Vincent Hanquez
fd24980530
[ECC] add Bounded instance to CurveName
2016-04-09 13:46:06 +01:00
Vincent Hanquez
605e5cf6a6
Merge branch 'master' of https://github.com/haskell-crypto/cryptonite
2016-04-09 13:45:18 +01:00
Vincent Hanquez
0fa83e32d8
[ECDH][DH] change SharedKey representation to be the usual bytes-like representation
...
Prevent mistake when the serialization is not done properly, for example missing
the padding when necessary.
2016-04-09 13:45:05 +01:00
Vincent Hanquez
e29c8a6fe5
[DH] Keep The field size in bits, in Params
2016-04-09 13:41:40 +01:00
Vincent Hanquez
a73c1b9171
[CMAC] drop the accessor in favor of just using the ByteArrayAccess constraint
2016-04-09 10:31:13 +01:00
Vincent Hanquez
2b0f0dab9c
Merge branch 'master' of https://github.com/haskell-crypto/cryptonite
2016-04-09 08:43:07 +01:00
Vincent Hanquez
d7e26e34ee
[random] add a seed capability with export/import from integer.
...
It decomposes the drgNew call that was gathering entropy then
initializing a ChaChaDRG, into 2 new calls seedNew and drgNewSeed.
drgNew remains unchanged.
The integer importing capability, should be used when wanting to bring
reproducibility to a debugging problem or for testing, otherwise it's
probably a bad idea to use.
2016-04-09 08:33:37 +01:00
Kei Hibino
5d96c804ae
Add infered cipher version.
2016-04-08 16:43:55 +09:00
Kei Hibino
3af88f3145
Add smart constructor of MiyaguchiPreneel hash type.
2016-04-08 16:11:17 +09:00
Kei Hibino
285d9fb433
Specify each chunk type.
2016-04-07 14:43:44 +09:00
Kei Hibino
327d75c2d4
Add comments about irreducible binary polynomial.
2016-04-06 11:59:26 +09:00
Kei Hibino
4442744b1d
Add the smart constructor of CMAC type.
2016-04-06 09:41:50 +09:00
Kei Hibino
5e4b126fc5
Add implementation of MiyaguchiPreneel.
2016-04-03 05:51:07 +09:00
Kei Hibino
ca0c3830eb
Add implementation of CMAC.
2016-04-01 19:25:04 +09:00
Vincent Hanquez
149bfa6010
[HKDF] document a bit better extractSkip
2016-03-29 07:17:24 +01:00
Vincent Hanquez
93fad940e4
Improve context memory usage of Keccak and SHA3
...
saves up to 72 bytes per context for SHA3-512
2016-03-26 10:29:33 +00:00
Vincent Hanquez
f362d50d46
[bcrypt] make the haddock comment reflect what happens to the cost value.
...
also fix a tpyo
2016-02-25 07:48:30 +00:00
Vincent Hanquez
b07a856127
Merge pull request #62 from clinty/dsa-truncate
...
Do DSS truncation on verify
2016-02-11 08:04:32 +00:00
John Galt
a04b56d2a3
Added Ed448-Goldilocks support
2016-02-09 01:22:55 -07:00
Vincent Hanquez
d80a499582
removed bounded names for useless parameter
2016-02-04 07:28:42 +00:00
Clint Adams
4c6b774a3d
Do DSS truncation on verify
...
RFC 4880 and FIPS 186-4 require that DSA signatures truncate the
hash to the size of q. This changes Crypto.PubKey.DSA.verify
to do so in all cases.
2016-01-10 17:05:37 -05:00
Luke Taylor
f2e5942246
Add totpVerify function
...
Also adds a ClockSkew type which limits the acceptable clock skew window
to a limited number of time steps.
2016-01-10 18:19:53 +00:00
Vincent Hanquez
50631d3150
Add support for blake2s(p) 224 bits
2016-01-09 10:09:35 +00:00
Vincent Hanquez
99049cc66e
Merge pull request #53 from kinoru/master
...
[ChaChaPoly1305] fix type error of example code
2016-01-05 17:49:58 +00:00
Luke Taylor
0be97fc5ca
Add hash parameter to hotp function
...
While HOTP only mentions SHA1, TOTP allows the use of different hash
functions, which implicitly requires that the HOTP implementation support
them too.
This will also allow users to use HOTP with another hash if they so choose,
though it would not be compatible with most client applications, such as
Google authenticator.
2016-01-04 19:04:38 +00:00
Luke Taylor
47d202a90f
Add TOTParams data type
...
Reduce the arguments to the totp function (most people will use defaults)
and allows validation of the time step value.
Added a top-level module overview.
2015-12-28 17:23:26 +00:00
Vincent Hanquez
43890b1175
Add support for HKDF (RFC 5869)
2015-12-28 14:32:07 +00:00
Luke Taylor
88a2cd80f6
Add TOTP function and KATs
...
