Releases: rageworx/libendetool
Releases · rageworx/libendetool
v1.1.3.6-non-lzmat
Changes
- Fixed memory issues
- Prevent wrong cipher source leads unexpected errors
- Prevent expose current keys in memory even used reset() method in AES context.
- Supporting variable key length types each 128, 192 and 256 bits.
- Changed maximum key length to 32 bytes ( 64 bytes was meaningless )
v1.1.3.6
Changes
- Fixed memory issues
- Prevent wrong cipher source leads unexpected errors
- Prevent exposed LZMA compressed data header in binary data
- Prevent expose current keys in memory even used reset() method in AES context.
- Supporting variable key length types each 128, 192 and 256 bits.
- Changed maximum key length to 32 bytes ( 64 bytes was meaningless )
Version 1.0.3.3
Bug fixed
- encode, decode binary failure fixed.
version 1.0.3.0
Bug & Enhancements
- Original size should be hided, it may encrypted with source data.
- Fixed 1 byte over allocating memory issue.
- endecmd now read file as binary, and should wirte it to file too.
WARNING:
- This library no longer compatible with previous encrypted data by storing original size.
Version 1.0.2.3
Fixed encode, decode binary cannot store or handles original binary size.
Version 1.0.2.0
libendetool version 1.0.2.0
- fixed a bug on encodebinary() when buffer size modulates by zero.
Version 1.0.0.0
libendetool version 1.0.
tested all platforms for a long time.
Version 0.5 for AES-256-ECB
This is Vulnerable version by AES-256-ECB.
Released at 2014 with prototype of AES-256-ECB.
About AES-256-ECB vulnerability, see this wiki.
https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation