aboutsummaryrefslogtreecommitdiff
path: root/src/include/gnunet_crypto_lib.h
Commit message (Collapse)AuthorAge
* - add peer cmpBart Polot2013-12-05
|
* -fix doxygenChristian Grothoff2013-11-07
|
* -clarify docuChristian Grothoff2013-11-05
|
* Werner Koch wrote:Christian Grothoff2013-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Hi, find attach the patch which makes all 3 test cases work with Ed25519. There are some minor hacks in the test cases to allow enabling of Libgcrypt debugging and also some minor output style changes. There is one FIXME in the code: /* FIXME: mpi_print creates an unsigned integer - is that intended or should we convert it to a signed integer (2-compl)? */ mpi_print (xbuf, sizeof (xbuf), result_x); X may be positive or negative but GCRYMPI_FMT_USG ignores the sign. Thus this is not what we actually want. Should we change it to 2-comp (GCRYMPI_FMT_STD) so that we have a proper value? Given that the curve is 255 bit this should alwas fit int the 256 bit buffer. Another option would be to use the EdDSA method for the sign but that is optimized to easily recover x and would be more work. Or we store the sign in the high bit. t all depends on what you want to write into the protocol specs. I would also like to revert the way we distinguish between Ed25519 with and without ECDSA: The way we do it right now is by assuming the Ed25519 is always used with EdDSA unless a flag has been set. This is a bit surprising and requiring the "(flags eddsa)" would be a less surprising interface. Salam-Shalom, Werner
* function to fill buffer with random valuesMatthias Wachs2013-10-29
|
* separating ECC crypto into functions/structs for ECDHE, ECDSA and EDDSAChristian Grothoff2013-10-10
|
* migrating towards XDG configuration specification (#3000)Christian Grothoff2013-10-09
|
* -remove trailing whitespaceChristian Grothoff2013-10-06
|
* -load revocations from disk, misc doxygen/style fixesChristian Grothoff2013-10-06
|
* renaming GNUNET_CRYPTO_get_host_identity to GNUNET_CRYPTO_get_peer_identityChristian Grothoff2013-10-06
|
* -indentation improvementsChristian Grothoff2013-10-04
|
* -sync before server reboot, work on conversation serviceChristian Grothoff2013-10-04
|
* -towards addressing #3047, note this causes the code to FTBFSChristian Grothoff2013-09-30
|
* -rename files/symbols from _aes to _symmetricChristian Grothoff2013-09-30
|
* -encrypt using both AES and TWOFISH, with independent symmetric keysChristian Grothoff2013-09-30
|
* -rollback accidental commitChristian Grothoff2013-09-24
|
* -fix doxygenChristian Grothoff2013-09-24
|
* clear private keys in static locations on exitChristian Grothoff2013-09-21
|
* -fix rename issuesChristian Grothoff2013-09-13
|
* splitting 'struct GNUNET_CRYPTO_EccPublicKey' into one struct for signing ↵Christian Grothoff2013-09-13
| | | | and another for encryption
* -improving gnunet-identity command line options and man pagesChristian Grothoff2013-09-05
|
* removing GNUNET_CRYPTO_ecc_key_free, use GNUNET_free directly insteadChristian Grothoff2013-08-21
|
* -misc doxygen fixesChristian Grothoff2013-08-21
|
* -remove ShortHashCode from API, deprecate SListChristian Grothoff2013-08-19
|
* -playing with doxygen groupsChristian Grothoff2013-08-14
|
* -doxygenChristian Grothoff2013-08-14
|
* -implementing #2996Christian Grothoff2013-08-14
|
* -add extra context argument for key deriviation, so that fs and gads do not ↵Christian Grothoff2013-08-11
| | | | collide
* -doxygen fixesChristian Grothoff2013-08-08
|
* -fixing main FS build, updating man page of gnunet-pseudonymChristian Grothoff2013-08-06
|
* moving to new, fixed-size encoding of public and private ECC keys ↵Christian Grothoff2013-08-06
| | | | everywhere, also improving ECC API to better support ECRS/GADS operations
* -removing last bits of RSA support, as this code is now deadChristian Grothoff2013-07-18
|
* -first steps towards identity client APIChristian Grothoff2013-07-14
|
* PSYC APIs: added missing args and functions, more consistent namingGabor X Toth2013-07-12
| | | | | | | | - multicast: origin arg for join; s/leave/part/g - psyc: origin arg for join; join/part callbacks - social: enter2, home_advertise, away - psycstore/social: get latest historic message using ID 0 - added PSYC lib
* -documentChristian Grothoff2013-07-11
|
* -remove async ecc key generation, not neededChristian Grothoff2013-07-09
|
* -introducing convenience function to load private key of peerChristian Grothoff2013-06-26
|
* -cleaning up client api to test for service availabilityChristian Grothoff2013-06-05
|
* -switching GNS from RSA to ECCChristian Grothoff2013-05-29
|
* implemented GNUNET_CRYPTO_get_host_identityFlorian Dold2013-04-27
|
* -removing ancient code, commentsChristian Grothoff2013-03-15
|
* -76 is right, but you have to delete your ~/.gnunet/private.eccChristian Grothoff2013-03-05
|
* Increase GNUNET_CRYPTO_ECC_MAX_PUBLIC_KEY_LENGTHLRN2013-03-04
|
* -go to more sane ECC curve to be more DoS-resistantChristian Grothoff2013-03-04
|
* add argument to GNUNET_CRYPTO_ecc_decode_key to allow testing to disable key ↵Christian Grothoff2013-03-04
| | | | validation
* Be able to only-read-not-create RSA keysLRN2013-03-03
|
* Implement and use GNUNET_CRYPTO_rsa_get_public_key_hashLRN2013-03-03
|
* -trying to address #2791Christian Grothoff2013-02-11
|
* switching to ECDHE cryptography f, implementation is incomplete and ↵Christian Grothoff2013-02-05
| | | | INSECURE, do not use for anything but testing
* -export ecc generation functionChristian Grothoff2013-02-03
|