secretsharing 0.3 → 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/.coco.yml +6 -0
- data/.gitignore +18 -0
- data/.rubocop.yml +29 -0
- data/.travis.yml +16 -0
- data/CHANGES +17 -0
- data/Gemfile +4 -0
- data/LICENSE.txt +202 -0
- data/README.md +286 -0
- data/Rakefile +12 -0
- data/SIGNED.md +99 -0
- data/bin/secretsharing +111 -0
- data/gemfiles/Gemfile.ci +7 -0
- data/lib/secretsharing.rb +25 -0
- data/lib/secretsharing/shamir.rb +91 -293
- data/lib/secretsharing/shamir/container.rb +93 -0
- data/lib/secretsharing/shamir/secret.rb +123 -0
- data/lib/secretsharing/shamir/share.rb +156 -0
- data/lib/secretsharing/version.rb +20 -0
- data/secretsharing.gemspec +47 -0
- data/spec/shamir_container_spec.rb +373 -0
- data/spec/shamir_secret_spec.rb +208 -0
- data/spec/shamir_share_spec.rb +59 -0
- data/spec/shamir_spec.rb +35 -0
- data/spec/spec_helper.rb +33 -0
- metadata +204 -57
- data/README +0 -67
- data/test/test_shamir.rb +0 -161
@@ -0,0 +1,208 @@
|
|
1
|
+
# -*- encoding: utf-8 -*-
|
2
|
+
|
3
|
+
# Copyright 2011-2015 Glenn Rempe
|
4
|
+
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
|
9
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
require File.expand_path('../spec_helper', __FILE__)
|
18
|
+
|
19
|
+
describe SecretSharing::Shamir::Secret do
|
20
|
+
|
21
|
+
describe 'initialization' do
|
22
|
+
|
23
|
+
before do
|
24
|
+
@num = OpenSSL::BN.new('1234567890')
|
25
|
+
@s = SecretSharing::Shamir::Secret.new(:secret => @num)
|
26
|
+
end
|
27
|
+
|
28
|
+
it 'must return the correct max secret bitlength constant value' do
|
29
|
+
SecretSharing::Shamir::Secret::MAX_BITLENGTH.must_equal(4096)
|
30
|
+
end
|
31
|
+
|
32
|
+
it 'must respond to #secret' do
|
33
|
+
@s.respond_to?(:secret).must_equal(true)
|
34
|
+
end
|
35
|
+
|
36
|
+
it 'must respond to #bitlength' do
|
37
|
+
@s.respond_to?(:bitlength).must_equal(true)
|
38
|
+
end
|
39
|
+
|
40
|
+
it 'must respond to #valid_hmac?' do
|
41
|
+
@s.respond_to?(:valid_hmac?).must_equal(true)
|
42
|
+
end
|
43
|
+
|
44
|
+
it 'must initialize with a random secret and set @secret and @bitlength by default' do
|
45
|
+
@s.secret.is_a?(OpenSSL::BN).must_equal(true)
|
46
|
+
@s.bitlength.is_a?(Integer).must_equal(true)
|
47
|
+
end
|
48
|
+
|
49
|
+
it 'must raise an ArgumentError if an Integer instead of an OpenSSL::BN is provided to the constructor' do
|
50
|
+
lambda { SecretSharing::Shamir::Secret.new(:secret => 1_234_567_890) }.must_raise(ArgumentError)
|
51
|
+
end
|
52
|
+
|
53
|
+
it 'must raise an ArgumentError if the bitlength of the secret is greater than MAX_BITLENGTH' do
|
54
|
+
# 1234 * 1's is 4097 num_bits
|
55
|
+
lambda { SecretSharing::Shamir::Secret.new(:secret => OpenSSL::BN.new("#{'1' * 1234}")) }.must_raise(ArgumentError)
|
56
|
+
end
|
57
|
+
|
58
|
+
it 'must initialize with a fixed secret and set @secret and @bitlength to the same if passed an OpenSSL::BN' do
|
59
|
+
@s.secret.is_a?(OpenSSL::BN).must_equal(true)
|
60
|
+
@s.secret.must_equal(@num)
|
61
|
+
@s.bitlength.is_a?(Integer).must_equal(true)
|
62
|
+
@s.bitlength.must_equal(@num.num_bits)
