CKM_SHA512 before signing)
+- CKM_SHA256
+- CKM_SHA384
+
+
+## May implement
+
+Target DNSSEC Algorithms:
+
+
+- RSA/SHA-1 (RFC 3110)
+- GOST (RFC 5933)
+
+
+Algorithms:
+
+
+- Hash: SHA-1
+- Sign: RSA
+
+
+
+- Hash: GOST R 34.11-94 (RFC5831)
+- Sign: GOST R 34.10-2001 (RFC5832)
+
+
+Required PKCS11 Mechs:
+
+
+- CKM_RSA_PKCS_KEY_PAIR_GEN
+- CKM_RSA_PKCS (possible cross-check hash with CKM_SHA_1)
+- CKM_SHA1_RSA_PKCS
+- CKM_SHA_1
+
+
+
+- CKM_GOSTR3410_KEY_PAIR_GEN
+- CKM_GOSTR3410_WITH_GOSTR3411
diff --git a/pelican/content/Dashboard.md b/pelican/content/Dashboard.md
index 83ecf75..4cba3a8 100644
--- a/pelican/content/Dashboard.md
+++ b/pelican/content/Dashboard.md
@@ -40,10 +40,10 @@ Date: 2016-12-15 22:44
| Component | Status | Repository | Comment |
|---|---|---|---|
-| SHA-1 | Done | [core/hash/sha1](GitRepositories/core/hash/sha1) | |
-| SHA-256 | Done | [core/hash/sha256](GitRepositories/core/hash/sha256) | |
-| SHA-512 | Done | [core/hash/sha512](GitRepositories/core/hash/sha512) | Support all four SHA-512/x modes defined in FIPS 180-4. |
-| SHA-3 (Keccak ) | Started | [core/hash/sha3](GitRepositories/core/hash/sha3) | |
+| SHA-1 | Done | [core/hash/sha1](https://git.cryptech.is/core/hash/sha1/about) | |
+| SHA-256 | Done | [core/hash/sha256](https://git.cryptech.is/core/hash/sha256/about) | |
+| SHA-512 | Done | [core/hash/sha512](https://git.cryptech.is/core/hash/sha512/about) | Support all four SHA-512/x modes defined in FIPS 180-4. |
+| SHA-3 (Keccak ) | Started | [core/hash/sha3](https://git.cryptech.is/core/hash/sha3/about) | |
| GOST R 34.11-2012 | Started | | |
@@ -52,8 +52,8 @@ Date: 2016-12-15 22:44
| Component | Status | Repository | Comment |
|---|---|---|---|
-| AES | Done | [core/cipher/aes](GitRepositories/core/cipher/aes) | AES cipher core with support for 128 and 256 bit keys. |
-| ChaCha | Done | [core/cipher/chacha](GitRepositories/core/cipher/chacha) | High speed stream cipher. Based on the Salsa20 stream cipher. |
+| AES | Done | [core/cipher/aes](https://git.cryptech.is/core/cipher/aes/about) | AES cipher core with support for 128 and 256 bit keys. |
+| ChaCha | Done | [core/cipher/chacha](https://git.cryptech.is/core/cipher/chacha/about) | High speed stream cipher. Based on the Salsa20 stream cipher. |
@@ -61,11 +61,11 @@ Date: 2016-12-15 22:44
| Component | Status | Repository | Comment |
|---|---|---|---|
-| ModExp -8192 (RSA) | Done | [core/math/modexps6](GitRepositories/core/math/modexps6) | |
+| ModExp -8192 (RSA) | Done | [core/math/modexps6](https://git.cryptech.is/core/math/modexps6/about) | |
| Curve25519 | Started | | |
| Ed25519 | Not started | | |
| P-256, P-384 ECDSA | Started | | |
-| GOST R 34.10-2001 | Started | <https://trac.cryptech.is/browser/user/shatov/gost/streebog> | Core in provisional repo. Will be moved to the the hash core section.|
+| GOST R 34.10-2001 | Started | <https://git.cryptech.is/user/shatov/gost/streebog> | Core in provisional repo. Will be moved to the the hash core section.|
@@ -73,9 +73,9 @@ Date: 2016-12-15 22:44
| Component | Status | Repository | Comment |
|---|---|---|---|
-| TRNG | Done | [core/rng/trng](GitRepositories/core/rng/trng) | Depends on SHA-512 and ChaCha |
-| External Avalanche Entropy | Done | [core/rng/avalanche_entropy](GitRepositories/core/rng/avalanche_entropy) | [Hardware](GitRepositories/user/ft/stm32-avalanche-noise) and stand-alone PoC |
-| Internal Ring Oscillator | Done | [core/rng/rosc_entropy](GitRepositories/core/rng/rosc_entropy) | |
+| TRNG | Done | [core/rng/trng](https://git.cryptech.is/core/rng/trng/about) | Depends on SHA-512 and ChaCha |
