aboutsummaryrefslogtreecommitdiff
path: root/src/include/gnunet_crypto_lib.h
Commit message (Collapse)AuthorAge
...
* -adding cmp functions for RSA public keys and sigsChristian Grothoff2015-05-15
|
* towards using EdDSA-ECDHE instead of ECDSA-ECDHE combined cryptosystem (API ↵Christian Grothoff2015-05-13
| | | | only)
* -doxygen, indentationChristian Grothoff2015-04-17
|
* -doxygen, build system fixes, minor API extensionChristian Grothoff2015-04-13
|
* -updated french translationsChristian Grothoff2015-03-24
|
* -also cover private key caseChristian Grothoff2015-03-19
|
* -get test to work, but with ecdsa instead of eddsaChristian Grothoff2015-03-19
|
* check for existence of 'getopt' command line toolChristian Grothoff2015-03-15
|
* add GNUNET_CRYPTO_rsa_public_key_hashChristian Grothoff2015-03-09
|
* -bringing copyright tags up to FSF standardChristian Grothoff2015-02-07
|
* adding GNUNET_CRYPTO_eddsa_private_key_from_stringChristian Grothoff2015-01-28
|
* - fix docuSree Harsha Totakura2015-01-26
|
* -fix docSree Harsha Totakura2015-01-26
|
* adding API for incremental hashing (from Taler)Christian Grothoff2015-01-09
|
* adding support for blind signatures (modernized version of Taler logic, with ↵Christian Grothoff2015-01-09
| | | | variable key length)
* -do forcestart for gns; doxygen fixesChristian Grothoff2014-12-14
|
* -clarify docsChristian Grothoff2014-12-07
|
* -fixing misc issues and bugs, including better termination logic for ↵Christian Grothoff2014-11-28
| | | | intersection and salt handling
* cleaning up scalar product client APIChristian Grothoff2014-05-24
|
* 1.Removed GNUNET_CRYPTO_compute_finger_identitySupriti Singh2014-04-07
| | | | | | | 2.Removed myself as the first element of the trail. 3.Multiple entries in the routing table. 4.Put/Get/Monitor from old DHT added back in clients file.
* Add missing stub definitions of structs to the corresponding header filesFlorian Dold2014-03-10
|
* Adding function GNUNET_CRYPTO_compute_finger_identitySupriti Singh2014-02-18
|
* Computing finger identity using libgcrypt functions.Supriti Singh2014-02-07
|
* - extended paillier-api to also include caller-suggested maximum supported homsChristian Fuchs2014-02-04
|
* - added more information on when paillier-encrypt soft-fails (too long ↵Christian Fuchs2014-02-03
| | | | number, no homomorphic ops possible)
* - purged leftover plaintext container for pailier.Christian Fuchs2014-01-29
|
* - more work on crypto-paillierChristian Fuchs2014-01-26
|
* - added logics for homomorphic operation in paillierChristian Fuchs2014-01-21
| | | | - adjusted headers
* - scalarproduct element container was 1 byte too largeChristian Fuchs2014-01-21
| | | | | - added logics to compute the maximum supported number of paillier hom.ops for a ciphertext - updated comments
* - header syncChristian Fuchs2014-01-21
|
* - first extension of paillier with foolproof homomorphism support ↵Christian Fuchs2014-01-21
| | | | | | (ciphertext container carries information on support ops) - adjusted encryt/decrypt functionality to handle gcry_mpi_t, not a plaintext container
* - doxygenFlorian Dold2014-01-20
|
* - paillier implementationFlorian Dold2014-01-20
|
* - paillierFlorian Dold2014-01-20
|
* - make mpi scan/print publicFlorian Dold2014-01-20
| | | | | - secretsharing key generation and decryption fixed
* -switch to case-insensitive LOC URIs and use compatible encoding for peer ↵Christian Grothoff2013-12-24
| | | | identities with the rest of the system
* - add peer cmpBart Polot2013-12-05
|
* -fix doxygenChristian Grothoff2013-11-07
|
* -clarify docuChristian Grothoff2013-11-05
|
* Werner Koch wrote:Christian Grothoff2013-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Hi, find attach the patch which makes all 3 test cases work with Ed25519. There are some minor hacks in the test cases to allow enabling of Libgcrypt debugging and also some minor output style changes. There is one FIXME in the code: /* FIXME: mpi_print creates an unsigned integer - is that intended or should we convert it to a signed integer (2-compl)? */ mpi_print (xbuf, sizeof (xbuf), result_x); X may be positive or negative but GCRYMPI_FMT_USG ignores the sign. Thus this is not what we actually want. Should we change it to 2-comp (GCRYMPI_FMT_STD) so that we have a proper value? Given that the curve is 255 bit this should alwas fit int the 256 bit buffer. Another option would be to use the EdDSA method for the sign but that is optimized to easily recover x and would be more work. Or we store the sign in the high bit. t all depends on what you want to write into the protocol specs. I would also like to revert the way we distinguish between Ed25519 with and without ECDSA: The way we do it right now is by assuming the Ed25519 is always used with EdDSA unless a flag has been set. This is a bit surprising and requiring the "(flags eddsa)" would be a less surprising interface. Salam-Shalom, Werner
* function to fill buffer with random valuesMatthias Wachs2013-10-29
|
* separating ECC crypto into functions/structs for ECDHE, ECDSA and EDDSAChristian Grothoff2013-10-10
|
* migrating towards XDG configuration specification (#3000)Christian Grothoff2013-10-09
|
* -remove trailing whitespaceChristian Grothoff2013-10-06
|
* -load revocations from disk, misc doxygen/style fixesChristian Grothoff2013-10-06
|
* renaming GNUNET_CRYPTO_get_host_identity to GNUNET_CRYPTO_get_peer_identityChristian Grothoff2013-10-06
|
* -indentation improvementsChristian Grothoff2013-10-04
|
* -sync before server reboot, work on conversation serviceChristian Grothoff2013-10-04
|
* -towards addressing #3047, note this causes the code to FTBFSChristian Grothoff2013-09-30
|
* -rename files/symbols from _aes to _symmetricChristian Grothoff2013-09-30
|