summaryrefslogtreecommitdiffhomepage
path: root/Types.hs
Commit message (Collapse)AuthorAge
* updated many dependencies, ghc 8.xJoey Hess2020-02-14
| | | | | | | | | | | | | Updated many dependencies, notably secret-sharing which dropped the dep on polynomial, and so allows building with ghc 8.x. Did not try to support building with older ghc because the semigroup-monid transition would make it nontrivial. Stackage lts-14.25 is a compromise, since the stack shipped in debian (even unstable) is not able to handle newer ones. This commit was sponsored by Eric Drechsel on Patreon.
* Gpg keyid bugsJoey Hess2016-10-06
| | | | | | | | | | | | | | Fix bugs with entry of gpg keyid in the keysafe.log. Gpg.anyKey was being used in writing the log, which made the log contain gpg keys with an empty keyid. Fix bug in --autostart that caused the full gpg keyid to be used in the name, so restores would only work when --gpgkeyid was specifid. Added a Distinguisher data type rather than the Gpg.anyKey hack. This commit was sponsored by Thom May on Patreon.
* In --autostart mode, check for gpg keys that have not been backed up, and ↵Joey Hess2016-09-22
| | | | | | | | offer to back them up. Only ask once per key. This commit was sponsored by Thomas Hochstein on Patreon.
* Change format of ~/.keysafe/backup.logJoey Hess2016-09-15
| | | | | | | Allow deserializing SecretKeySource so we can later know what gpg keys are backed up. Converted KeyId to Text as JSON can't handle ByteString.
* use less expensive hash for proof of workJoey Hess2016-09-13
| | | | | | | | | | | | | | The server has to run the hash once to verify a request, so a hash that took 4 seconds could make the server do too much work if it's being flooded with requests. So, made the hash much less expensive. This required keeping track of fractional seconds. Actually, I used Rational for them, to avoid most rounding problems. That turned out nice. I've only tuned the proofOfWorkHashTunable on my fanless overheating laptop so far. It seems to be fairly reasonablly tuned though.
* Added basic test suite.Joey Hess2016-08-30
|
* return ProofOfWorkRequirement tJoey Hess2016-08-22
| | | | This way the requirement can be varied for different operations.
* chunkingJoey Hess2016-08-19
| | | | | This changed the storage format, not that it matters because nobody is using it yet.
* rename shard -> shareJoey Hess2016-08-19
| | | | This makes it clearer that it's not a chunk of data, but a Shamir share.
* comment updatesJoey Hess2016-08-19
| | | | | | The keyid used as a salt in the shardIdents does not prevent rainbow table attacks, since it's often anyKey (""). The obscure name combined with the username does make rainbow tables unlikely to be useful though.
* obscure nameJoey Hess2016-08-17
|
* progress display for storingJoey Hess2016-08-17
|
* add progress bars to restoreJoey Hess2016-08-17
| | | | also, restore actually works!
* more command line interface improvementsJoey Hess2016-08-16
|
* improve options to select secret key to backup/restoreJoey Hess2016-08-16
|
* add --benchmarkJoey Hess2016-08-16
|
* use zxcvbn-c for fairly good password entropy estimationJoey Hess2016-08-16
| | | | | This should be good enough to let the keysafe UI comment on how good a password the user chooses.
* pluggable object storage layerJoey Hess2016-08-11
|
* Shard data typeJoey Hess2016-08-11
|
* partial demoJoey Hess2016-08-11
|
* inline slightly modified version of secret-sharingJoey Hess2016-08-11
| | | | | Needed for efficient serialization of shares, unless upstream takes my suggestion to make the finite field be size 256.
* nearly able to generate shards nowJoey Hess2016-08-11
|
* types for new version storage schemeJoey Hess2016-08-10
|
* serialization for tuningsJoey Hess2016-08-07
|
* reorg, and working on serializationJoey Hess2016-08-07
|
* shardingJoey Hess2016-08-07
|
* basic password entropy calculationJoey Hess2016-08-07
|
* more cost calculation and refactored TunablesJoey Hess2016-08-06
|
* some basic data types and expensive hashingJoey Hess2016-08-06