Permalink
Commits on Oct 19, 2013
  1. 0.6.3

    committed Oct 19, 2013
  2. Update to latest crypto-api

    Closes #7
    committed Oct 19, 2013
Commits on Aug 12, 2013
  1. erge branch 'pull5'

    * pull5:
      Added test cases for verifying corrupted data.
      Fixed interpretation of (Right False) in rsa/dsa verification.
    committed Aug 12, 2013
Commits on Aug 8, 2013
  1. Better hash function

    No more undefined, more useful use of the available polymorphism.
    committed Aug 8, 2013
  2. Port to the latest crypto-api

    Restrict version numbers on cryptohash as well, because things we rely
    on are deprecated.
    committed Aug 8, 2013
  3. Oops, also for tests.

    committed Aug 8, 2013
Commits on Jan 5, 2013
  1. Get ready for release

    committed Jan 5, 2013
  2. Support all kinds of signatures

    Closes #1
    committed Jan 5, 2013
  3. Decrypt no MDC

    committed Jan 5, 2013
  4. Fix blowfish

    committed Jan 5, 2013
Commits on Jan 3, 2013
  1. cleanup of examples

    committed Jan 3, 2013
  2. swing

    committed Jan 3, 2013
  3. formatting

    committed Jan 3, 2013
Commits on Jan 2, 2013
  1. Blowfish does not crash

    But still does not work
    committed Jan 2, 2013
  2. hlint

    committed Jan 2, 2013
Commits on Dec 31, 2012
  1. Message encryption implemented

    Just Assymetric and just RSA for now.
    Output works with gpg.
    QuickCheck roundtrip test works.
    Always does MDC (this is a feature, not a bug).
    committed Dec 31, 2012
  2. Progress towards decryption

    Generalise the padThenUnpad operation and mkMDC.
    Import code to generate BlockCipher keys, but tweak to do with a
    CryptoRandomGen to purify out the IO.
    committed Dec 31, 2012
  3. Implement MDC checking

    Requires some footwork with the block size in order to get all the bytes
    back out, then just assume the last 22 bytes are an MDC packet (if
    they're not, it's an error anyway) and check.
    committed Dec 31, 2012
Commits on Dec 30, 2012
  1. Implement message decryption

    Only Asymmetric session key encryption is supported.
    Only AES128, AES192, AES256, and Blowfish supported.
    MDC checks are not done yet, but non-MDC packets have not been tested.
    Key decryption is not implemented yet.
    Some of the tooling that will be needed for encryption is in, but this
    is not done yet.
    
    Additionally checking that the session key is the right one may be
    needed in the wildcard case.  Possibly up to actually trying to decrypt
    the message itself.
    
    There is a Util module now.  That reorg should not be in this commit,
    but it is.
    
    A test has been added to check that decryption works at all.
    committed Dec 30, 2012