Commit Graph

683 Commits

Author SHA1 Message Date
Vincent Hanquez
f3255c2fa0 fix imports on older versions 2016-11-15 15:05:58 +09:00
Vincent Hanquez
7c833eddfd improve description 2016-11-15 15:05:58 +09:00
Vincent Hanquez
60bb2cacb4 [ECC] Improve the code base to allow multiples different implementations
* Use TypeFamilies; need to see what to do for older GHC versions
* Start implementing some API related to ECIES
2016-11-15 15:05:58 +09:00
Kazu Yamamoto
e00c89fb25 adding toByteString and fromByteString to PRK. 2016-11-15 15:04:06 +09:00
Vincent Hanquez
47cb6ebdea Merge pull request #104 from brandonhamilton/master
Correct XSalsa20 initialization when using 8/12 rounds
2016-11-07 14:27:48 +00:00
Brandon Hamilton
bfaf1d324d Correct XSalsa20 initialization when using 8/12 rounds 2016-10-09 22:26:37 +02:00
Vincent Hanquez
ba39567eb6 Merge pull request #103 from brandonhamilton/xsalsa
Implement the XSalsa20 stream cipher
2016-10-09 20:29:29 +01:00
Brandon Hamilton
548cbb6f79 Implement the XSalsa20 stream cipher 2016-10-09 15:25:31 +02:00
Vincent Hanquez
3c087f0f44 bump version to 0.20 2016-09-15 21:22:18 +01:00
Vincent Hanquez
9b64192d0b update CHANGELOG 2016-09-15 21:11:50 +01:00
Vincent Hanquez
15cfb0642b Merge branch 'master' of https://github.com/haskell-crypto/cryptonite 2016-09-15 21:09:16 +01:00
Vincent Hanquez
01892ac494 Merge pull request #102 from ocheron/shamirs-trick
Implement Shamir's trick
2016-09-15 21:08:48 +01:00
Vincent Hanquez
571486be00 don't use rdrand on windows
fix #99
2016-09-15 20:50:55 +01:00
Vincent Hanquez
32e77e6f66 Merge pull request #101 from ocheron/ecc-bitsize-fixes
Fix ECDH/ECDSA when scalar and coordinate bit sizes differ
2016-09-15 20:18:15 +01:00
Olivier Chéron
5630efb5f9 Decreased QuickCheck iterations 2016-09-11 18:37:10 +02:00
Olivier Chéron
ff0c976891 Removed redundant imports 2016-09-10 12:08:34 +02:00
Olivier Chéron
114116f087 Benchmark showing pointAddTwoMuls speed increase 2016-09-10 12:07:41 +02:00
Olivier Chéron
43233cb911 Double-scalar multiplication using Shamir's trick 2016-09-10 12:05:46 +02:00
Olivier Chéron
5854b092a8 Fix ECDH when scalar and coordinate bit sizes differ 2016-09-10 10:26:41 +02:00
Vincent Hanquez
8908af3216 Merge pull request #97 from ocheron/ecdsa-hash-truncation
Fix ECDSA with larger hash size
2016-09-03 03:47:10 +07:00
Olivier Chéron
5d42d817ec Add new hash algorithms to ECDSA tests 2016-08-25 18:13:15 +02:00
Olivier Chéron
75d83d75e7 Prepare utility functions for more hash algorithms 2016-08-25 18:11:57 +02:00
Olivier Chéron
c84230c69a Fixed hash truncation used in ECDSA signature & verification
The function tHash shifted the hash number to an incorrect number of bits
when the bit string had leading zeros.  This is one of two issues reported
in vincenthz/hs-tls#152.
2016-08-24 23:29:55 +02:00
Luke Taylor
6e40fa7010 add missing CHANGELOG entry for 0.18 2016-08-22 13:50:48 +02:00
Vincent Hanquez
f95626dfb5 bump version to 0.19 2016-08-12 07:14:23 +01:00
Vincent Hanquez
de6609d215 update CHANGELOG 2016-08-12 07:14:15 +01:00
Vincent Hanquez
9dac220232 update CHANGELOG 2016-08-12 07:12:18 +01:00
Vincent Hanquez
21c6a8d0a4 Merge branch 'master' of https://github.com/haskell-crypto/cryptonite 2016-08-12 07:08:35 +01:00
Vincent Hanquez
b09d79d6a3 Add CHANGELOG 2016-08-12 06:57:53 +01:00
Vincent Hanquez
39a3a6bbcb Merge pull request #95 from glguy/master
Derive Show instance for CryptoFailable
2016-07-30 11:08:55 +01:00
Vincent Hanquez
d6608ffc6e Merge pull request #85 from yogsototh/master
Example of symmetric encryption in documentation.
2016-07-30 07:10:56 +01:00
Eric Mertens
5b8ae08701 Derive Show instance for CryptoFailable
Fixes #50

