aboutsummaryrefslogtreecommitdiff
path: root/src/common/crypto.h
Commit message (Expand)AuthorAge
* Track routers by hash of identity key; use hex hash of identity key in place ...•••svn:r1994 Nick Mathewson2004-07-01
* Not every RSA decrypt should warn on failure.•••svn:r1853 Nick Mathewson2004-05-12
* doxygen markup for common/*.h•••svn:r1840 Roger Dingledine2004-05-10
* Doxygenate common.•••svn:r1829 Nick Mathewson2004-05-10
* some patches on the patches•••svn:r1761 Roger Dingledine2004-05-01
* Finish documenting the functions in common•••svn:r1758 Nick Mathewson2004-05-01
* Handle windows socket errors correctly; comment most of common.•••svn:r1756 Nick Mathewson2004-05-01
* Remove IVs from cipher code, since AES-ctr has none.•••svn:r1742 Nick Mathewson2004-04-28
* Refactor crypto error handling to be more like TLS error handling:•••crypto_perror is a no-no, since an operation can set more than one error. Also, fix a bug in the unix crypto_seed_rng: mixing stdio with /dev/urandom is a bad idea, since fopen can make all kinds of weird extraneous syscalls (mmap, fcntl, stat64, etc.) and since fread tends to buffer data in big chunks, thus depleting the entropy pool. svn:r1717 Nick Mathewson2004-04-26
* Fix base32 implementation; make base32 implementation follow standard; add mo...•••svn:r1574 Nick Mathewson2004-04-08
* Force hybrid encryption on for key negotiation•••svn:r1509 Nick Mathewson2004-04-06
* Document stuff, reduce magic numbers, add emacs magic•••svn:r1502 Nick Mathewson2004-04-06
* add more constants•••svn:r1488 Nick Mathewson2004-04-05
* use the right variable when comparing hashes; maybe fix "Hash of session" bug•••svn:r1481 Nick Mathewson2004-04-05
* Refactor the heck out of crypto interface: admit that we will stick with one ...•••svn:r1458 Nick Mathewson2004-04-03
* refactor; start adding debugging logs to midpoint rend stuff•••svn:r1445 Nick Mathewson2004-04-02
* Add new functions to wrap digest and sign/checksig.•••svn:r1436 Nick Mathewson2004-04-01
* Separate "generate-DH-key" from "get-DH-key" without breaking old interface•••svn:r1431 Nick Mathewson2004-04-01
* Add helpful hybrid encryption functions•••svn:r1423 Nick Mathewson2004-04-01
* Add more key manipulation functions, and base32 functions, to crypto•••svn:r1395 Nick Mathewson2004-03-30
* more pesky tabs•••svn:r1265 Roger Dingledine2004-03-12
* add crypto_cipher_rewind to reverse crypto_cipher_advance•••svn:r957 Roger Dingledine2003-12-23
* document an openssl gotcha•••svn:r947 Roger Dingledine2003-12-17
* change crypto_digest_new_env to crypto_new_digest_env•••(and same with _free_) to match our conventions i think our conventions may be getting too ad hoc svn:r940 Roger Dingledine2003-12-16
* rename digest_copy to digest_dup, make it return, make gcc happier•••svn:r939 Roger Dingledine2003-12-16
* Add more fine-grained SHA1 functionality.•••svn:r937 Nick Mathewson2003-12-16
* Make router/directory parsing nondestructive and more const-friendly•••svn:r890 Nick Mathewson2003-12-08
* Remove minor biasing problem from crypto_pseudo_rand_int•••svn:r799 Nick Mathewson2003-11-12
* Make crypto_pseudo_rand* never fail.•••svn:r797 Nick Mathewson2003-11-12
* Update LICENSE and copyright dates.•••svn:r560 Nick Mathewson2003-10-08
* Add code to parse fingerprint files and compare routers against fingerprint f...•••svn:r490 Nick Mathewson2003-09-26
* Refactor common file code into util.c; add published to descriptors•••svn:r487 Nick Mathewson2003-09-26
* Refactor buffers; implement descriptors.•••'buf_t' is now an opaque type defined in buffers.c . Router descriptors now include all keys; routers generate keys as needed on startup (in a newly defined "data directory"), and generate their own descriptors. Descriptors are now self-signed. Implementation is not complete: descriptors are never published; and upon receiving a descriptor, the directory doesn't do anything with it. At least "routers.or" and orkeygen are now obsolete, BTW. svn:r483 Nick Mathewson2003-09-25
* Make crypto structures private to crypto.c•••svn:r437 Nick Mathewson2003-09-10
* Add initial interfaces and code for TLS support. Interfaces are right; code ...•••svn:r424 Nick Mathewson2003-09-04
* Be smarter about getting key matter from DH.•••Formerly, once we had g^xy, we took the last N bytes from g^xy. Now, we take SHA(g^xy || [0]) || SHA1(g^xy || [1]) || ... , in order to use all bits from g^xy equally, and generate as much key material as we need. svn:r370 Nick Mathewson2003-07-30
* Add AES counter-mode support to the crypt library•••svn:r362 Nick Mathewson2003-06-30
* Add RNG seeding•••svn:r318 Nick Mathewson2003-06-13
* Tested backends for directory signing and checking. Directory parser complet...•••svn:r271 Nick Mathewson2003-05-07
* Decrease DH group length to 1024. (Roger, you may want to read section 1 of ...•••svn:r269 Nick Mathewson2003-05-07
* More work on directories. Signed directories not yet tested. No support for ...•••svn:r268 Nick Mathewson2003-05-07
* Basic diffie-helman wrappers with fixed modulus and tests•••svn:r257 Nick Mathewson2003-05-01
* Choose correct abstraction for topic_foo. Abstract random-integer code•••svn:r249 Nick Mathewson2003-04-17
* Refactor block ciphers; add 3des•••svn:r196 Nick Mathewson2003-03-19
* Add convenience functions to wrap create and init for symmetric ciphers; clea...•••svn:r131 Nick Mathewson2002-10-02
* laying the groundwork for dynamic router lists•••revamped the router reading section reference counting for crypto pk env's (so we can dup them) we now read and write pem pk keys from string rather than from FILE*, in anticipation of fetching directories over a socket (so now on startup we slurp in the whole file, then parse it as a string) fixed a bug in the proxy side, where you could get some circuits wedged if they showed up while the connection was being made svn:r110 Roger Dingledine2002-09-24
* Changed crypto calls to go through common/crypto.[hc] instead of calling Open...•••svn:r76 Matej Pjafjar2002-08-22
* Added the crypto abstraction to libor. Need to test and change the code to us...•••svn:r74 Matej Pjafjar2002-07-25
* Beginnings of a crypto abstraction layer.•••svn:r73 Matej Pjafjar2002-07-24