Just uses SHA1 for now. HashAlgorithm is ignored.
2015-12-27 19:13:22 +00:00
Luke Taylor
48f0598cc7
Make OTP resynch values a tuple
...
This is clearer than having two separate arguments.
2015-12-27 18:43:00 +00:00
Luke Taylor
c5b3622562
Add an OTP resynchronize function
...
Allows server to reset its counter to the client's current value, given
a sequence of one or more OTP values.
2015-12-20 23:33:52 +00:00
Luke Taylor
476f7c10d5
One-time password (OTP) implementation
...
Initial commit
- Implementation of HOTP algorithm as defined in RFC 4226
- Tests using values from the spec
2015-12-20 23:04:14 +00:00
John Galt
26976b1583
[blake2] Added reference implementation
...
This commit allows the user to select either the portable reference
implementation or the optimized (SSE) implementation.
2015-12-16 07:49:30 -06:00
kinoru
5a2809a0f8
[ChaChaPoly1305] fix type error of example code
...
The example code had a type mismatch.
Couldn't match expected type ‘State’
with actual type ‘CryptoFailable State’
In the second argument of ‘appendAAD’, namely ‘st1’
In the second argument of ‘($)’, namely ‘appendAAD hdr st1’
This is due to the following part:
let st1 = ChaChaPoly1305.initialize key nonce
st2 = ChaChaPoly1305.finalizeAAD $ ChaChaPoly1305.appendAAD hdr st1
`initialize` returns `CryptoFailable State`, not `State`.
This commit fixes the type mismatch, changes the return type of the
example function to `CryptoFailable ByteString`, and makes the code
to be immediately copy-and-paste-able.
2015-12-03 18:05:04 +00:00
Maciej Pietrzak
6020bde0e2
Add support_blake2 flag.
2015-11-30 22:17:21 +01:00
Vincent Hanquez
812b5d1aed
[blake2] uncapitalize the modules and types as it's not abbreviation.
2015-11-19 14:24:54 +00:00
Vincent Hanquez
fae5f084cf
[Blake2] define the algorithm as a multiple algorithm so that the output digest size is explicit in the digest types.
2015-11-19 12:10:14 +00:00
Vincent Hanquez
69f9d225eb
[hash] trim hash algorithm with multiple output size.
...
The output size is now passed by parameter to the finalize function
instead of being stored in the context. that simplify quite a
bit the passing of this parameter
2015-11-19 11:52:21 +00:00
Vincent Hanquez
ad285be68c
[Hash] tweak internal C API to have the hashlen
2015-11-19 11:37:38 +00:00
Vincent Hanquez
2785a50228
Merge pull request #42 from Rufflewind/master
...
Document the arguments for DH.generateParams
2015-11-18 21:51:53 +00:00
Vincent Hanquez
6ae67d5c91
Merge pull request #46 from centromere/nonce-fix
...
Fix endianness of incrementNonce function for ChaChaPoly1305
2015-11-18 16:52:27 +00:00
Vincent Hanquez
093f1af8e4
Merge pull request #41 from kinoru/master
...
Fix typo: Kekkak -> Keccak
2015-11-18 15:38:19 +00:00
John Galt
53270f1ef6
Removed unused language extension
2015-11-16 13:13:18 -05:00
John Galt
320186cdd1
Fix endianness of incrementNonce function for ChaChaPoly1305
2015-11-16 12:59:01 -05:00
John Galt
880dfae098
Added BLAKE2 support
2015-11-12 12:33:20 -05:00
Vincent Hanquez
da2f445690
[Poly1305] fix size of Authentication tag creation from Bytestring
2015-11-06 22:00:49 +00:00
Vincent Hanquez
d47ae454d5
[Poly1305] Add a way to create AuthTag from ByteArray.
2015-11-05 15:02:50 +00:00
Vincent Hanquez
7928198923
[doc] Add missing documentation call
2015-11-04 15:18:05 +00:00
Vincent Hanquez
7bd3a8f892
[ChaChaPoly1305] Document everything
2015-11-04 15:17:32 +00:00
Phil Ruffwind
fba0565d78
Document the arguments for DH.generateParams
...
Also fix the formatting in the docs of Serialize.i2ospOf
2015-11-03 20:20:53 +08:00
Vincent Hanquez
2191dddf5b
[Curve25519] use the Crypto.Error api instead of an Either type for parsing types
2015-11-02 11:17:19 +00:00
kinoru
558c21491e
Fix typo: Kekkak -> Keccak
...
The SHA-3 winning algorithm's name is Keccak (pronounced "catch-ack"),
not Kekkak.
