Changelog for raaz-0.2.0
Change log for raaz.
0.2.0 - 24 August, 2017
- Some cpu detection builtin for GCC. Would come handy in future for selection of primitives are runtime.
- BLAKE2b, BLAKE2s added.
- system entropy: Experimental support for linux getrandom call
- removed depreciated
liftSubMT
from Memory. - Got rid of the class
MemoryMonad
, instead introduced a more specificMemoryThread
. This allows to treat monads likeRT mem
much likeMT mem
, including possibility of running an action on a sub-memory. - combinator to randomise memory cells.
- hardened the prg so that a compromise on the current prg state will not expose previously generated data.
- OpenBSD/NetBSD: fix incorrect arc4random call.
- Basic Unix man-page for the raaz command.
- Windows support is now included. The missing pieces were system entropy and memory locking which is now available.
0.1.1 - 2nd March, 2017
- Failing build on big endian machines (#306) fixed.
0.1.0 - 28th February, 2017
- Stream cipher chacha20 added.
- Added a PRG that uses chacha20, seeded with system entropy
- Sha1 highly depreciated in view of reported collision.
- We now have super command
raaz
with subcommandschecksum
: as a replacement for the old checksum executablerand
: for generating random bytes.
Low level changes
-
Reworked alignment considerations.
-
New Alignment type
-
Ways for implementations to demand that the input buffer be aligned (mainly to facilitate more efficient SIMD implementations).
-
-
Num instance from LengthUnit removed, Monoid instance added (See issue:#247)
0.0.2 - July 25, 2016.
This release comes with very little changes.
- Encoding: translation between formats using the
translate
combinator - Encoding formats: base64
- Bug fix in base16 character verification (Commit: d6eca4c37b0b)
- Dropped
isSuccessful
from export list of Equality.
0.0.1 - June 21, 2016.
- Basic cryptographic types.
- Hashes: sha1, sha256, sha512, sha224, sha384 and their HMACs
- Ciphers: AES-CBC with key-sizes 128, 192 and 256
- Encoding formats: base16