|
63
|
+
end
|
64
|
+
|
65
|
+
it 'must throw an exception if initialized with a String that does not base64 re-hydrate as expected from the output of #to_s' do
|
66
|
+
lambda { SecretSharing::Shamir::Secret.new(:secret => 'foo') }.must_raise(ArgumentError)
|
67
|
+
end
|
68
|
+
|
69
|
+
it 'must throw an exception if initialized with a String that contains \n on platform that is not true for Base64.respond_to?(:urlsafe_encode64)' do
|
70
|
+
Base64.stub(:respond_to?, false) do
|
71
|
+
lambda { SecretSharing::Shamir::Secret.new(:secret => 'foo\nbar') }.must_raise(ArgumentError)
|
72
|
+
end
|
73
|
+
end
|
74
|
+
|
75
|
+
it 'must use Base64.decode64 instead of Base64.urlsafe_decode64 on platform that is not true for Base64.respond_to?(:urlsafe_encode64)' do
|
76
|
+
Base64.stub(:respond_to?, false) do
|
77
|
+
num = OpenSSL::BN.new('1234567890123456789012345678901234567890')
|
78
|
+
s1 = SecretSharing::Shamir::Secret.new(:secret => num)
|
79
|
+
s1_str = s1.to_s
|
80
|
+
s1_str.must_equal('MWl6aWJqZjR6dmRibXZxNjZkNndtOGcxY2k=')
|
81
|
+
|
82
|
+
# Re-hydrate a new Secret object from the previously de-hydrated String
|
83
|
+
s2 = SecretSharing::Shamir::Secret.new(:secret => s1_str)
|
84
|
+
s2.must_equal(s1)
|
85
|
+
end
|
86
|
+
end
|
87
|
+
|
88
|
+
it 'must decode to the SAME String on mixed platforms that are, or are not, truthy for Base64.respond_to?(:urlsafe_decode64)' do
|
89
|
+
|
90
|
+
# NOTE : OpenSSL::BN.new('1234567890123456789012345678901234567890')
|
91
|
+
str = 'MWl6aWJqZjR6dmRibXZxNjZkNndtOGcxY2k='
|
92
|
+
s2 = nil
|
93
|
+
s3 = nil
|
94
|
+
|
95
|
+
s1 = SecretSharing::Shamir::Secret.new(:secret => str)
|
96
|
+
s1_str = s1.to_s
|
97
|
+
s1_str.must_equal(str)
|
98
|
+
|
99
|
+
Base64.stub(:respond_to?, false) do
|
100
|
+
s2 = SecretSharing::Shamir::Secret.new(:secret => str)
|
101
|
+
s2_str = s2.to_s
|
102
|
+
s2_str.must_equal(str)
|
103
|
+
end
|
104
|
+
|
105
|
+
Base64.stub(:respond_to?, false) do
|
106
|
+
s3 = SecretSharing::Shamir::Secret.new(:secret => str)
|
107
|
+
s3_str = s3.to_s
|
108
|
+
s3_str.must_equal(str)
|
109
|
+
end
|
110
|
+
|
111
|
+
s1.must_equal(s2)
|
112
|
+
s1.must_equal(s3)
|
113
|
+
end
|
114
|
+
|
115
|
+
it 'must throw an ArgumentError if an unknown option hash key is passed in' do
|
116
|
+
lambda { SecretSharing::Shamir::Secret.new(:secret => 'foo\nbar', :unknown_arg => true) }.must_raise(ArgumentError)
|
117
|
+
end
|
118
|
+
|
119
|
+
end # describe initialization
|
120
|
+
|
121
|
+
describe '==' do
|
122
|
+
|
123
|
+
before do
|
124
|
+
@num = OpenSSL::BN.new('1234567890')
|
125
|
+
@s = SecretSharing::Shamir::Secret.new(:secret => @num)
|
126
|
+
end
|
127
|
+
|
128
|
+
it 'must return true if two secrets have the same OpenSSL::BN set internally' do
|
129
|
+
s2 = @s
|
130
|
+
(@s == s2).must_equal(true)
|
131
|
+
end
|
132
|
+
|
133
|
+
it 'must return false if two secrets have different OpenSSL::BN set internally' do
|
134
|
+
s2 = SecretSharing::Shamir::Secret.new(:secret => OpenSSL::BN.new('987654321'))
|
135
|
+
(@s == s2).must_equal(false)
|
136
|
+
end
|
137
|
