cryptoids-0.5.1.0: Reversable and secure encoding of object ids as a bytestring

LicenseBSD3
Safe HaskellNone
LanguageHaskell2010

Data.CryptoID.Poly.ImplicitNamespace

Description

 
Synopsis

Documentation

ciphertext :: CryptoID namespace a -> a #

class MonadThrow m => MonadCrypto (m :: * -> *) where #

Class of monads granting reader access to a key and allowing for failure during cryptographic operations

This formulation is weaker than MonadReader key (from mtl) in that it does not require local.

Minimal complete definition

cryptoIDKey

Associated Types

type MonadCryptoKey (m :: * -> *) :: * #

Methods

cryptoIDKey :: (MonadCryptoKey m -> m a) -> m a #

type HasCryptoByteString (namespace :: Symbol) = HasCryptoID namespace ByteString Source #

type CryptoByteString (namespace :: Symbol) = CryptoID namespace ByteString Source #

data CryptoIDError Source #

Error cases that can be encountered during encrypt and decrypt

Care has been taken to ensure that presenting values of CryptoIDError to an attacker leaks no plaintext (it does leak information about the length of the plaintext).

Constructors

AlgorithmError CryptoError

One of the underlying cryptographic algorithms (CryptoHash or CryptoCipher) failed.

PlaintextIsWrongLength Int

The length of the plaintext is not a multiple of the block size of CryptoCipher

The length of the offending plaintext is included.

CiphertextIsWrongLength ByteString

The length of the ciphertext is not a multiple of the block size of CryptoCipher

The offending ciphertext is included.

NamespaceHashIsWrongLength ByteString

The length of the digest produced by CryptoHash does not match the block size of CryptoCipher.

The offending digest is included.

This error should not occur and is included primarily for sake of totality.

CiphertextConversionFailed ByteString

The produced ByteString is the wrong length for deserialization into a ciphertext.

The offending ByteString is included.

DeserializationError

The plaintext obtained by decrypting a ciphertext with the given CryptoIDKey in the context of the namespace could not be deserialized into a value of the expected payload-type.

This is expected behaviour if the namespace or payload-type does not match the ones used during encryption or if the ciphertext was tempered with.

InvalidNamespaceDetected

We have determined that, allthough deserializion succeded, the ciphertext was likely modified during transit or created using a different namespace.

data CryptoIDKey Source #

This newtype ensures only keys of the correct length can be created

Use genKey to securely generate keys.

Use the Binary instance to save and restore values of CryptoIDKey across executions.

Instances
Show CryptoIDKey Source #

Does not actually show any key material

Instance details

Defined in Data.CryptoID.ByteString

Binary CryptoIDKey Source # 
Instance details

Defined in Data.CryptoID.ByteString

ByteArrayAccess CryptoIDKey Source # 
Instance details

Defined in Data.CryptoID.ByteString

Methods

length :: CryptoIDKey -> Int #

withByteArray :: CryptoIDKey -> (Ptr p -> IO a) -> IO a #

copyByteArrayToPtr :: CryptoIDKey -> Ptr p -> IO () #

type CryptoHash = SHAKE128 64 Source #

The cryptographic HashAlgorithm this module uses

We expect the block size of CryptoCipher to be exactly the size of the Digest generated by CryptoHash (since a Digest is used as an IV).

Violation of this expectation causes runtime errors.

type CryptoCipher = Blowfish Source #

The symmetric cipher BlockCipher this module uses

genKey :: MonadIO m => m CryptoIDKey Source #

Securely generate a new key using system entropy

When CryptoCipher accepts keys of varying lengths this function generates a key of the largest accepted size.

readKeyFile :: MonadIO m => FilePath -> m CryptoIDKey Source #

Try to read a CryptoIDKey from a file. If the file does not exist, securely generate a key (using genKey) and save it to the file.