The derived instances use precedences to decide when
parentheses are appropriate.
2016-07-28 14:02:36 -07:00
Vincent Hanquez
18a9634bb7 Merge pull request #92 from Bodigrim/number-f2m
Arithmetic over F2m
2016-07-28 20:23:38 +01:00
Luke Taylor
b741ab9ca0 Add .stack-work to .gitignore 2016-07-27 17:45:37 +02:00
Luke Taylor
fb66c35f46 Add a check for salt length in bcrypt function
Raises an error (as the original doc claimed) if the salt is not the
required length of 16 bytes.

validatePasswordEither doesn't require separate checking since the hash
length as a whole is checked, implicitly ensuring the salt is the right
length. Therefore it shouldn't be possible to trigger the error by
calling this function.

Fixes #93.
2016-07-27 17:45:33 +02:00
Bodigrim
2dec05f48b Restore import of <$> 2016-07-24 14:54:22 +02:00
Bodigrim
7e53922f4f Fix pointMul with negative factor on CurveF2m 2016-07-24 13:40:24 +02:00
Bodigrim
b25df69e26 Speed up squaring 3x (now 10% faster than mul) 2016-07-24 11:00:54 +02:00
Bodigrim
66ae77e805 Fix tests and provide documentation for Crypto.Number.F2m 2016-07-24 11:00:54 +02:00
Bodigrim
e80eaa56f3 Tests for Crypto.Number.F2m 2016-07-24 10:58:50 +02:00
Bodigrim
d9758ea799 Benchmarks for Crypto.Number.F2m 2016-07-23 14:15:55 +02:00
Vincent Hanquez
8e0d34ff4d [random] re-use standard instruction 2016-07-11 06:59:12 +01:00
Vincent Hanquez
ad559e02e6 bump version to 0.17 2016-06-14 08:22:31 +01:00
Vincent Hanquez
25663a177b update CHANGELOG 2016-06-14 07:24:30 +01:00
Vincent Hanquez
8c19352e48 [rdrand] add possible workaround for fPIC building 2016-06-14 07:24:08 +01:00
Luke Taylor
de17b66e31 Fix buffer length in scrypt
The temporary XY buffer passed to the scrypt_smix C function should be
256r+64 bytes in length, but the Haskell code was only allocating 256r
bytes, causing the additional 64 to be written past the end of the
buffer.

See #91.
2016-06-13 21:08:06 +01:00
Vincent Hanquez
dc8bb8934c Merge pull request #77 from khibino/mp
Adding miyaguchi-preneel hash construction
2016-06-13 05:57:44 +01:00
Vincent Hanquez
32aec08dbf [rdrand] limit to i686 and x86_64 2016-06-13 05:51:49 +01:00
Kei Hibino
7989dc71b0 fix unpad of zero-padding and add tests. 2016-06-08 22:57:35 +09:00
Kei Hibino
ec7e73401f apply zero-padding to miyaguchi-preneel. 2016-06-08 22:26:14 +09:00