Jesper Louis Andersen
3d9cc841eb
v1.2.0
2021-06-15 13:29:58 +02:00
Jesper Louis Andersen
0855ce2f55
Small documentation fixups
2021-06-15 13:03:30 +02:00
Jesper Louis Andersen
87282dc4f8
Fix signatures for final-verify
2021-06-14 17:17:19 +02:00
Jesper Louis Andersen
9bdb1ccf1b
v1.1.1
2020-08-29 18:22:38 +02:00
Jesper Louis Andersen
b2c70ef6a3
v1.1.0
2020-06-09 13:37:05 +02:00
Jesper Louis Andersen
9258d8b6ad
Merge remote-tracking branch 'kuon/patch-2'
2020-06-09 12:11:13 +02:00
Jesper Louis Andersen
5ea33643da
Merge remote-tracking branch 'kuon/patch-1'
2020-06-09 12:08:21 +02:00
Nicolas goy
4775270d76
Basic KDF functions
2020-04-19 19:07:23 +02:00
Nicolas goy
00f895b488
Allow specifying algorithm for pwhash
2020-04-17 14:31:35 +02:00
Nicolas goy
a001404877
Add pwhash_SALTBYTES/0
2020-04-17 13:52:33 +02:00
Jesper Louis Andersen
bde03dc557
Fix a dialyzer warning
2020-03-07 14:21:52 +01:00
Jesper Louis Andersen
061c3dfd65
Mention we have unit tests for secretstream
2020-03-07 12:26:20 +01:00
Alexander Malaev
e32c923822
Add crypto_secretstream_* functions.
2020-03-02 10:28:45 +03:00
Jesper Louis Andersen
220ac6640a
Fixup edoc compilation
2020-02-10 14:24:05 +01:00
Jesper Louis Andersen
218a6db09c
More documentation.
2020-02-10 14:23:28 +01:00
Jesper Louis Andersen
2045ca8e09
Slightly better wording in documentation
2020-02-10 14:21:11 +01:00
Jesper Louis Andersen
8c13fc682e
v1.0.0
2020-02-08 11:39:51 +01:00
Jesper Louis Andersen
cceef4530a
Streamline naming
...
More changes before 1.0 with a
more direct naming scheme.
2020-02-06 13:57:07 +01:00
Jesper Louis Andersen
f580f6525b
Streamline _open style calls
...
Those now return {ok, Msg} or
{error, term()} so you are kind of
forced to match on them. This is
likely to help with correctnes.
2020-02-06 11:48:57 +01:00
Jesper Louis Andersen
7999d08e9d
Streamlining of secret and _verify
...
The secret key API is now streamlined.
Also, all verify-type functions are
now returning boolean() values.
This makes the API consistent.
2020-02-06 11:12:32 +01:00
Jesper Louis Andersen
dea9ce62ed
Rename constant to be in line with libsodium
2020-02-05 13:34:27 +01:00
Jesper Louis Andersen
d06fff489d
QuickCheck for randombytes
...
There are some new randombytes
functions. Implement these as EQC
properties.
2020-02-05 11:16:56 +01:00
Jesper Louis Andersen
c7720e6ab8
Streamline the AEAD API
2020-02-05 10:56:18 +01:00
Jesper Louis Andersen
b637ba307b
Streamline generichash and pwhash
2020-02-04 17:50:56 +01:00
Jesper Louis Andersen
59b94439d1
Decide on an even better API
2020-02-04 14:00:02 +01:00
Jesper Louis Andersen
aa2c69529a
Streamlines generichashThe multi-part hash API is nowreflecting the same crypto modulefunctions in style. This is easierto use for people, I believe.
2020-02-04 13:00:16 +01:00
Jesper Louis Andersen
71832cce4c
Streamline sealed boxes
2020-02-04 12:44:47 +01:00
Jesper Louis Andersen
c791f602e9
Streamline returns in the public key API
2020-02-04 12:38:02 +01:00
Jesper Louis Andersen
e67619a403
Update the naming scheme of AEAD xchacha20...
...
Since this AEAD construction variant is an IETF variant, reflect
this in the names of the functions.
This streamlines the API with the libsodium API.
2020-01-22 19:41:58 +01:00
Jesper Louis Andersen
7f857115bb
Add aead IETF constructions
...