- <http://keccak.noekeon.org/ >
- <http://www.nist.gov/itl/csd/sha-100212.cfm >
- <https://en.wikipedia.org/wiki/SHA-3 >
2015-10-27 14:56:42 +00:00
John Galt
55c6988a6e
Added support for incrementing Nonces
2015-10-05 14:08:08 -04:00
Vincent Hanquez
c94df41f02
[ECC] fix compilation of missing numBits
2015-09-22 17:48:43 +01:00
Vincent Hanquez
b63dc38c49
[ECC] add generate for ECC generic's scalar and point Base Multiplication helper.
2015-09-22 17:23:22 +01:00
Vincent Hanquez
08a8155f12
[P256] add function to generate a new scalar, and to get the base point.
2015-09-22 17:22:13 +01:00
Vincent Hanquez
9a1f06e3e8
[ECC] add curveSizeBits
2015-09-22 17:21:35 +01:00
Luke Taylor
6d33b66245
BCrypt module doc updates
...
- Add doctest style example usage
- List most relevant functions
- Reformat comments
- Minor corrections and additions
2015-09-01 15:22:58 +01:00
Vincent Hanquez
71fe77da68
[endianess] fix some issues on non supported arches
2015-08-28 17:10:27 +01:00
Joachim Breitner
507a8f8cea
Use mkLE, not LE
...
to make sure the conversion to little endian is actually happening. This
fixes a test failure in ChaChaPoly1305. Fixes #31 .
2015-08-27 14:52:37 +02:00
Vincent Hanquez
ea8cb2d45a
[blowfish] remove unnecessary list of word32 for the schedule
...
Just use the binary's array directly
2015-08-27 10:57:28 +01:00
Luke Taylor
f346c46243
Add BCrypt module doc and a validatePasswordEither fn
2015-08-26 10:33:36 +01:00
Luke Taylor
39d5eb13fe
Add bcrypt password hashing and validation API
2015-08-26 10:33:36 +01:00
Luke Taylor
2566e46185
Implement the eksBlowfish function
...
This modifies the standard blowfish key schedule function to accept an
optional salt and cost as used in bcrypt and modifies the algorithm
accordingly to implement the "expensive" version.
The standard blowfish version is just the same but with a salt value of
zero and a single call to the expandKey function. See the original
bcrypt paper for more details.
2015-08-26 10:33:35 +01:00
Luke Taylor
08ebde2f09
Modify creation of Blowfish key schedule
...
Changes to create it from an array of Word32, instead of using
mutableArray32FromAddrBE, which seems to reverse the words.
2015-08-26 10:33:35 +01:00
Vincent Hanquez
cd8f70e062
[Padding] add PKCS5/PKCS7 padding/unpadding methods
2015-08-18 12:03:05 +01:00
Vincent Hanquez
4653f36d19
[Poly1305] add NFData for Tag.
2015-07-30 14:40:35 +01:00
Vincent Hanquez
ead424f793
[Scrypt] reduce line size of comment
2015-07-29 10:03:43 +01:00
Vincent Hanquez
8a0bacfc6d
[Poly1305] make initialize explicitely failable
2015-07-29 09:49:49 +01:00
Vincent Hanquez
4af8185d65
add new MAC key error
2015-07-29 09:45:51 +01:00
Vincent Hanquez
e064af5cba
[chachapoly1305] properly handle the decryption, and change combine to encrypt.
2015-07-29 07:24:46 +01:00
Vincent Hanquez
ce849fb0d2
[ChaChaPoly1305] add implementation and simple KAT test
2015-07-19 17:53:56 +01:00
Vincent Hanquez
5dab0190ac
[Poly1305] Rename Ctx to State
2015-07-19 17:51:46 +01:00
Vincent Hanquez
ce043f49a1
[AES] fix wrongly indented comment
2015-07-19 17:51:00 +01:00
Andrey Sverdlichenko
4581a737d7
Use non-blocking IO with /dev/random.
...
Do not wait for data to appear from /dev/random, otherwise server is blocked
for a few seconds if there is no entropy left.
2015-06-29 07:32:42 +00:00
Vincent Hanquez
b37ee01636
[random] add a System "DRG"
2015-06-20 15:51:42 +01:00
Vincent Hanquez
25526e24a1
Merge branch 'hashdescr'
2015-06-19 11:06:11 +01:00
Vincent Hanquez
0b6b2d661c
[Random] allow drgNew to be run in any MonadRandom directly.
...
this allow cascading, create a DRG from another DRG
2015-06-19 11:05:54 +01:00
Vincent Hanquez
0d2290a4a1
[RSA] allow data to be passed as is, instead of hashed
2015-06-19 11:04:37 +01:00
Vincent Hanquez
39cf449ba7
add some missing instance of HashAlgorithmASN1
2015-06-19 11:04:17 +01:00
Tobias Florek
ff36164305
copy withRandomBytes from crypto-random
2015-06-12 20:52:15 +02:00
Vincent Hanquez
a9df2a2180
[RSA] remove hashdescr in favor of just specifying the algorithm directly
...
