The crypto-api package

[Tags: bsd3, library]

A generic interface for cryptographic operations, platform independent quality RNG, property tests and known-answer tests (KATs) for common algorithms, and a basic benchmark infrastructure. Maintainers of hash and cipher implementations are encouraged to add instances for the classes defined in Crypto.Classes. Crypto users are similarly encouraged to use the interfaces defined in the Classes module. Any concepts or functions of general use to more than one cryptographic algorithm (ex: padding) is within scope of this package.

Properties

Versions0.0.0.1, 0.0.0.2, 0.1.0.0, 0.1.1.0, 0.1.2.0, 0.1.2.1, 0.1.2.2, 0.1.2.3, 0.1.2.4, 0.2, 0.2.1, 0.3, 0.3.1, 0.4, 0.4.1, 0.5, 0.5.2, 0.6, 0.6.1, 0.6.2, 0.6.2.1, 0.6.3, 0.6.4, 0.7, 0.8, 0.9, 0.10, 0.10.1, 0.10.2, 0.11, 0.12, 0.12.1, 0.12.2, 0.12.2.1, 0.12.2.2, 0.13, 0.13.1, 0.13.2 (info)
Change logNone available
Dependenciesbase (==4.*), binary (>=0.4.0 && <0.6.0), bytestring (==0.9.*), cereal (==0.2.*), criterion (>=0.5), directory (>=1.0.1.0), filepath (>=1.1), parsec (>=3.1), QuickCheck (>=2.0), random (==1.*), tagged (==0.1.*) [details]
LicenseBSD3
CopyrightThomas DuBuisson <thomas.dubuisosn@gmail.com>
AuthorThomas DuBuisson <thomas.dubuisson@gmail.com>, Dominic Steinitz
MaintainerThomas DuBuisson <thomas.dubuisson@gmail.com>
Stabilitystable
CategoryData, Cryptography
UploadedTue Sep 7 20:03:58 UTC 2010 by ThomasDuBuisson
DistributionsDebian:0.13.2, Fedora:0.13.2, FreeBSD:0.13.2, LTSHaskell:0.13.2, NixOS:0.13.2, Stackage:0.13.2
Downloads53759 total (807 in last 30 days)
Votes
0 []
StatusDocs not available [build log]
All reported builds failed as of 2015-05-26 [all 1 reports]

Modules

Flags

NameDescriptionDefaultType
alg-testsInclude Test.Crypto module for testing hash and cipher instancesEnabledAutomatic
benchmarksInclude benchmarking tools for cryptographic operationsDisabledAutomatic

Use -f <flag> to enable a flag, or -f -<flag> to disable that flag. More info

Downloads

Maintainers' corner

For package maintainers and hackage trustees