+
end
|
138
|
+
|
139
|
+
describe 'secret?' do
|
140
|
+
before do
|
141
|
+
@num = OpenSSL::BN.new('1234567890')
|
142
|
+
@s = SecretSharing::Shamir::Secret.new(:secret => @num)
|
143
|
+
end
|
144
|
+
|
145
|
+
it 'must return true if a secret is set' do
|
146
|
+
@s.secret.is_a?(OpenSSL::BN).must_equal(true)
|
147
|
+
@s.secret?.must_equal(true)
|
148
|
+
end
|
149
|
+
|
150
|
+
it 'must return false if a secret is not set' do
|
151
|
+
@s.secret = nil
|
152
|
+
@s.secret?.must_equal(false)
|
153
|
+
end
|
154
|
+
end
|
155
|
+
|
156
|
+
describe 'secret()' do
|
157
|
+
before do
|
158
|
+
@num = OpenSSL::BN.new('1234567890')
|
159
|
+
@s = SecretSharing::Shamir::Secret.new(:secret => @num)
|
160
|
+
end
|
161
|
+
|
162
|
+
it 'must return true if a secret is set' do
|
163
|
+
@s.secret.is_a?(OpenSSL::BN).must_equal(true)
|
164
|
+
@s.secret?.must_equal(true)
|
165
|
+
end
|
166
|
+
|
167
|
+
it 'must return false if a secret is not set' do
|
168
|
+
@s.secret = nil
|
169
|
+
@s.secret?.must_equal(false)
|
170
|
+
end
|
171
|
+
end
|
172
|
+
|
173
|
+
describe 'to_s' do
|
174
|
+
it 'must return a proper and consistent URL safe encoded String representation of @secret and allow round trip of that String' do
|
175
|
+
num = OpenSSL::BN.new('1234567890123456789012345678901234567890')
|
176
|
+
s1 = SecretSharing::Shamir::Secret.new(:secret => num)
|
177
|
+
s1_str = s1.to_s
|
178
|
+
s1_str.must_equal('MWl6aWJqZjR6dmRibXZxNjZkNndtOGcxY2k=')
|
179
|
+
|
180
|
+
# Re-hydrate a new Secret object from the previously de-hydrated String
|
181
|
+
s2 = SecretSharing::Shamir::Secret.new(:secret => s1_str)
|
182
|
+
s2.must_equal(s1)
|
183
|
+
end
|
184
|
+
end
|
185
|
+
|
186
|
+
describe 'valid_hmac?' do
|
187
|
+
before do
|
188
|
+
@num = OpenSSL::BN.new('1234567890')
|
189
|
+
@s = SecretSharing::Shamir::Secret.new(:secret => @num)
|
190
|
+
end
|
191
|
+
|
192
|
+
it 'must return true if a a valid HMAC based on the secret is set' do
|
193
|
+
@s.valid_hmac?.must_equal(true)
|
194
|
+
end
|
195
|
+
|
196
|
+
it 'must return false if a secret is not set' do
|
197
|
+
@s.secret = nil
|
198
|
+
@s.valid_hmac?.must_equal(false)
|
199
|
+
end
|
200
|
+
|
201
|
+
it 'must return false if the HMAC was tampered with at all' do
|
202
|
+
@s.hmac = @s.hmac + 'a'
|
203
|
+
@s.valid_hmac?.must_equal(false)
|
204
|
+
end
|
205
|
+
|
206
|
+
end
|
207
|
+
|
208
|
+
end # describe SecretSharing::Shamir::Secret
|
@@ -0,0 +1,59 @@
|
|
1
|
+
# -*- encoding: utf-8 -*-
|
2
|
+
|
3
|
+
# Copyright 2011-2015 Glenn Rempe
|
4
|
+
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
|
9
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
require File.expand_path('../spec_helper', __FILE__)
|
18
|
+
|
19
|
+
describe SecretSharing::Shamir::Share do
|
20
|
+
|
21
|
+
describe 'initialization' do
|
22
|
+
|
23
|
+
before do
|
24
|
+
@args = { :hmac => 'foo', :k => 3, :n => 4, :x => 1, :y => 1, :prime => 1, :prime_bitlength => 1 }
|
25
|
+
end
|
26
|
+
|
27
|
+
it 'will raise when instantiated with no args' do
|
28
|
+
lambda { SecretSharing::Shamir::Share.new }.must_raise(ArgumentError)
