- May 16, 2023
-
-
Jean-Paul Calderone authored
We use `isolate` so we know exactly how far we've advanced, we can trivially compute the correct position.
-
- May 15, 2023
-
-
Jean-Paul Calderone authored
-
Jean-Paul Calderone authored
-
Jean-Paul Calderone authored
instead of confusing it with the segment length sometimes, which includes padding bytes
-
Jean-Paul Calderone authored
The trick is that we don't use the IV to initialize CTR mode, we only use it to derive the data encryption key and then use the zero IV to initialize CTR mode. (So is it an IV? Not really I guess.) The failure is due to incorrect handling of padding somewhere so we get extra bytes on the recovered ciphertext/plaintext.
-
- May 13, 2023
-
-
Jean-Paul Calderone authored
It doesn't have an assert but it prints the wrong output
-
Jean-Paul Calderone authored
-
- May 12, 2023
-
-
Jean-Paul Calderone authored
-
Jean-Paul Calderone authored
-
Jean-Paul Calderone authored
-
Jean-Paul Calderone authored
-
Jean-Paul Calderone authored
-
Jean-Paul Calderone authored
-
Jean-Paul Calderone authored
* Add direct tests for signature key serialization/deserialization * Fix the RSA Private Key serializer to use PKCS8 like Tahoe-LAFS expects. * Fix the key generator to emit keys in this format. * Fix the key generator to generate 2048 bit keys. * Fix the derivation functions to make the key values internally consistent.
-
Jean-Paul Calderone authored
-
Jean-Paul Calderone authored
The test suite fails, though.
-
Jean-Paul Calderone authored
This is probably better than pulling in three different crypto libraries for each of the difference pieces we need. It's certainly simpler to figure out how to make the pieces play nicely together since we avoid having multiple kinds of AES128 key defined, multiple types named IV and PublicKey, and even multiple implementations of the same module.
-
Jean-Paul Calderone authored
need to move the key stuff to a new branch and finish it on its own probably
-
- May 11, 2023
-
-
Jean-Paul Calderone authored
-
Jean-Paul Calderone authored
-
Jean-Paul Calderone authored
-
- May 10, 2023
-
-
Jean-Paul Calderone authored
k and N not confusing variable names at all...
-
Jean-Paul Calderone authored
Lots of fields left incorrectly populated but at least the erasure encoding is working so we can probably read (without verification) real shares now.
-
Jean-Paul Calderone authored
-
Jean-Paul Calderone authored
Read Tahoe-LAFS-generated bytes, decode into a Share, re-encoded to the same bytes.
-
- May 09, 2023
-
-
Jean-Paul Calderone authored
-
Jean-Paul Calderone authored
-
Jean-Paul Calderone authored
Just a round-trip-through Binary test for now
-
Jean-Paul Calderone authored
-
Jean-Paul Calderone authored
* We can always interpret the IV so represent it using the IV type instead of as bytes. * We cannot interpret the private key without its decryption key so represent its encrypted form as bytes.
-
- May 08, 2023
-
-
Jean-Paul Calderone authored
Take tahoe-chk as a dependency because it can already represent some of the fields of an SDMF share. Also, a crypto library for key representations. Fix a typo in the cabal file that passed with only a warning before.
-
Jean-Paul Calderone authored
-