The extra information is embedded in the HashAlgorithmASN1 class
that allow a digest to ASN1 structured.
2015-06-10 12:27:37 +01:00
Vincent Hanquez
0900f3b1b0
Merge pull request #9 from tekul/aescleanup
...
Remove unused AES primitives functions and exports
2015-06-09 15:17:51 +01:00
Vincent Hanquez
fb4006b41a
Merge branch 'master' of https://github.com/vincenthz/cryptonite
2015-06-09 14:39:33 +01:00
Vincent Hanquez
35bad8c241
[hash] properly display Digest just like cryptohash.
...
fix #8
2015-06-09 14:35:23 +01:00
Luke Taylor
875b80107c
Remove unused AES primitives functions and exports
...
The code for initializing different AEAD modes is now encapsulated in
the BlockCipher type and the individual mode encryption and decryption
functions have been replaced by generalized versions, so are no longer
used.
2015-06-09 11:45:39 +02:00
Luke Taylor
4e1437d4fd
Minor haddock fixes
...
Fix some incorrect parameter descriptions and spelling/typos.
2015-06-07 13:26:26 +02:00
Vincent Hanquez
7301c719bf
[P256] use ScrubbedBytes for Scalar
2015-06-02 14:22:48 +01:00
Vincent Hanquez
be75de64e1
[aes] fast track length == 0 with ECB encryption/decryption
2015-06-02 14:22:26 +01:00
Vincent Hanquez
daff858fe1
[number] cleanup in serialization
2015-06-01 13:03:21 +01:00
Vincent Hanquez
453e9a6f35
[number] internal serialize, unconditionally zero the buffer.
2015-06-01 13:02:53 +01:00
Vincent Hanquez
6028e95805
[number] cleanup
2015-06-01 11:50:24 +01:00
Vincent Hanquez
f63a3c6025
[p256] fix all the bugs found by the now useful P256 test suite
2015-06-01 07:48:31 +01:00
Vincent Hanquez
d873564c54
[number] split the serialization to support a more bit banging direct approach
2015-06-01 05:59:54 +01:00
Vincent Hanquez
e9c812e4fd
[error] make CryptoFailable an instance of Show and Eq if possible
2015-06-01 05:59:25 +01:00
Vincent Hanquez
4edb580cda
[P256] add warning for non constant time operation
2015-05-30 10:38:59 +01:00
Vincent Hanquez
78fa0c3650
[P256] implement missing function, and remove un-implementable one.
...
remove temporary removal, and properly fixes #1
2015-05-29 15:47:25 +01:00
Vincent Hanquez
ac67e0d8fb
Merge branch 'master' of https://github.com/vincenthz/cryptonite
2015-05-26 22:09:49 +01:00
Vincent Hanquez
e413290d8f
[p256] temporary remove missing functions. fix #1
2015-05-26 22:09:12 +01:00
Nicolas DI PRIMA
57c814f20b
add Ord instance on Digest
2015-05-26 19:10:26 +01:00
Vincent Hanquez
73c5d2145e
[random] fix entropy modules on windows 64 bits.
2015-05-25 07:44:15 +01:00
Vincent Hanquez
0e048b77c4
[number] correct tweak function to mask things properly
2015-05-23 17:09:07 +01:00
Vincent Hanquez
e14d9cafc9
[number] add debugging in case of error
2015-05-23 16:28:50 +01:00
Vincent Hanquez
bc4a55ff74
[number] further cleanup random generation
2015-05-23 13:44:26 +01:00
Vincent Hanquez
c0e50547ad
[number] remove the need for a random generator for testing primality
...
a DRG is implicitely created when calling the non gmp primality test
2015-05-23 12:55:29 +01:00
Vincent Hanquez
ed48246740
[random] Just export the type of MonadPseudoRandom
2015-05-23 12:30:52 +01:00
Vincent Hanquez
23b5146f0f
[number] remove unnecessary random number generator
2015-05-23 12:02:05 +01:00
Vincent Hanquez
2153e5690f
[number] generate number with bounds more effectively
2015-05-23 11:59:10 +01:00
Vincent Hanquez
ca2ec5a03d
[random] export MonadPseudoRandom
2015-05-23 11:58:36 +01:00
Vincent Hanquez
05e0e1a587
[number] add helpers to get bits size ond bytes size
...
the later is already available as 'lengthBytes' in Serialize module
2015-05-23 09:16:36 +01:00
Vincent Hanquez
cddac096cd
[number] rename generate into generateParams
2015-05-23 09:15:42 +01:00
Vincent Hanquez
27dacbfb21
add gmpSizeInBits
2015-05-23 09:15:15 +01:00
Vincent Hanquez
efedb38570
[number] add a new routine to generate random number
2015-05-22 21:36:13 +01:00
Vincent Hanquez
a0009bf713
[hash] remove redundant module
2015-05-22 18:43:35 +01:00
Vincent Hanquez
8eaaa06e1e
add optional support for deepseq
2015-05-22 18:35:46 +01:00
Vincent Hanquez
02956f9ef0
[KDF] move PBKDF2 and Scrypt to not be pinned to ByteString
2015-05-22 15:19:42 +01:00
Vincent Hanquez
1dacb7fa94
[Salsa] opaquify the state just like for hash functions
...