|
29
|
+
end
|
30
|
+
|
31
|
+
it 'will raise if an unknown option hash key is passed in' do
|
32
|
+
lambda { SecretSharing::Shamir::Share.new(@args.merge(:foo => 'bar')) }.must_raise(ArgumentError)
|
33
|
+
end
|
34
|
+
|
35
|
+
it 'will raise when instantiated with missing args' do
|
36
|
+
lambda { SecretSharing::Shamir::Share.new(@args.merge(:version => nil)) }.must_raise(ArgumentError)
|
37
|
+
lambda { SecretSharing::Shamir::Share.new(@args.merge(:hmac => nil)) }.must_raise(ArgumentError)
|
38
|
+
lambda { SecretSharing::Shamir::Share.new(@args.merge(:k => nil)) }.must_raise(ArgumentError)
|
39
|
+
lambda { SecretSharing::Shamir::Share.new(@args.merge(:n => nil)) }.must_raise(ArgumentError)
|
40
|
+
lambda { SecretSharing::Shamir::Share.new(@args.merge(:x => nil)) }.must_raise(ArgumentError)
|
41
|
+
lambda { SecretSharing::Shamir::Share.new(@args.merge(:y => nil)) }.must_raise(ArgumentError)
|
42
|
+
lambda { SecretSharing::Shamir::Share.new(@args.merge(:prime => nil)) }.must_raise(ArgumentError)
|
43
|
+
lambda { SecretSharing::Shamir::Share.new(@args.merge(:prime_bitlength => nil)) }.must_raise(ArgumentError)
|
44
|
+
end
|
45
|
+
|
46
|
+
it 'will be instantiated when provided with complete args' do
|
47
|
+
@s = SecretSharing::Shamir::Share.new(:hmac => 'foo', :k => 3, :n => 4, :x => 1, :y => 1, :prime => 1, :prime_bitlength => 1)
|
48
|
+
@s.must_be_kind_of(SecretSharing::Shamir::Share)
|
49
|
+
end
|
50
|
+
|
51
|
+
it 'must be able to be compared directly to another share (==)' do
|
52
|
+
@s1 = SecretSharing::Shamir::Share.new(:hmac => 'foo', :k => 3, :n => 4, :x => 1, :y => 1, :prime => 1, :prime_bitlength => 1)
|
53
|
+
@s2 = SecretSharing::Shamir::Share.new(:hmac => 'foo', :k => 3, :n => 4, :x => 1, :y => 1, :prime => 1, :prime_bitlength => 1)
|
54
|
+
@s1.must_equal(@s2)
|
55
|
+
end
|
56
|
+
|
57
|
+
end
|
58
|
+
|
59
|
+
end
|
data/spec/shamir_spec.rb
ADDED
@@ -0,0 +1,35 @@
|
|
1
|
+
# -*- encoding: utf-8 -*-
|
2
|
+
|
3
|
+
# Copyright 2011-2015 Glenn Rempe
|
4
|
+
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
|
9
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
require File.expand_path('../spec_helper', __FILE__)
|
18
|
+
|
19
|
+
|
20
|
+
describe SecretSharing::Shamir do
|
21
|
+
|
22
|
+
describe 'usafe_encode64 and usafe_decode64' do
|
23
|
+
|
24
|
+
include SecretSharing::Shamir
|
25
|
+
|
26
|
+
it 'will encode and decode back to the original String' do
|
27
|
+
str = MultiJson.dump(:foo => 'bar', :bar => 12_345_678_748_390_743_789)
|
28
|
+
enc = usafe_encode64(str)
|
29
|
+
dec = usafe_decode64(enc)
|
30
|
+
dec.must_equal(str)
|
31
|
+
end
|
32
|
+
|
33
|
+
end
|
34
|
+
|
35
|
+
end
|
data/spec/spec_helper.rb
ADDED
@@ -0,0 +1,33 @@
|
|
1
|
+
# -*- encoding: utf-8 -*-
|
2
|
+
|
3
|
+
# Copyright 2011-2015 Glenn Rempe
|
4
|
+
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
|
9
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
require 'rubygems'
|
18
|
+
require 'bundler'
|
19
|
+
Bundler.setup
|
20
|
+
|
21
|
+
# code coverage
|
22
|
+
begin
|
23
|
+
require 'coco'