+| External Avalanche Entropy | Done | [core/rng/avalanche_entropy](https://git.cryptech.is/core/rng/avalanche_entropy/about) | [Hardware](https://git.cryptech.is/user/ft/stm32-avalanche-noise/about) and stand-alone PoC |
+| Internal Ring Oscillator | Done | [core/rng/rosc_entropy](https://git.cryptech.is/core/rng/rosc_entropy/about) | |
@@ -93,8 +93,8 @@ Date: 2016-12-15 22:44
| Component | Status | Repository | Comment |
|---|---|---|---|
-| Coretest | Done | [core/comm/coretest](GitRepositories/core/comm/coretest) | Command-response based core tester for HW accelerated core verification. |
-| UART | Done | [core/comm/uart](GitRepositories/core/comm/uart) | Serial interface module used on the TerasIC C5G development board. |
-| I2C | Done | [core/comm/i2c](GitRepositories/core/comm/i2c) | I2C interface module used on the Novena board. |
-| EIM | Done | [core/comm/eim](GitRepositories/core/comm/eim) | Interface for the Freescale EIM memory interface used on the Novena board. |
-| FMC | Done | [core/comm/fmc](GitRepositories/core/comm/fmc) | Interface for the STM32 FMC memory interface used on the dev-bridge and Alpha boards. |
+| Coretest | Done | [core/comm/coretest](https://git.cryptech.is/core/comm/coretest/about) | Command-response based core tester for HW accelerated core verification. |
+| UART | Done | [core/comm/uart](https://git.cryptech.is/core/comm/uart/about) | Serial interface module used on the TerasIC C5G development board. |
+| I2C | Done | [core/comm/i2c](https://git.cryptech.is/core/comm/i2c/about) | I2C interface module used on the Novena board. |
+| EIM | Done | [core/comm/eim](https://git.cryptech.is/core/comm/eim/about) | Interface for the Freescale EIM memory interface used on the Novena board. |
+| FMC | Done | [core/comm/fmc](https://git.cryptech.is/core/comm/fmc/about) | Interface for the STM32 FMC memory interface used on the dev-bridge and Alpha boards. |
diff --git a/pelican/content/DevBridgeBoard.md b/pelican/content/DevBridgeBoard.md
index 8983da8..a9310c9 100644
--- a/pelican/content/DevBridgeBoard.md
+++ b/pelican/content/DevBridgeBoard.md
@@ -42,4 +42,4 @@ you want to avoid scraping them with the bolt head or the nut. I happen to
be using a countersink-head bolt, which is beveled toward the shaft, but
it's probably even better to use a nylon washer.
-All the software, as well as flashing instructions, are at [GitRepositories/sw/stm32]({filename}GitRepositories/sw/stm32.md).
+All the software, as well as flashing instructions, are at [sw/stm32](https://git.cryptech.is/sw/stm32.md).
diff --git a/pelican/content/NoisyDiode.md b/pelican/content/NoisyDiode.md
index d6567fd..2ee3711 100644
--- a/pelican/content/NoisyDiode.md
+++ b/pelican/content/NoisyDiode.md
@@ -29,4 +29,4 @@ The Cryptech project has to date made a couple of different hardware entropy sou
Links:
-[Raspberry-Pi / USB entropy source](GitRepositories/user/ft/stm32-avalanche-noise)
+[Raspberry-Pi / USB entropy source](https://git.cryptech.is/user/ft/stm32-avalanche-noise/about)
diff --git a/pelican/content/UpgradeToKSNG.md b/pelican/content/UpgradeToKSNG.md
index 87288b6..3ed1afb 100644
--- a/pelican/content/UpgradeToKSNG.md
+++ b/pelican/content/UpgradeToKSNG.md
@@ -162,7 +162,7 @@ cryptech> masterkey set
If the above procedure somehow goes horribly wrong and bricks your
alpha, you can still recover, but you'll need an ST-LINK programmer.
-There's some discussion of this at [GitRepositories/sw/stm32]({filename}GitRepositories/sw/stm32.md).
+There's some discussion of this at [sw/stm32](https://git.cryptech.is/sw/stm32.md).
Possible sources for the ST-LINK programmer and a suitable cable: