e213ef310f
* Fix minor FD leak in journal code. Closes: #754608 * direct: Fix handling of case where a work tree subdirectory cannot be written to due to permissions. * migrate: Avoid re-checksumming when migrating from hashE to hash backend. * uninit: Avoid failing final removal in some direct mode repositories due to file modes. * S3: Deal with AWS ACL configurations that do not allow creating or checking the location of a bucket, but only reading and writing content to it. * resolvemerge: New plumbing command that runs the automatic merge conflict resolver. * Deal with change in git 2.0 that made indirect mode merge conflict resolution leave behind old files. * sync: Fix git sync with local git remotes even when they don't have an annex.uuid set. (The assistant already did so.) * Set gcrypt-publish-participants when setting up a gcrypt repository, to avoid unncessary passphrase prompts. This is a security/usability tradeoff. To avoid exposing the gpg key ids who can decrypt the repository, users can unset gcrypt-publish-participants. * Install nautilus hooks even when ~/.local/share/nautilus/ does not yet exist, since it is not automatically created for Gnome 3 users. * Windows: Move .vbs files out of git\bin, to avoid that being in the PATH, which caused some weird breakage. (Thanks, divB) * Windows: Fix locking issue that prevented the webapp starting (since 5.20140707). # imported from the archive
70 lines
1.9 KiB
Haskell
70 lines
1.9 KiB
Haskell
{- Convenience wrapper around cryptohash.
|
|
- Falls back to SHA if it's not available.
|
|
-}
|
|
|
|
{-# LANGUAGE CPP #-}
|
|
|
|
module Utility.Hash (
|
|
sha1,
|
|
sha224,
|
|
sha256,
|
|
sha384,
|
|
sha512,
|
|
#ifdef WITH_CRYPTOHASH
|
|
skein256,
|
|
skein512,
|
|
#endif
|
|
prop_hashes_stable
|
|
) where
|
|
|
|
import qualified Data.ByteString.Lazy as L
|
|
import qualified Data.Text as T
|
|
import qualified Data.Text.Encoding as T
|
|
|
|
#ifndef WITH_CRYPTOHASH
|
|
import Data.Digest.Pure.SHA
|
|
#else
|
|
import Crypto.Hash
|
|
|
|
sha1 :: L.ByteString -> Digest SHA1
|
|
sha1 = hashlazy
|
|
|
|
sha224 :: L.ByteString -> Digest SHA224
|
|
sha224 = hashlazy
|
|
|
|
sha256 :: L.ByteString -> Digest SHA256
|
|
sha256 = hashlazy
|
|
|
|
sha384 :: L.ByteString -> Digest SHA384
|
|
sha384 = hashlazy
|
|
|
|
sha512 :: L.ByteString -> Digest SHA512
|
|
sha512 = hashlazy
|
|
|
|
-- sha3 is not yet fully standardized
|
|
--sha3 :: L.ByteString -> Digest SHA3
|
|
--sha3 = hashlazy
|
|
|
|
skein256 :: L.ByteString -> Digest Skein256_256
|
|
skein256 = hashlazy
|
|
|
|
skein512 :: L.ByteString -> Digest Skein512_512
|
|
skein512 = hashlazy
|
|
|
|
#endif
|
|
|
|
{- Check that all the hashes continue to hash the same. -}
|
|
prop_hashes_stable :: Bool
|
|
prop_hashes_stable = all (\(hasher, result) -> hasher foo == result)
|
|
[ (show . sha1, "0beec7b5ea3f0fdbc95d0dd47f3c5bc275da8a33")
|
|
, (show . sha224, "0808f64e60d58979fcb676c96ec938270dea42445aeefcd3a4e6f8db")
|
|
, (show . sha256, "2c26b46b68ffc68ff99b453c1d30413413422d706483bfa0f98a5e886266e7ae")
|
|
, (show . sha384, "98c11ffdfdd540676b1a137cb1a22b2a70350c9a44171d6b1180c6be5cbb2ee3f79d532c8a1dd9ef2e8e08e752a3babb")
|
|
, (show . sha512, "f7fbba6e0636f890e56fbbf3283e524c6fa3204ae298382d624741d0dc6638326e282c41be5e4254d8820772c5518a2c5a8c0c7f7eda19594a7eb539453e1ed7")
|
|
#ifdef WITH_CRYPTOHASH
|
|
, (show . skein256, "a04efd9a0aeed6ede40fe5ce0d9361ae7b7d88b524aa19917b9315f1ecf00d33")
|
|
, (show . skein512, "fd8956898113510180aa4658e6c0ac85bd74fb47f4a4ba264a6b705d7a8e8526756e75aecda12cff4f1aca1a4c2830fbf57f458012a66b2b15a3dd7d251690a7")
|
|
#endif
|
|
]
|
|
where
|
|
foo = L.fromChunks [T.encodeUtf8 $ T.pack "foo"]
|