|
24
|
+
rescue LoadError
|
25
|
+
# Don't blow up if coco isn't available.
|
26
|
+
# It won't install on MRI Ruby < 1.9.2 or
|
27
|
+
# other platforms. It is not installed
|
28
|
+
# in the Travis CI build environment.
|
29
|
+
end
|
30
|
+
|
31
|
+
require File.expand_path('../../lib/secretsharing', __FILE__)
|
32
|
+
require 'minitest/autorun'
|
33
|
+
require 'mocha/setup'
|
metadata
CHANGED
@@ -1,74 +1,221 @@
|
|
1
|
-
--- !ruby/object:Gem::Specification
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
2
|
name: secretsharing
|
3
|
-
version: !ruby/object:Gem::Version
|
4
|
-
|
5
|
-
prerelease: false
|
6
|
-
segments:
|
7
|
-
- 0
|
8
|
-
- 3
|
9
|
-
version: "0.3"
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
version: 1.0.0
|
10
5
|
platform: ruby
|
11
|
-
authors:
|
6
|
+
authors:
|
12
7
|
- Alexander Klink
|
8
|
+
- Glenn Rempe
|
13
9
|
autorequire:
|
14
10
|
bindir: bin
|
15
11
|
cert_chain: []
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
|
20
|
-
|
12
|
+
date: 2015-01-13 00:00:00.000000000 Z
|
13
|
+
dependencies:
|
14
|
+
- !ruby/object:Gem::Dependency
|
15
|
+
name: highline
|
16
|
+
requirement: !ruby/object:Gem::Requirement
|
17
|
+
requirements:
|
18
|
+
- - "~>"
|
19
|
+
- !ruby/object:Gem::Version
|
20
|
+
version: '1.6'
|
21
|
+
type: :runtime
|
22
|
+
prerelease: false
|
23
|
+
version_requirements: !ruby/object:Gem::Requirement
|
24
|
+
requirements:
|
25
|
+
- - "~>"
|
26
|
+
- !ruby/object:Gem::Version
|
27
|
+
version: '1.6'
|
28
|
+
- !ruby/object:Gem::Dependency
|
29
|
+
name: multi_json
|
30
|
+
requirement: !ruby/object:Gem::Requirement
|
31
|
+
requirements:
|
32
|
+
- - "~>"
|
33
|
+
- !ruby/object:Gem::Version
|
34
|
+
version: '1.10'
|
35
|
+
type: :runtime
|
36
|
+
prerelease: false
|
37
|
+
version_requirements: !ruby/object:Gem::Requirement
|
38
|
+
requirements:
|
39
|
+
- - "~>"
|
40
|
+
- !ruby/object:Gem::Version
|
41
|
+
version: '1.10'
|
42
|
+
- !ruby/object:Gem::Dependency
|
43
|
+
name: mocha
|
44
|
+
requirement: !ruby/object:Gem::Requirement
|
45
|
+
requirements:
|
46
|
+
- - ">="
|
47
|
+
- !ruby/object:Gem::Version
|
48
|
+
version: '0'
|
49
|
+
type: :development
|
50
|
+
prerelease: false
|
51
|
+
version_requirements: !ruby/object:Gem::Requirement
|
52
|
+
requirements:
|
53
|
+
- - ">="
|
54
|
+
- !ruby/object:Gem::Version
|
55
|
+
version: '0'
|
56
|
+
- !ruby/object:Gem::Dependency
|
57
|
+
name: minitest
|
58
|
+
requirement: !ruby/object:Gem::Requirement
|
59
|
+
requirements:
|
60
|
+
- - ">="
|
61
|
+
- !ruby/object:Gem::Version
|
62
|
+
version: '0'
|
63
|
+
type: :development
|
64
|
+
prerelease: false
|
65
|
+
version_requirements: !ruby/object:Gem::Requirement
|
66
|
+
requirements:
|
67
|
+
- - ">="
|
68
|
+
- !ruby/object:Gem::Version
|
69
|
+
version: '0'
|
70
|
+
- !ruby/object:Gem::Dependency
|
71
|
+
name: coco
|
72
|
+
requirement: !ruby/object:Gem::Requirement
|
73
|
+
requirements:
|
74
|
+
- - ">="
|
75
|
+