Since the chacha20poly1305 constructions were the IETF variants,
we renamed those so they follow the official library better. While
here, we also fixed the argument order of the files.
2020-01-21 14:16:24 +01:00
Jesper Louis Andersen
bdb4719f6d
Fix AEAD parameter order / naming.
...
The order of parameters were in the wrong order. Make them equal
to the official order of libsodium.
While here, rename NONCEBYTES to NPUBBYTES so it reflects the
underlying names as well.
2020-01-21 13:57:39 +01:00
Jesper Louis Andersen
d850b16d1b
Fix multi-part signatures
...
Remove the signstate wrapper as it is not needed anyore.
2020-01-20 15:52:38 +01:00
Jesper Louis Andersen
d7e83dd569
Track outlen inside the generichash wrapper
2020-01-17 16:24:51 +01:00
Jesper Louis Andersen
f43a730758
Merge branch 'multi-part-signatures' of github.com:hazy/enacl
2020-01-16 15:38:48 +01:00
Jesper Louis Andersen
3f284be0cb
Merge branch 'sign-seed-keypair' of github.com:termoose/enacl
2020-01-16 15:21:50 +01:00
Jesper Louis Andersen
6032b5839d
Provide documentation
2020-01-16 13:47:41 +01:00
Jesper Louis Andersen
e6cb85fb24
Merge branch 'master' of github.com:syfgkjasdkn/enacl
2020-01-16 13:45:31 +01:00
Jesper Louis Andersen
7f8e0a0e07
Merge branch 'xchacha20' of github.com:ECrownofFire/enacl
2020-01-16 13:15:54 +01:00
Jesper Louis Andersen
600020620b
Merge branch 'master' of github.com:ECrownofFire/enacl
2020-01-15 16:11:30 +01:00
Jesper Louis Andersen
97ee4bbdcf
Use randombytes_uint32
...
Better name. Says what you are getting.
2020-01-15 14:05:25 +01:00
Jesper Louis Andersen
f9d6034e84
Implement missing random functions* enacl:randombytes_int32/0* enacl:randombytes_uniform/1
2020-01-15 13:56:00 +01:00
Garry Hill
279c2c32c8
Add support for multi-part signatures
2019-11-20 12:11:21 +00:00
Ole Andre Birkedal
6f4a0c2521
Added bindings for crypto_sign_seed_keypair in libsodium
2019-06-15 14:29:15 +02:00
ECrownofFire
2b183e1974
Add support for aead_xchacha20poly1305
2018-11-25 11:30:34 -05:00
alsdiufgoaiwuegflweuvflasjkdhvlajhsdfg666272727asfgfdsagdlsafg
3442655c5b
add crypto_sign_ed25519_sk_to_pk
2018-11-22 13:04:24 +00:00
ECrownofFire
07bcd87294
Add choice of ops and mem limits to pwhash
2018-10-27 23:23:16 -04:00
ECrownofFire
d779071285
Add choice of ops and mem limits to pwhash_str
...
It natively checks atoms, which is kinda messy, but it avoids having to
export the libsodium pwhash constants, which is nice.
2018-10-27 23:22:55 -04:00
Jesper Louis Andersen
f650c72b02
version bump
2018-05-21 17:52:25 +02:00
Jesper Louis Andersen
bb4014286f
version bump
2018-05-21 17:38:39 +02:00
Jesper Louis Andersen
edd95498d1
Fix pwhash_str* functions.
...
The API for pwhash_str returns a cstring in the output buffer. These
are null terminated. However, we return the full buffer as a binary
back to Erlang. This means that we have a buffer with 0'es in the end.
The tests take this buffer and passes it back in as is. Hence all the
tests pass. However, it is conceivable that if we write said buffer to
disk somewhere, we are not going to write those 0's out.
When we then load the ASCII-armored Argon2 string into memory again,
it is not 0-terminated as a cstring should be, and this produces
errors all over the place.
The fix is twofold:
* Return the full buffer to Erlang, but use binary:split/2 to create a
subbinary with the relevant part.
* Add a 0 in the end of ASCII Argon2 string before passing it to
libsodium
Since we are looking at pwhashing, and Argon2, we expect the
computational problem to be memory bound. Thus, spending a bit more
work in memory is not going to have any considerable impact on the
speed of this system.
2018-05-21 15:21:09 +02:00