add more tests
2015-05-22 14:04:54 +01:00
Vincent Hanquez
9a69c61e84
[ChaCha] opaquify the state to be handled directly in the C level just like the hash function
...
increase the number of tests
2015-05-22 14:04:27 +01:00
Vincent Hanquez
5d85834264
remove unnecessary extension
2015-05-21 14:51:23 +01:00
Vincent Hanquez
16839d3a43
[number] remove the ByteString from generation of high bits
2015-05-21 14:48:26 +01:00
Vincent Hanquez
7f11a66d50
[DSA] re-align imports
2015-05-21 14:46:45 +01:00
Vincent Hanquez
28958a6d03
[RSA] remove ByteString from Primitive module
2015-05-21 14:32:53 +01:00
Vincent Hanquez
c111dfeb8e
[pubkey] remove bytestring from MaskGenFunction
2015-05-21 11:09:48 +01:00
Vincent Hanquez
ff736b47ca
[cipher] use mconcat that force input to be the same as output
2015-05-21 11:06:41 +01:00
Vincent Hanquez
c7de32a6f6
[RSA] remove the need for bytestring in HashDescr and work towards more removal
2015-05-21 09:46:13 +01:00
Vincent Hanquez
8065c26c2d
remove dangerous OverloadedStrings
2015-05-21 06:45:46 +01:00
Vincent Hanquez
dc34ce8289
[RSA] properly indent modules imports
2015-05-21 06:35:19 +01:00
Vincent Hanquez
4758df2c3a
[entropy] missing CPP extension for windows entropy gather module
2015-05-21 05:28:50 +01:00
3noch
9c1d9695c5
support windows 64 bits
2015-05-20 09:11:33 +01:00
Vincent Hanquez
881d167cb5
more fixing up description and comments
2015-05-20 06:22:00 +01:00
Vincent Hanquez
92343f856a
add comments and description
2015-05-20 06:07:31 +01:00
Vincent Hanquez
393b159d5f
[hash] add haddock documentation
2015-05-19 11:51:18 +01:00
Vincent Hanquez
9794e2132b
[hash] replace scrub by reset
...
reset make more sense as it leave the mutable context in a state where
it can be re-used by further update, whereas scrub doesn't.
2015-05-19 11:50:56 +01:00
Vincent Hanquez
987f9e7bb6
[internal] update to latest memory, and remove builtin support as memory is now available
2015-05-18 18:33:14 +01:00
Vincent Hanquez
c5f9ab2d35
[internal] update memory to latest
2015-05-14 10:04:16 +01:00
Vincent Hanquez
26ec954a48
[Cipher] fix salsa and chacha related to chunking
2015-05-12 14:36:50 +01:00
Vincent Hanquez
fdf735d4e2
[PubKey] move ElGamal to use HashAlgorithm and ByteArrayAccess.
2015-05-12 07:01:20 +01:00
Vincent Hanquez
5d2b417854
[pubkey] make DSA and ECDSA ByteString free
2015-05-11 14:18:49 +01:00
Vincent Hanquez
d035e3a3bc
[number] properly handle gmp
2015-05-11 11:39:09 +01:00
Vincent Hanquez
b3ebf3f3b8
[number] fix import
2015-05-11 10:07:15 +01:00
Vincent Hanquez
eaad39a1af
remove need for bytearray to marshall Word8s into a Word64
2015-05-11 10:04:56 +01:00
Vincent Hanquez
30b7b6412a
align module imports
2015-05-11 09:34:26 +01:00
Vincent Hanquez
761574a65f
[internal] remove old cryptohash modules
2015-05-11 09:34:01 +01:00
Vincent Hanquez
9567fa2526
[number] almost rewrite all serialization to be faster and less depends on random versions
2015-05-11 09:28:48 +01:00
Vincent Hanquez
228f1ab938
[number] further push the compat cleanup
2015-05-11 07:32:13 +01:00
Vincent Hanquez
8c07305deb
[number] fix compat with a missing do.
