I hereby claim:
- I am ensingerphilipp on github.
- I am ensi (https://keybase.io/ensi) on keybase.
- I have a public key ASBah2gTaUraxsNIrtV0T368yfrf0exny8VvbW9WOSTSqAo
To claim this, I am signing this object:
package chaCha20Poly1305Encryption; | |
import javax.crypto.*; | |
import javax.crypto.spec.IvParameterSpec; | |
import javax.crypto.spec.SecretKeySpec; | |
import java.security.InvalidAlgorithmParameterException; | |
import java.security.InvalidKeyException; | |
import java.security.NoSuchAlgorithmException; | |
import java.security.spec.AlgorithmParameterSpec; | |
import java.util.Base64; |
import org.bouncycastle.crypto.generators.Argon2BytesGenerator; | |
import org.bouncycastle.crypto.params.Argon2Parameters; | |
import org.bouncycastle.jce.provider.BouncyCastleProvider; | |
import javax.crypto.NoSuchPaddingException; | |
import java.security.NoSuchAlgorithmException; | |
import java.security.SecureRandom; | |
import java.security.Security; | |
import java.util.Base64; |
package ecdsaSignature; | |
import java.security.*; | |
import java.security.spec.ECGenParameterSpec; | |
public class ECDSAKeyGenerator { | |
public static KeyPair generateKeyPair() throws NoSuchAlgorithmException, InvalidAlgorithmParameterException { | |
//It is required to use an epileptic Curve with Security Strength <= Security Strength of the used Hashing Function |
package ecdsaSignature; | |
import java.security.Security; | |
import java.util.Arrays; | |
//Helper Class to print all supported Epileptic Curves for use in ECDSA | |
//Refer to http://safecurves.cr.yp.to for a list of save epileptic curves | |
public class ShowSupportedCurves |
package rsaEncryption; | |
import javax.crypto.BadPaddingException; | |
import javax.crypto.Cipher; | |
import javax.crypto.IllegalBlockSizeException; | |
import javax.crypto.NoSuchPaddingException; | |
import javax.crypto.spec.OAEPParameterSpec; | |
import javax.crypto.spec.PSource; | |
import java.security.*; | |
import java.security.spec.MGF1ParameterSpec; |
package rsaSignature; | |
import java.security.KeyPair; | |
import java.security.KeyPairGenerator; | |
import java.security.NoSuchAlgorithmException; | |
import java.security.SecureRandom; | |
public class RsaKeyGenerator { | |
//Generate RSA Key with size of at least 3072 bits |
I hereby claim:
To claim this, I am signing this object:
#!/usr/bin/env zsh | |
set -e; | |
set +m; # Job control would've been nice, but manual round robin it is, sigh. | |
if [ -z "${ZSH_VERSION+x}" ]; then | |
echo 'Try again with zsh.'; | |
exit 1; | |
fi; |
So, I got bored and decided to do more research into alternates. Turns out you can still abuse it to update to a currently signed Version (15.4.1 as of writing) on iOS versions that don't support alternates. You're welcome.
This requires a jailbreak. Of course, you can do the backup editing stuff if you're not JBed but:
The MIT License (MIT) | |
Copyright (c) 2015 Felix Hummel | |
Permission is hereby granted, free of charge, to any person obtaining a copy of | |
this software and associated documentation files (the "Software"), to deal in | |
the Software without restriction, including without limitation the rights to | |
use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies | |
of the Software, and to permit persons to whom the Software is furnished to do | |
so, subject to the following conditions: |