- !ruby/object:Gem::Version
|
76
|
+
version: '0'
|
77
|
+
type: :development
|
78
|
+
prerelease: false
|
79
|
+
version_requirements: !ruby/object:Gem::Requirement
|
80
|
+
requirements:
|
81
|
+
- - ">="
|
82
|
+
- !ruby/object:Gem::Version
|
83
|
+
version: '0'
|
84
|
+
- !ruby/object:Gem::Dependency
|
85
|
+
name: rb-fsevent
|
86
|
+
requirement: !ruby/object:Gem::Requirement
|
87
|
+
requirements:
|
88
|
+
- - ">="
|
89
|
+
- !ruby/object:Gem::Version
|
90
|
+
version: '0'
|
91
|
+
type: :development
|
92
|
+
prerelease: false
|
93
|
+
version_requirements: !ruby/object:Gem::Requirement
|
94
|
+
requirements:
|
95
|
+
- - ">="
|
96
|
+
- !ruby/object:Gem::Version
|
97
|
+
version: '0'
|
98
|
+
- !ruby/object:Gem::Dependency
|
99
|
+
name: rerun
|
100
|
+
requirement: !ruby/object:Gem::Requirement
|
101
|
+
requirements:
|
102
|
+
- - ">="
|
103
|
+
- !ruby/object:Gem::Version
|
104
|
+
version: '0'
|
105
|
+
type: :development
|
106
|
+
prerelease: false
|
107
|
+
version_requirements: !ruby/object:Gem::Requirement
|
108
|
+
requirements:
|
109
|
+
- - ">="
|
110
|
+
- !ruby/object:Gem::Version
|
111
|
+
version: '0'
|
112
|
+
- !ruby/object:Gem::Dependency
|
113
|
+
name: rubocop
|
114
|
+
requirement: !ruby/object:Gem::Requirement
|
115
|
+
requirements:
|
116
|
+
- - ">="
|
117
|
+
- !ruby/object:Gem::Version
|
118
|
+
version: '0'
|
119
|
+
type: :development
|
120
|
+
prerelease: false
|
121
|
+
version_requirements: !ruby/object:Gem::Requirement
|
122
|
+
requirements:
|
123
|
+
- - ">="
|
124
|
+
- !ruby/object:Gem::Version
|
125
|
+
version: '0'
|
126
|
+
- !ruby/object:Gem::Dependency
|
127
|
+
name: bundler
|
128
|
+
requirement: !ruby/object:Gem::Requirement
|
129
|
+
requirements:
|
130
|
+
- - "~>"
|
131
|
+
- !ruby/object:Gem::Version
|
132
|
+
version: '1.7'
|
133
|
+
type: :development
|
134
|
+
prerelease: false
|
135
|
+
version_requirements: !ruby/object:Gem::Requirement
|
136
|
+
requirements:
|
137
|
+
- - "~>"
|
138
|
+
- !ruby/object:Gem::Version
|
139
|
+
version: '1.7'
|
140
|
+
- !ruby/object:Gem::Dependency
|
141
|
+
name: rake
|
142
|
+
requirement: !ruby/object:Gem::Requirement
|
143
|
+
requirements:
|
144
|
+
- - "~>"
|
145
|
+
- !ruby/object:Gem::Version
|
146
|
+
version: '10.4'
|
147
|
+
type: :development
|
148
|
+
prerelease: false
|
149
|
+
version_requirements: !ruby/object:Gem::Requirement
|
150
|
+
requirements:
|
151
|
+
- - "~>"
|
152
|
+
- !ruby/object:Gem::Version
|
153
|
+
version: '10.4'
|
21
154
|
description: |
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
email:
|
28
|
-
|
29
|
-
|
155
|
+
Shamir's Secret Sharing is an algorithm in cryptography. It is a
|
156
|
+
form of secret sharing, where a secret is divided into parts,
|
157
|
+
giving each participant its own unique part, where some of the
|
158
|
+
parts or all of them are needed in order to reconstruct the
|
159
|
+
secret. Holders of a share gain no knowledge of the larger secret.
