| Commit message (Expand) | Author | Age |
* | Add a sha256 hmac function, with tests | Nick Mathewson | 2011-10-10 |
* | New function to get all digests of a public key | Nick Mathewson | 2011-10-10 |
* | Merge remote-tracking branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-06-03 |
|\ |
|
| * | Reject 128-byte keys that are not 1024-bit•••When we added the check for key size, we required that the keys be
128 bytes. But RSA_size (which defers to BN_num_bytes) will return
128 for keys of length 1017..1024. This patch adds a new
crypto_pk_num_bits() that returns the actual number of significant
bits in the modulus, and uses that to enforce key sizes.
Also, credit the original bug3318 in the changes file.
| Nick Mathewson | 2011-06-03 |
* | | Merge remote-tracking branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-05-16 |
|\| |
|
| * | Merge remote-tracking branch 'origin/maint-0.2.1' into maint-0.2.2•••Fixed trivial conflict due to headers moving into their own .h files
from or.h.
Conflicts:
src/or/or.h
| Nick Mathewson | 2011-05-16 |
| |\ |
|
| | * | squash! Add crypto_pk_check_key_public_exponent function•••Rename crypto_pk_check_key_public_exponent to crypto_pk_public_exponent_ok:
it's nice to name predicates s.t. you can tell how to interpret true
and false.
| Nick Mathewson | 2011-05-16 |
| | * | Add crypto_pk_check_key_public_exponent function | Robert Ransom | 2011-05-16 |
| | * | Make the DH parameter we use for TLS match the one from Apache's mod_ssl•••Our regular DH parameters that we use for circuit and rendezvous
crypto are unchanged. This is yet another small step on the path of
protocol fingerprinting resistance.
(Backport from 0.2.2's 5ed73e3807d90dd0a3)
| Nick Mathewson | 2011-02-10 |
* | | | Merge remote branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-02-03 |
|\| | |
|
| * | | Remove an unused function in crypto.c | Nick Mathewson | 2011-01-25 |
* | | | Merge remote branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-01-24 |
|\| | |
|
| * | | Make the DH parameter we use for TLS match the one from Apache's mod_ssl•••Our regular DH parameters that we use for circuit and rendezvous
crypto are unchanged. This is yet another small step on the path of
protocol fingerprinting resistance.
| Nick Mathewson | 2011-01-24 |
* | | | Merge remote branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-01-15 |
|\| | |
|
| * | | Merge remote branch 'origin/maint-0.2.1' into maint-0.2.2•••Conflicts:
src/or/routerparse.c
src/or/test.c
| Nick Mathewson | 2011-01-15 |
| |\| |
|
| | * | Merge branch 'bug2352_obsize' into maint-0.2.1 | Nick Mathewson | 2011-01-15 |
| | |\ |
|
| | | * | Add logic in routerparse to not read overlong private keys•••I am not at all sure that it is possible to trigger a bug here,
but better safe than sorry.
| Nick Mathewson | 2011-01-10 |
* | | | | Merge remote branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-01-15 |
|\| | | |
|
| * | | | Merge remote branch 'origin/maint-0.2.1' into maint-0.2.2•••Conflicts:
src/or/config.c
src/or/networkstatus.c
src/or/rendcommon.c
src/or/routerparse.c
src/or/test.c
| Nick Mathewson | 2011-01-15 |
| |\| | |
|
| | * | | Fix a heap overflow found by debuger, and make it harder to make that mistake...•••Our public key functions assumed that they were always writing into a
large enough buffer. In one case, they weren't.
(Incorporates fixes from sebastian)
| Nick Mathewson | 2011-01-15 |
| | |/ |
|
* | | | Merge remote branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-01-03 |
|\| | |
|
| * | | Merge remote branch 'origin/maint-0.2.1' into maint-0.2.2•••Conflicts:
src/common/test.h
src/or/test.c
| Nick Mathewson | 2011-01-03 |
| |\| |
|
| | * | Bump copyright statements to 2011 | Nick Mathewson | 2011-01-03 |
* | | | Document and/or fix stuff found by Sebastian in code review•••Thanks to Sebastian for his code-review of the bufferevents patch series.x
| Nick Mathewson | 2010-09-27 |
|/ / |
|
* | | Add a function to return a double in range [0,1). | Nick Mathewson | 2010-06-22 |
* | | Merge remote branch 'origin/maint-0.2.1'•••Conflicts:
src/common/test.h
src/or/test.c
| Nick Mathewson | 2010-02-27 |
|\| |
|
| * | Update Tor Project copyright years | Nick Mathewson | 2010-02-27 |
| * | Update copyright to 2009. | Karsten Loesing | 2009-05-04 |
* | | crypto_cipher_set_key cannot fail•••In 5e4d53d535a3cc9903250b3df0caa829f1c5e4bf we made it so that
crypto_cipher_set_key cannot fail. The call will now
always succeed, to returning a boolean for success/failure makes
no sense.