2015-05-11 07:31:52 +01:00
Vincent Hanquez
ee3e5e69bf
[number] move some number primitive to use compat without CPP
2015-05-11 07:11:38 +01:00
Vincent Hanquez
03fe63b05a
[number] further remove gcde_binary
2015-05-11 07:10:52 +01:00
Vincent Hanquez
4bcf193a12
[number] further remove gcde_binary
2015-05-11 07:10:38 +01:00
Vincent Hanquez
47afc1720d
[number] remove gcde_binary
2015-05-11 07:10:15 +01:00
Vincent Hanquez
5c0daae88c
[number] add simple combinator
2015-05-11 07:09:44 +01:00
Vincent Hanquez
427541064d
[number] add further gmp optional compat
2015-05-11 07:09:30 +01:00
Vincent Hanquez
ed8fbe8f69
[Number] add module to cleanup CPP around
2015-05-10 15:27:52 +01:00
Vincent Hanquez
9ae9e38ce2
move to memory stuff
2015-05-09 14:23:32 +01:00
Vincent Hanquez
ac16029f07
[internal] update convert4To32 to prevent an issue on ghc 7.0 and 7.4
2015-05-07 13:54:05 +01:00
Vincent Hanquez
d18900c2e0
[internal] random little changes to keep faster toHex from cryptohash as compiled code for later use
2015-05-06 11:39:46 +01:00
Vincent Hanquez
e89031c6d6
make AuthTag be a Bytes instead of ByteString
2015-05-06 11:39:07 +01:00
Vincent Hanquez
81e335cfff
[HASH] re-enable SHA512t
2015-05-06 07:53:51 +01:00
Vincent Hanquez
6ba517e945
[DES] remove DES.Serialization module
2015-05-06 07:52:49 +01:00
Vincent Hanquez
df3c3523a4
[P256] add a point_add function
2015-05-04 06:56:27 +01:00
Vincent Hanquez
aa790db088
[P256] add more bindings
2015-05-03 20:36:00 +01:00
Vincent Hanquez
ad34f0e1e8
use mod after add/sub
2015-05-03 20:15:26 +01:00
Vincent Hanquez
1f30911e1c
[P256] define the n/p/b constants
2015-05-03 20:14:54 +01:00
Vincent Hanquez
c360e77148
[P256] properly define some bindings with X and Y types
2015-05-03 20:14:10 +01:00
Vincent Hanquez
ea875e5c88
[P256] define pointMul
2015-05-03 19:52:00 +01:00
Vincent Hanquez
25c303602d
[P256] add comment to `toPoint'
2015-05-03 19:51:21 +01:00
Vincent Hanquez
f09bbf55e3
[Chacha/Salsa] cleanup nonce handling and use bufXor
2015-05-03 14:58:59 +01:00
Vincent Hanquez
cd42b2765b
[HMAC] use SecureBytes instead of ByteString for between context
2015-05-03 14:51:13 +01:00
Vincent Hanquez
c751fd1a6b
[QA] fix import
2015-05-03 14:48:40 +01:00
Vincent Hanquez
dfe3a9af93
[QA] fix module imports
2015-05-03 14:48:26 +01:00
Vincent Hanquez
87777784c1
[QA] fix issues from HSE so that it parse files
2015-05-03 14:47:16 +01:00
Vincent Hanquez
937b5d08dd
[scrypt] cleanup module / extensiotn
2015-05-03 14:31:14 +01:00
Vincent Hanquez
28a4fa1503
remove unnecessary CPP
2015-05-03 14:31:07 +01:00
Vincent Hanquez
b4d1a278b3
[QA] remove unnecessary module, and allow on more module to use CPP
2015-05-03 08:43:32 +01:00
Vincent Hanquez
c23ddb2eaa
[PBKDF2] make the code more friendly to a future mutable PRF.
...
Prevent doing B.take . B.concat by allocating only once the output buffer
2015-05-03 08:17:03 +01:00
Vincent Hanquez
c1ed30b20e
[DSA] fix badly written constraint (found by QA)
2015-05-02 15:46:07 +01:00
Vincent Hanquez
4cde4f9311
[scrypt] remove the need for byteable by using the more generic bytearray
2015-05-02 15:44:33 +01:00
Vincent Hanquez
c5189a03c6
[hash] remove unnecessary import
2015-05-02 15:44:09 +01:00
Vincent Hanquez
da784070f7
[hash] remove some warnings
2015-05-02 15:44:01 +01:00
Vincent Hanquez
1267500318
[P256] improve bindings, still work in progress.
2015-05-02 14:50:11 +01:00
Vincent Hanquez
771007ad93
[cipher] Get rid of bytestring in Stream class.
2015-05-02 14:49:49 +01:00
Vincent Hanquez
119b111b82
fix old build by importing ByteString module to get OverloadedString instance
2015-05-02 14:49:14 +01:00
Vincent Hanquez
cd0b2bfe64
[internal] fix build by making primitive binding stricter as required by older ghc
2015-05-02 08:10:07 +01:00
Vincent Hanquez
d7a88da726
[Curve25519] fix build and get rid of bytestring by using direct addr# "string"
2015-05-02 07:59:42 +01:00
Vincent Hanquez
cc26ce8ce4
fix hexadecimal string generation to be hopefully (much) safer.
