Maintainer | John Galt <jgalt@centromere.net> |
---|---|
Stability | experimental |
Portability | POSIX |
Safe Haskell | None |
Language | Haskell2010 |
This module contains all of the message patterns for all the handshakes
specified in the protocol. The first two characters of the name
represent the handshake the pattern belongs to (NN, KN, NK, etc). The
next character represents whether the pattern is intended to be used
by the Initiator or the Responder. Finally, the number indicates
the step of the handshake in which the pattern is intended to be used.
Regular handshake steps begin at 1, but patterns for pre-messages are
numbered 0. The patterns for pre-messages are intended to be passed
to the handshakeState
function. The (de-)serialization of pre-messages
is beyond the scope of this library, but public keys can be
imported/exported using the curveBytesToPub
and curvePubToBytes
functions.
- noiseNNI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseNNR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseNNR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseNNI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseKNI0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseKNR0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseKNI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseKNR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseKNR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseKNI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseNKI0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseNKR0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseNKI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseNKR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseNKR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseNKI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseKKI0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseKKR0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseKKI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseKKR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseKKR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseKKI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseNEI0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseNER0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseNEI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseNER1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseNER2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseNEI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseKEI0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseKER0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseKEI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseKER1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseKER2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseKEI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseNXI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseNXR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseNXR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseNXI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseKXI0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseKXR0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseKXI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseKXR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseKXR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseKXI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseXNI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseXNR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseXNR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseXNI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseXNI3 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseXNR3 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseINI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseINR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseINR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseINI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseXKI0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseXKR0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseXKI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseXKR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseXKR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseXKI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseXKI3 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseXKR3 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseIKI0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseIKR0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseIKI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseIKR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseIKR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseIKI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseXEI0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseXER0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseXEI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseXER1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseXER2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseXEI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseXEI3 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseXER3 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseIEI0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseIER0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseIEI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseIER1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseIER2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseIEI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseXXI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseXXR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseXXR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseXXI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseXXI3 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseXXR3 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseIXI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseIXR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseIXR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseIXI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseNI0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseNR0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseNI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseNR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseKI0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseKR0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseKI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseKR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
- noiseXI0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseXR0 :: (Cipher c, Curve d, Hash h) => MessagePattern c d h ()
- noiseXI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString
- noiseXR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString
Functions
Noise_NN
noiseNNI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseNNR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
noiseNNR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseNNI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
Noise_KN
noiseKNI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseKNR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
noiseKNR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseKNI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
Noise_NK
noiseNKI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseNKR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
noiseNKR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseNKI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
Noise_KK
noiseKKI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseKKR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
noiseKKR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseKKI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
Noise_NE
noiseNEI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseNER1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
noiseNER2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseNEI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
Noise_KE
noiseKEI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseKER1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
noiseKER2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseKEI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
Noise_NX
noiseNXI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseNXR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
noiseNXR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseNXI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
Noise_KX
noiseKXI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseKXR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
noiseKXR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseKXI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
Noise_XN
noiseXNI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseXNR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
noiseXNR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseXNI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
noiseXNI3 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseXNR3 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
Noise_IN
noiseINI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseINR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
noiseINR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseINI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
Noise_XK
noiseXKI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseXKR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
noiseXKR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseXKI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
noiseXKI3 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseXKR3 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
Noise_IK
noiseIKI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseIKR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
noiseIKR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseIKI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
Noise_XE
noiseXEI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseXER1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
noiseXER2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseXEI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
noiseXEI3 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseXER3 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
Noise_IE
noiseIEI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseIER1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
noiseIER2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseIEI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
Noise_XX
noiseXXI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseXXR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
noiseXXR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseXXI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
noiseXXI3 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseXXR3 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
Noise_IX
noiseIXI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseIXR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
noiseIXR2 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseIXI2 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
Noise_N
noiseNI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseNR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
Noise_K
noiseKI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseKR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source
Noise_X
noiseXI1 :: (Cipher c, Curve d, Hash h) => MessagePatternIO c d h ByteString Source
noiseXR1 :: (Cipher c, Curve d, Hash h) => ByteString -> MessagePattern c d h ByteString Source