Skip to content

Commit

Permalink
Noise Explorer v1.0.4
Browse files Browse the repository at this point in the history
  • Loading branch information
nadimkobeissi committed Aug 19, 2023
1 parent ef2cf76 commit ce74d65
Show file tree
Hide file tree
Showing 719 changed files with 12,611 additions and 6,116 deletions.
2 changes: 1 addition & 1 deletion .releaserc
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"branch": "next",
"repositoryUrl": "https://github.com/georgio/noiseexplorer",
"repositoryUrl": "https://github.com/symbolicsoft/noiseexplorer",
"tagFormat": "v${version}",
"plugins": [
[
Expand Down
7 changes: 6 additions & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,8 @@
## Noise Explorer v1.0.4
- Go:
- _fix(go): Do not increment nonce on invalid message (https://github.com/symbolicsoft/noiseexplorer/pull/4)._


## Noise Explorer v1.0.3
- Rust:
- _fix(rust): Updated Rust crate dependencies so that implementations compile automatically again_.
Expand All @@ -7,7 +12,7 @@

- Go:
- _fix(go): Nonces are now 64-bit instead of 32-bit._
- _fix(go): Top-level API now provides an error which can be checked to detect invalid nonce incrementation._
- _fix(go): Top-level API now provides an error which can be checked to detect invalid nonce incrementation.

## Noise Explorer v1.0.2
- Noise Explorer:
Expand Down
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
# [Noise Explorer](https://noiseexplorer.com)
## Version 1.0.3, based on Noise Protocol Revision 34.
## Version 1.0.4, based on Noise Protocol Revision 34.

### Overview
The Noise Explorer command-line tool can parse Noise Handshake Patterns according to the original specification. It can generate cryptographic models for formal verification, including security queries, top-level processes and malicious principals, for testing against an active or passive attacker. Noise Explorer can also generate fully functional discrete implementations for any Noise Handshake Pattern, written in the [Go](https://golang.org) and [Rust](https://www.rust-lang.org) programming languages, as well as [WebAssembly](https://webassembly.org) binaries.
Expand Down
142 changes: 71 additions & 71 deletions html/cmd/index.html
Original file line number Diff line number Diff line change
@@ -1,71 +1,71 @@
<!DOCTYPE html>
<html lang="en">

<head>
<meta charset="utf-8" />
<title>Noise Explorer: Command-Line Tool</title>
<meta name="keywords" content="noise protocol, protocol verification, formal verification, noise protocol framework, symbolic verification" />
<meta name="description" content="Noise Explorer is an online engine for reasoning about Noise Protocol Framework Handshake Patterns. Noise Explorer allows you to design and validate Noise Handshake Patterns, to generate cryptographic models for formal verification and to explore a compendium of formal verification results for the most popular and relevant Noise Handshake Patterns in use today." />
<link rel="image_src" href="https://noiseexplorer.com/res/img/logo.svg" />
<link rel="icon" type="image/png" href="../res/img/logo.svg" />
<link href="../res/css/style.css" rel="stylesheet" />
<link href="../res/css/fonts.css" rel="stylesheet" />
<script></script>
</head>

<body>
<div class="header">
<img id="logo" src="../res/img/logo.svg" alt="" />
<h1>Noise Explorer <span class="beta">beta</span></h1>
</div>
<div class="nav">
<span class="menu">menu</span>
<div class="navLinks">
<a href="..">Design New Pattern</a>
<a href="../patterns">Explore Patterns</a>
<a href="#" class="currentNav">Command-Line Tool</a>
<a href="https://eprint.iacr.org/2018/766">Scientific Paper</a>
</div>
</div>
<div class="results singleColumn">
<div class="resultsExplanation">
<h2>Noise Explorer Command-Line Tool</h2>
<p>The Noise Explorer command-line tool can parse Noise Handshake Patterns according to the original specification. It can generate cryptographic models for formal verification, including security queries, top-level processes and malicious principals, for testing against an active or passive attacker. </p>
<p>Noise Explorer can also render results from the ProVerif output into an elegant and easy to read HTML format: the <a href="../patterns">pattern results</a> that can be explored on this very website were generated using the Noise Explorer command-line tool.</p>
<pre>
$&gt; node noiseExplorer --help
Noise Explorer version 0.3 (specification revision 34)
Noise Explorer has three individual modes: generation, rendering and web interface.

Generation:
--generate=(json|pv|go|rs|wasm): Specify output format.
--pattern=[file]: Specify input pattern file (required).
--attacker=(active|passive): Specify ProVerif attacker type (default: active).