2015-05-02 05:40:14 +01:00
Vincent Hanquez
b4adeec6d8
remove digestToHex
2015-05-01 07:40:28 +01:00
Vincent Hanquez
5d3e825f2e
remove / comment stuff
2015-05-01 07:36:28 +01:00
Vincent Hanquez
db7c3bbb4f
[hash] massive overhaul of the hash interface
...
use the typeclass for the lowest IO impure C bindings definitions,
and define the pure interface as generic on top of this.
At the same time define an Hash.IO interface to allow mutable manipulations
of hash contextes when necessary.
Use HashAlgorithm instead of HashFunction in the [PubKey] sections
Tweak the HMAC, PBKDF2 functions to be more efficient and use the new interface
2015-04-30 06:18:07 +01:00
Vincent Hanquez
12ddffe4df
[Internal] add a function to convert bytearray and apply a hexadecimal transformation
2015-04-30 06:15:06 +01:00
Vincent Hanquez
a3b444e36f
[Internal] Add buffer function to xor with a specific value
2015-04-30 06:13:14 +01:00
Vincent Hanquez
84c05617a3
[internal] add a way to convert bytearray to hexadecimal bytearray
2015-04-30 06:08:21 +01:00
Vincent Hanquez
b497737ef1
[Salsa] use more ByteArray operations instead of bytestring.
2015-04-30 06:07:25 +01:00
Vincent Hanquez
87e2862eaa
remove stale file
2015-04-28 11:39:23 +01:00
Vincent Hanquez
1c8d966d71
[Hash] remove unnecessary modules and not used template
2015-04-28 11:37:42 +01:00
Vincent Hanquez
4e12aceee9
remove extra bytestring.
2015-04-24 17:22:25 +01:00
Vincent Hanquez
9dd17fc0c4
use byte array in more places
2015-04-24 17:22:13 +01:00
Vincent Hanquez
6722a02a74
move lowlevel implementation of hashes to byteArrays
2015-04-24 13:30:58 +01:00
Vincent Hanquez
ec4e0c4ed9
remove all the byteArray prefix from byteArray function.
...
instead expect module import to be qualified for functions.
2015-04-24 06:54:33 +01:00
Vincent Hanquez
e52a75af75
add P256 work in progress binding
2015-04-22 10:15:23 +01:00
Vincent Hanquez
0424d67616
[Curve25519] convert to Bytearray
2015-04-22 06:26:06 +01:00
Vincent Hanquez
c06edc9591
add a byteArrayConvert which copy and returns potentially a different output type
2015-04-22 06:25:33 +01:00
Vincent Hanquez
26006dfe25
[cleanup] remove useless import now that bytearray is exporting necessary bits
2015-04-22 06:25:01 +01:00
Vincent Hanquez
7cd2d2b701
[cleanup] replace imports
2015-04-22 06:24:12 +01:00
Vincent Hanquez
61ee498643
remove further deprecated modules and such
2015-04-20 10:56:39 +01:00
Vincent Hanquez
b487aef898
cleanup module imports
2015-04-20 07:36:51 +01:00
Vincent Hanquez
f86b493e32
remove warnings
2015-04-20 06:02:12 +01:00
Vincent Hanquez
d7c8835068
Merge branch 'ed25519'
2015-04-19 09:25:00 +01:00
Vincent Hanquez
0aaa6a9e9a
[Ed25519] Add haskell bindings and tests
2015-04-19 09:24:37 +01:00
Vincent Hanquez
655d8b9c33
[Error] Add new public key error values
2015-04-19 09:24:21 +01:00
Vincent Hanquez
6e79d33e9f
[Internal] Improve Bytes
...
define Show and Eq instances, and add bytesIndex
2015-04-19 09:23:34 +01:00
Vincent Hanquez
3713c585fe
[Internal] add a utility to dump byte array in hexadecimal
2015-04-19 09:22:41 +01:00
Vincent Hanquez
be42fec6e5
[Internal] properly define ByteArrayCopy functions to only requires ByteArrayAccess from the source
2015-04-19 09:21:48 +01:00
Vincent Hanquez
da52607d41
[internal] make some binding stricter
2015-04-19 06:16:31 +01:00
Vincent Hanquez
b28b25abe7
[AES] add gcm / ocb support to base AES type
2015-04-18 07:58:52 +01:00
Vincent Hanquez
0e9d52de95
[Cipher] remove the need for bytestring in Block
2015-04-18 06:58:57 +01:00
Vincent Hanquez
d230fc662a
[AES] properly define AES128/192/256 variants.
2015-04-18 06:58:41 +01:00
Vincent Hanquez
7c138b9d9f
[AES] export AEAD modes (GCM/OCB)
2015-04-18 06:58:10 +01:00
Vincent Hanquez
8cc58e626b
[AEAD] remove AEADState wrapper
2015-04-18 06:57:40 +01:00
Vincent Hanquez
08732c0939
[AEAD] change interface to be less classy (!)