| Sebastian Hahn | 2009-10-27 |
* | | Reduce log level for someone else sending us weak DH keys.•••See task 1114. The most plausible explanation for someone sending us weak
DH keys is that they experiment with their Tor code or implement a new Tor
client. Usually, we don't care about such events, especially not on warn
level. If we really care about someone not following the Tor protocol, we
can set ProtocolWarnings to 1.
| Karsten Loesing | 2009-10-25 |
* | | Parse detached signature documents with multiple flavors and algorithms. | Nick Mathewson | 2009-10-15 |
* | | Refactor consensus signature storage for multiple digests and flavors.•••This patch introduces a new type called document_signature_t to represent the
signature of a consensus document. Now, each consensus document can have up
to one document signature per voter per digest algorithm. Also, each
detached-signatures document can have up to one signature per <voter,
algorithm, flavor>.
| Nick Mathewson | 2009-10-15 |
* | | Support for encoding and decoding 256-bit digests in base64 | Nick Mathewson | 2009-10-15 |
* | | Alter keygen function to generate keys of different lengths. | Nick Mathewson | 2009-09-29 |
* | | Add basic support for SHA256.•••This adds an openssl 0.9.8 dependency. Let's see if anybody cares.
| Nick Mathewson | 2009-08-19 |
* | | Add support for dynamic OpenSSL hardware crypto acceleration engines. | Martin Peck | 2009-05-23 |
* | | Update copyright to 2009. | Karsten Loesing | 2009-05-02 |
|/ |
|
* | Remove svn $Id$s from our source, and remove tor --version --version.•••The subversion $Id$ fields made every commit force a rebuild of
whatever file got committed. They were not actually useful for
telling the version of Tor files in the wild.
svn:r17867
| Nick Mathewson | 2009-01-04 |
* | Use a consistent naming standard for header file guard macros, taking care no...•••svn:r17805
| Nick Mathewson | 2008-12-29 |
* | Fix most DOCDOCs remaining and/or added by redox.•••svn:r17734
| Nick Mathewson | 2008-12-22 |
* | Add DOCDOC comments for all undocumented functions. Add missing *s to other ...•••svn:r17729
| Nick Mathewson | 2008-12-22 |
* | Fix bug 889: share deep-copied keys between threads to avoid races in referen...•••svn:r17672
| Nick Mathewson | 2008-12-18 |
* | The first of Karsten's proposal 121 patches: configure and maintain client au...•••svn:r16475
| Nick Mathewson | 2008-08-08 |
* | r15558@tombo: nickm | 2008-05-09 04:35:12 -0400••• New (temporary) tool to dump the modulus of a key. May help with a project of weasel's.
svn:r14580
| Nick Mathewson | 2008-05-09 |
* | r19004@catbus: nickm | 2008-03-21 15:18:43 -0400••• Use RAND_poll() again: the bug that made us stop using it has been fixed.
svn:r14150
| Nick Mathewson | 2008-03-21 |
* | r14399@tombo: nickm | 2008-02-22 14:09:38 -0500••• More 64-to-32 fixes. Partial backport candidate. still not done.
svn:r13680
| Nick Mathewson | 2008-02-22 |
* | r14374@tombo: nickm | 2008-02-21 16:57:39 -0500••• Fix all remaining shorten-64-to-32 errors in src/common. Some were genuine problems. Many were compatibility errors with libraries (openssl, zlib) that like predate size_t. Partial backport candidate.
svn:r13665
| Nick Mathewson | 2008-02-21 |
* | r14185@tombo: nickm | 2008-02-15 18:05:54 -0500••• Replace the hefty tor_strpartition with a simple function to replace its only (trivial) use.
svn:r13532
| Nick Mathewson | 2008-02-15 |
* | r14062@tombo: nickm | 2008-02-08 15:17:07 -0500••• Change DNs in x509 certificates to be harder to fingerprint. Raise common code. Refactor random hostname generation into crypto.c
svn:r13429
| Nick Mathewson | 2008-02-08 |
* | r17963@catbus: nickm | 2008-02-07 10:14:25 -0500••• Be more thorough about memory poisoning and clearing. Add an in-place version of aes_crypt in order to remove a memcpy from relay_crypt_one_payload.
svn:r13414
| Nick Mathewson | 2008-02-07 |