| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: opmsg | Distribution: openSUSE Tumbleweed |
| Version: 1.78s | Vendor: openSUSE |
| Release: 1.18 | Build date: Sun Dec 20 18:45:06 2020 |
| Group: Productivity/Security | Build host: reproducible |
| Size: 536115 | Source RPM: opmsg-1.78s-1.18.src.rpm |
| Packager: http://bugs.opensuse.org | |
| Url: https://github.com/stealth/opmsg | |
| Summary: File encryption, sign and verify utility | |
opmsg is a replacement for gpg which can encrypt/sign/verify your mails or create/verify detached signatures of local files. Even though the opmsg output looks similar, the concept is entirely different. * Perfect Forward Secrecy (PFS) by means of ECDH or DH Kex. * Native EC or RSA fallback if no (EC)DH keys left. * Signing messages is mandatory. * OTR-like deniable signatures if demanded. * Support for 1:1 key bindings to auto-select source key per destination. * Adds the possibility to (re-)route messages different from mail address to defeat meta data collection. * Key format suitable for easy use with QR codes. * Optional cross-domain ECDH Kex.
GPL-3.0-or-later
* Sun Dec 20 2020 Dirk Müller <dmueller@suse.com>
- update to to 1.78s:
- opmsg: allow to pass --confdir and --burn via opmux to opmsg
- opmsg: add RAND_load_file() return check also in main().
* Mon Nov 13 2017 astieger@suse.com
- opmsg 1.77s:
* opmsg: correct error msg handling for libcrypto error queue
* opmsg: speeding up keystore load by introducing load flags
* opmsg: dont generate Kex keys in null crypto/signing case
* opmsg: allow to selfsign generated personas, so peer can also
- -decrypt it and check sig
* Thu Mar 02 2017 jengelh@inai.de
- Update description
* Thu Feb 23 2017 meissner@suse.com
- updated to 1.75s:
- updated to 1.74s:
- opmsg: only one DH session key
* Tue May 24 2016 astieger@suse.com
- update to 1.70s:
* adding opmux wrapper
* KDF version 2 is default for peers with opmsg >= 1.60
* Wed Dec 09 2015 astieger@suse.com
- update to 1.65s:
* opmsg: implementing deniable personas
* opmsg: allow multiple recipients for encryption/decryption (Cc)
* opmsg: handle mutt calling with multiple recipients (Cc)
* opmsg: more verbose output for Cc messages
* Mon Nov 09 2015 astieger@suse.com
- update to 1.61s:
* opmsg: re-adding RAND_load_file() to gen_dh_key(). Only for
safety (already called inside main) but in case keystore is
used externally.
* Mon Sep 14 2015 astieger@suse.com
- update to 1.60s:
* added native encryption for EC personas, similar to --rsa
override
* dont need to construct EC_GROUP if using
EC_KEY_new_by_curve_name() which obtains all necessary parameters
* adjusting I/O handling for opmsg-stick/ropmsg
* oflush vs. eflush
* some code cleanup and additional error checks
* implementing deniable messages
* generalizing kex key generation (ECDH, DH), adding possibility
to track peer-key usage
* Adding version 2 KDF and making peer-isolation configurable
* Tue Sep 08 2015 astieger@suse.com
- initial package
/usr/bin/opcoin /usr/bin/opmsg /usr/bin/opmux /usr/share/doc/packages/opmsg /usr/share/doc/packages/opmsg/GPL3 /usr/share/doc/packages/opmsg/README.md /usr/share/doc/packages/opmsg/sample.config /usr/share/licenses/opmsg /usr/share/licenses/opmsg/LICENSE
Generated by rpm2html 1.8.1
Fabrice Bellet, Thu Oct 23 22:58:29 2025