2015-04-18 06:57:18 +01:00
Vincent Hanquez
f686733fc6
[Blowfish] Stop using ecb{Encrypt,Decrypt}Legacy stop gap call.
2015-04-18 06:55:17 +01:00
Vincent Hanquez
d4213ca731
[Internal] Expose first and second over the whole codebase
2015-04-18 06:53:23 +01:00
Vincent Hanquez
38b7f6ad73
[Internal] Add a function to create a initialized to 0 bytearray
2015-04-18 06:52:57 +01:00
Vincent Hanquez
09365a745f
[Internal] add a function to set buffer's bytes (i.e. memset)
2015-04-18 06:52:27 +01:00
Vincent Hanquez
dc1215dbd7
[AES] repair genCounter
2015-04-15 11:25:44 +01:00
Vincent Hanquez
cd216f5ee9
[internal] add some new function to copy and alloc + ret
2015-04-15 11:24:23 +01:00
Vincent Hanquez
3adfa4ab2a
rename module properly
2015-04-15 11:24:02 +01:00
Vincent Hanquez
c9a70b649f
[AES] properly split lowlevel from highlevel
2015-04-13 10:31:46 +01:00
Vincent Hanquez
d7186b9a59
wip AES merging
2015-04-13 10:15:55 +01:00
Vincent Hanquez
af0b1ece4d
[internal] add documentation and finish implementing various combinator for CryptoFailable
2015-04-12 08:18:00 +01:00
Vincent Hanquez
224b34eb2c
[cipher] re-enable XTS code
2015-04-12 08:05:52 +01:00
Vincent Hanquez
d6f2f7c1c0
[Cipher] make xtsGFMul work on arbitrary ByteArray
2015-04-12 06:50:54 +01:00
Vincent Hanquez
796bbef3c2
[DES] remove unnecessary imports
2015-04-11 16:03:42 +01:00
Vincent Hanquez
26fdfcf563
[Blowfish] use the key directly without stretching it all over the memory
2015-04-11 16:02:45 +01:00
Vincent Hanquez
4247520e91
[Internal] add a way to index bytestring
2015-04-11 16:02:31 +01:00
Vincent Hanquez
b76a2c135a
[DES] fix compat that don't have an instance of Bits for Bool
2015-04-11 08:45:04 +01:00
Vincent Hanquez
b08c7a223c
Merge branch 'cipher-framework'
2015-04-11 08:28:01 +01:00
Vincent Hanquez
8655eb0468
[Internal] move all primitives stuff in CompatPrim
2015-04-11 08:26:30 +01:00
Vincent Hanquez
6dcba8d8cd
[Internal] properly handle big endian architecture
...
add a CompatPrim module to handle all the primitive compatibility needed,
instead of putting all in Compat.
2015-04-11 08:23:52 +01:00
Vincent Hanquez
d1554b36a6
[Blowfish] remove use of vectors operation in favor of mutableArray and array
2015-04-11 08:03:33 +01:00
Vincent Hanquez
7b597581c2
[Internal] add new methods for mutableArray32
2015-04-11 08:02:54 +01:00
Vincent Hanquez
c075ae354d
[Blowfish] Remove unnecessary imports
2015-04-11 07:20:17 +01:00
Vincent Hanquez
a2fb62ffd8
[Blowfish] put all the boxes together so we don't need to concat them
...
also create the vector in one place when mixing with the key
2015-04-11 07:18:40 +01:00
Vincent Hanquez
51cdd1bcd8
[Internal] add write Xor for mutable array
2015-04-11 07:17:49 +01:00
Vincent Hanquez
b191ef461c
rewrite blowfish core to mostly generate its key schedule in one allocation.
2015-04-11 07:00:21 +01:00
Vincent Hanquez
e0e0d8dafd
add mutable array methods
2015-04-11 06:59:41 +01:00
Vincent Hanquez
b6f70d5314
massively rewrite the core to be more optimised
2015-04-10 14:03:28 +01:00
Vincent Hanquez
a1c21f130c
move core to map over Word64 view of a byte array directly.
...
this bring a massive speedup and adapt the core blowfish encryption and
decryption to work on any bytearray without creating a bytestring.
2015-04-10 10:43:14 +01:00
Vincent Hanquez
3b966c0995
move boxes to their own private module
2015-04-10 10:42:10 +01:00
Vincent Hanquez
bb331f94f8
remove vector from camellia
2015-04-10 09:26:37 +01:00
Vincent Hanquez
0c3a57f573
[Internal] actually initialize the array to n, not to 0.
2015-04-10 09:26:17 +01:00
Vincent Hanquez
f470196f41
replace Vector creation by an already packed Addr#
2015-04-10 08:43:42 +01:00