package mirage-crypto-pk

  1. Overview
  2. Docs
Simple public-key cryptography for the modern age

Install

Dune Dependency

Authors

Maintainers

Sources

mirage-crypto-v0.6.0.tbz
sha256=85c2e419fb8215ff354988ee58f1335b452da41f1bf3022a62d29ab8af56d462
sha512=ea3f1a99f9e7e1d66198a8ca7a07ae2f11ac6ef49f2a8b3d14f414a70243db09ec79454200e423d3792f58effa421fe3213e5ee6efe5e9ec8e43fd3444dad22c

Description

Mirage-crypto-pk provides public-key cryptography (RSA, DSA, DH).

Published: 11 Mar 2020

README

mirage-crypto - Cryptographic primitives for MirageOS

v0.6.0

mirage-crypto is a small cryptographic library that puts emphasis on the applicative style and ease of use. It includes basic ciphers (AES, 3DES, RC4), hashes (MD5, SHA1, SHA2 family), AEAD primitives (AES-GCM, AES-CCM), public-key primitives (RSA, DSA, DH) and a strong RNG (Fortuna).

RSA timing attacks are countered by blinding. AES timing attacks are avoided by delegating to AES-NI.

Mirage-crypto is a fork of the ocaml-nocrypto written by David Kaloper. It was forked with the permission of the original author in order to facilitate changes (e.g. build system) required by Mirage that the upstream didn't have time to keep up with.

Mirage-crypto-entropy embeds the former mirage-entropy opam package, which implements various entropy sources for MirageOS unikernels:

Status

This is a work in progress repository that is not yet released. Please see https://github.com/mirage/mirage-crypto/issues/1 for our progress towards a stable release.

Build

dune build
dune runtest

FAQ

RNG seeding

If RNG fails with Fatal error: exception Uncommon.Boot.Unseeded_generator, you need to seed it.

Unix:

let () = Mirage_crypto_rng_unix.initialize ()
Illegal instructions
Program terminated with signal SIGILL, Illegal instruction.
#0  _mm_aeskeygenassist_si128 (__C=<optimized out>, __X=...)

Mirage_crypto has CPU acceleration support (SSE2+AES-NI), but no run-time autodetection yet. You compiled the library with acceleration, but you are using it on a machine that does not support it.

The environment variable MIRAGE_CRYPTO_ACCELERATE can be used to override detection:

  • MIRAGE_CRYPTO_ACCELERATE=false dune build force-disables non-portable code.

  • MIRAGE_CRYPTO_ACCELERATE=true dune build force-enables non-portable code.

  • Otherwise, it matches the capabilities of the build machine.

Dev Dependencies (2)

  1. randomconv with-test & >= "0.1.3" & < "0.2.0"
  2. ounit with-test

Used by (14)

  1. albatross < "1.3.0"
  2. awa
  3. certify >= "0.3.3"
  4. conduit-lwt-tls
  5. conex-mirage-crypto
  6. current_github >= "0.2"
  7. dnssec
  8. letsencrypt >= "0.2.1" & < "0.2.3"
  9. otr >= "0.3.7"
  10. rfc6287 >= "1.0.4"
  11. ssh-agent >= "0.2.1"
  12. tls >= "0.11.0"
  13. tls-mirage
  14. x509 >= "0.10.0" & != "0.12.0"

Conflicts

None