Rendering:
--render: Render results from ProVerif output files into HTML.
--pattern=[file]: Specify input pattern file (required).
--activeModel=[file]: Specify ProVerif active attacker model.
--activeResults=[file]: Specify active results file for --render (required).
--passiveResults=[file]: Specify passive results file for --render (required).

Web interface:
--web=(port): Make Noise Explorer's web interface available at http://localhost:(port) (default: 8000).

Help:
--help: View this help text.
</pre>
<h2>License</h2>
<p>All Noise Explorer software, including this website, is licensed under the <a href="https://www.gnu.org/licenses/gpl-3.0.en.html" target="_blank">GNU General Public License, Version 3</a>.</p>
<h2>Download Noise Explorer for your Computer</h2>
<p>You are welcome to view the Noise Explorer <a href="https://source.symbolic.software/noiseexplorer/noiseexplorer" target="_blank">code repository</a>.</p>
</div>
</div>
<div class="footer">
<span class="about">about</span>
<span>Noise Explorer</span>
<span style="float:right"><a href="https://symbolic.software" target="_blank">Symbolic Software</a> | <a href="http://prosecco.gforge.inria.fr/" target="_blank">INRIA</a></span>
</div>
</body>

</html>
<!DOCTYPE html>
<html lang="en">

<head>
<meta charset="utf-8" />
<title>Noise Explorer: Command-Line Tool</title>
<meta name="keywords" content="noise protocol, protocol verification, formal verification, noise protocol framework, symbolic verification" />
<meta name="description" content="Noise Explorer is an online engine for reasoning about Noise Protocol Framework Handshake Patterns. Noise Explorer allows you to design and validate Noise Handshake Patterns, to generate cryptographic models for formal verification and to explore a compendium of formal verification results for the most popular and relevant Noise Handshake Patterns in use today." />
<link rel="image_src" href="https://noiseexplorer.com/res/img/logo.svg" />
<link rel="icon" type="image/png" href="../res/img/logo.svg" />
<link href="../res/css/style.css" rel="stylesheet" />
<link href="../res/css/fonts.css" rel="stylesheet" />
<script></script>
</head>

<body>
<div class="header">
<img id="logo" src="../res/img/logo.svg" alt="" />
<h1>Noise Explorer <span class="beta">beta</span></h1>
</div>
<div class="nav">
<span class="menu">menu</span>
<div class="navLinks">
<a href="..">Design New Pattern</a>
<a href="../patterns">Explore Patterns</a>
<a href="#" class="currentNav">Command-Line Tool</a>
<a href="https://eprint.iacr.org/2018/766">Scientific Paper</a>
</div>
</div>
<div class="results singleColumn">
<div class="resultsExplanation">
<h2>Noise Explorer Command-Line Tool</h2>
<p>The Noise Explorer command-line tool can parse Noise Handshake Patterns according to the original specification. It can generate cryptographic models for formal verification, including security queries, top-level processes and malicious principals, for testing against an active or passive attacker. </p>
<p>Noise Explorer can also render results from the ProVerif output into an elegant and easy to read HTML format: the <a href="../patterns">pattern results</a> that can be explored on this very website were generated using the Noise Explorer command-line tool.</p>
<pre>
$&gt; node noiseExplorer --help
Noise Explorer version 0.3 (specification revision 34)
Noise Explorer has three individual modes: generation, rendering and web interface.

Generation:
--generate=(json|pv|go|rs|wasm): Specify output format.
--pattern=[file]: Specify input pattern file (required).
--attacker=(active|passive): Specify ProVerif attacker type (default: active).

Rendering:
--render: Render results from ProVerif output files into HTML.
--pattern=[file]: Specify input pattern file (required).
--activeModel=[file]: Specify ProVerif active attacker model.
--activeResults=[file]: Specify active results file for --render (required).
--passiveResults=[file]: Specify passive results file for --render (required).

Web interface:
--web=(port): Make Noise Explorer's web interface available at http://localhost:(port) (default: 8000).

Help:
--help: View this help text.
</pre>
<h2>License</h2>
<p>All Noise Explorer software, including this website, is licensed under the <a href="https://www.gnu.org/licenses/gpl-3.0.en.html" target="_blank">GNU General Public License, Version 3</a>.</p>
<h2>Download Noise Explorer for your Computer</h2>
<p>You are welcome to view the Noise Explorer <a href="https://github.com/symbolicsoft/noiseexplorer" target="_blank">code repository</a>.</p>
</div>
</div>
<div class="footer">
<span class="about">about</span>
<span>Noise Explorer</span>
<span style="float:right"><a href="https://symbolic.software" target="_blank">Symbolic Software</a> | <a href="http://prosecco.gforge.inria.fr/" target="_blank">INRIA</a></span>
</div>
</body>

</html>
Loading

0 comments on commit ce74d65

Please sign in to comment.