|
160
|
+
email:
|
161
|
+
- glenn@rempe.us
|
162
|
+
executables:
|
163
|
+
- secretsharing
|
30
164
|
extensions: []
|
31
|
-
|
32
|
-
|
33
|
-
|
34
|
-
|
165
|
+
extra_rdoc_files:
|
166
|
+
- README.md
|
167
|
+
files:
|
168
|
+
- ".coco.yml"
|
169
|
+
- ".gitignore"
|
170
|
+
- ".rubocop.yml"
|
171
|
+
- ".travis.yml"
|
172
|
+
- CHANGES
|
173
|
+
- Gemfile
|
174
|
+
- LICENSE.txt
|
175
|
+
- README.md
|
176
|
+
- Rakefile
|
177
|
+
- SIGNED.md
|
178
|
+
- bin/secretsharing
|
179
|
+
- gemfiles/Gemfile.ci
|
35
180
|
- lib/secretsharing.rb
|
36
181
|
- lib/secretsharing/shamir.rb
|
37
|
-
-
|
38
|
-
-
|
39
|
-
|
40
|
-
|
41
|
-
|
42
|
-
|
182
|
+
- lib/secretsharing/shamir/container.rb
|
183
|
+
- lib/secretsharing/shamir/secret.rb
|
184
|
+
- lib/secretsharing/shamir/share.rb
|
185
|
+
- lib/secretsharing/version.rb
|
186
|
+
- secretsharing.gemspec
|
187
|
+
- spec/shamir_container_spec.rb
|
188
|
+
- spec/shamir_secret_spec.rb
|
189
|
+
- spec/shamir_share_spec.rb
|
190
|
+
- spec/shamir_spec.rb
|
191
|
+
- spec/spec_helper.rb
|
192
|
+
homepage: https://github.com/grempe/secretsharing
|
193
|
+
licenses:
|
194
|
+
- APACHE 2.0
|
195
|
+
metadata: {}
|
43
196
|
post_install_message:
|
44
197
|
rdoc_options: []
|
45
|
-
|
46
|
-
require_paths:
|
198
|
+
require_paths:
|
47
199
|
- lib
|
48
|
-
required_ruby_version: !ruby/object:Gem::Requirement
|
49
|
-
|
50
|
-
requirements:
|
200
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
201
|
+
requirements:
|
51
202
|
- - ">="
|
52
|
-
- !ruby/object:Gem::Version
|
53
|
-
|
54
|
-
|
55
|
-
|
56
|
-
version: "0"
|
57
|
-
required_rubygems_version: !ruby/object:Gem::Requirement
|
58
|
-
none: false
|
59
|
-
requirements:
|
203
|
+
- !ruby/object:Gem::Version
|
204
|
+
version: '0'
|
205
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
206
|
+
requirements:
|
60
207
|
- - ">="
|
61
|
-
- !ruby/object:Gem::Version
|
62
|
-
|
63
|
-
segments:
|
64
|
-
- 0
|
65
|
-
version: "0"
|
208
|
+
- !ruby/object:Gem::Version
|
209
|
+
version: '0'
|
66
210
|
requirements: []
|
67
|
-
|
68
|
-
|
69
|
-
rubygems_version: 1.3.7
|
211
|
+
rubyforge_project: secretsharing
|
212
|
+
rubygems_version: 2.4.5
|
70
213
|
signing_key:
|
71
|
-
specification_version:
|
72
|
-
summary: A
|
73
|
-
test_files:
|
74
|
-
-
|
214
|
+
specification_version: 4
|
215
|
+
summary: A Ruby Gem to enable sharing secrets using Shamirs Secret Sharing.
|
216
|
+
test_files:
|
217
|
+
- spec/shamir_container_spec.rb
|
218
|
+
- spec/shamir_secret_spec.rb
|
219
|
+
- spec/shamir_share_spec.rb
|
220
|
+
- spec/shamir_spec.rb
|
221
|
+
- spec/spec_helper.rb
|