aboutsummaryrefslogtreecommitdiff
path: root/src/util/crypto_ecc.c
Commit message (Collapse)AuthorAge
* 1.Removed GNUNET_CRYPTO_compute_finger_identitySupriti Singh2014-04-07
| | | | | | | 2.Removed myself as the first element of the trail. 3.Multiple entries in the routing table. 4.Put/Get/Monitor from old DHT added back in clients file.
* Adding function GNUNET_CRYPTO_compute_finger_identitySupriti Singh2014-02-18
|
* Computing finger identity using libgcrypt functions.Supriti Singh2014-02-07
|
* -Modified struct PeerTrailSetupMessage.Supriti Singh2014-01-27
| | | | | | | | -Modified struct PeerTrailSetupResultMessage. -Added stubs for find_predecessor. -Added comments to understand the flow.
* - remove adjustFlorian Dold2014-01-20
|
* - make mpi scan/print publicFlorian Dold2014-01-20
| | | | | - secretsharing key generation and decryption fixed
* -move tcp session check into extra checks conditionChristian Grothoff2013-12-13
|
* -doxChristian Grothoff2013-12-06
|
* - add peer cmpBart Polot2013-12-05
|
* -remove noparam, as suggested by Werner KochChristian Grothoff2013-11-13
|
* -fix #3095Christian Grothoff2013-11-08
|
* -addressing final crypto fixmeChristian Grothoff2013-11-05
|
* Werner Koch wrote:Christian Grothoff2013-11-05
| | | | | | | | | | | | | Hi, find attached a changed diff to crypto_ecc.c with the final Libgcrypt interface. Use commit b9fd398 or later for your tests. Shalom-Salam, Werner
* Werner Koch wrote:Christian Grothoff2013-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Hi, find attach the patch which makes all 3 test cases work with Ed25519. There are some minor hacks in the test cases to allow enabling of Libgcrypt debugging and also some minor output style changes. There is one FIXME in the code: /* FIXME: mpi_print creates an unsigned integer - is that intended or should we convert it to a signed integer (2-compl)? */ mpi_print (xbuf, sizeof (xbuf), result_x); X may be positive or negative but GCRYMPI_FMT_USG ignores the sign. Thus this is not what we actually want. Should we change it to 2-comp (GCRYMPI_FMT_STD) so that we have a proper value? Given that the curve is 255 bit this should alwas fit int the 256 bit buffer. Another option would be to use the EdDSA method for the sign but that is optimized to easily recover x and would be more work. Or we store the sign in the high bit. t all depends on what you want to write into the protocol specs. I would also like to revert the way we distinguish between Ed25519 with and without ECDSA: The way we do it right now is by assuming the Ed25519 is always used with EdDSA unless a flag has been set. This is a bit surprising and requiring the "(flags eddsa)" would be a less surprising interface. Salam-Shalom, Werner
* -eddsa not yet in gcryptChristian Grothoff2013-10-11
|
* separating ECC crypto into functions/structs for ECDHE, ECDSA and EDDSAChristian Grothoff2013-10-10
|
* -remove trailing whitespaceChristian Grothoff2013-10-06
|
* renaming GNUNET_CRYPTO_get_host_identity to GNUNET_CRYPTO_get_peer_identityChristian Grothoff2013-10-06
|
* -towards addressing #3047, note this causes the code to FTBFSChristian Grothoff2013-09-30
|
* -rollback accidental commitChristian Grothoff2013-09-24
|
* -fix doxygenChristian Grothoff2013-09-24
|
* -ftbfsChristian Grothoff2013-09-21
|
* clear private keys in static locations on exitChristian Grothoff2013-09-21
|
* -fix compiler warningsChristian Grothoff2013-09-16
|
* -fix rename issuesChristian Grothoff2013-09-13
|
* splitting 'struct GNUNET_CRYPTO_EccPublicKey' into one struct for signing ↵Christian Grothoff2013-09-13
| | | | and another for encryption
* -eliminate LISTEN_PID check, silly idea anyway, better to just unset the ↵Christian Grothoff2013-09-09
| | | | LISTEN_FDS after use; also this is needed to make things work with gdb/valgrind/monkey/etc.
* -only use x for ECDHChristian Grothoff2013-09-05
|
* -noteChristian Grothoff2013-09-04
|
* -docuChristian Grothoff2013-08-30
|
* removing GNUNET_CRYPTO_ecc_key_free, use GNUNET_free directly insteadChristian Grothoff2013-08-21
|
* -eliminate more uses of ShortHashCode, breaks signaturesChristian Grothoff2013-08-19
|
* -fix leaks (kind-of related to #2981)Christian Grothoff2013-08-12
|
* -add extra context argument for key deriviation, so that fs and gads do not ↵Christian Grothoff2013-08-11
| | | | collide
* -fixChristian Grothoff2013-08-08
|
* -fix loglevelChristian Grothoff2013-08-08
|
* -testcase for new ECC crypto functionsChristian Grothoff2013-08-07
|
* -fixing main FS build, updating man page of gnunet-pseudonymChristian Grothoff2013-08-06
|
* moving to new, fixed-size encoding of public and private ECC keys ↵Christian Grothoff2013-08-06
| | | | everywhere, also improving ECC API to better support ECRS/GADS operations
* -documentChristian Grothoff2013-07-11
|
* -remove async ecc key generation, not neededChristian Grothoff2013-07-09
|
* -introducing convenience function to load private key of peerChristian Grothoff2013-06-26
|
* -handle case that we are in restart on stopChristian Grothoff2013-05-21
|
* work on gnunet-set, isolated bug in streamFlorian Dold2013-04-27
|
* implemented GNUNET_CRYPTO_get_host_identityFlorian Dold2013-04-27
|
* -cleanupChristian Grothoff2013-03-22
|
* -fixing #2563Christian Grothoff2013-03-20
|
* -fixChristian Grothoff2013-03-07
|
* -go to more sane ECC curve to be more DoS-resistantChristian Grothoff2013-03-04
|
* add argument to GNUNET_CRYPTO_ecc_decode_key to allow testing to disable key ↵Christian Grothoff2013-03-04
| | | | validation