aboutsummaryrefslogtreecommitdiff
path: root/src
Commit message (Collapse)AuthorAge
* - doxygenBart Polot2013-11-06
|
* remove non existing testsMatthias Wachs2013-11-06
|
* - fixesBart Polot2013-11-06
|
* -addressing final crypto fixmeChristian Grothoff2013-11-05
|
* -do not start those during testing either...Christian Grothoff2013-11-05
|
* -stylistic fixesChristian Grothoff2013-11-05
|
* -fixing zkey resolutionChristian Grothoff2013-11-05
|
* -tolerate lower case lettersChristian Grothoff2013-11-05
|
* -clarify docuChristian Grothoff2013-11-05
|
* -fix cname testChristian Grothoff2013-11-05
|
* -use valid public key in new formatChristian Grothoff2013-11-05
|
* -now featuring short peer identities, yepeeChristian Grothoff2013-11-05
|
* -fix include orderChristian Grothoff2013-11-05
|
* -initialize flags to unproblematic value (hence usually zero)Christian Grothoff2013-11-05
|
* -initialize flag, do not use expired record for testingChristian Grothoff2013-11-05
|
* Werner Koch wrote:Christian Grothoff2013-11-05
| | | | | | | | | | | | | Hi, find attached a changed diff to crypto_ecc.c with the final Libgcrypt interface. Use commit b9fd398 or later for your tests. Shalom-Salam, Werner
* Werner Koch wrote:Christian Grothoff2013-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Hi, find attach the patch which makes all 3 test cases work with Ed25519. There are some minor hacks in the test cases to allow enabling of Libgcrypt debugging and also some minor output style changes. There is one FIXME in the code: /* FIXME: mpi_print creates an unsigned integer - is that intended or should we convert it to a signed integer (2-compl)? */ mpi_print (xbuf, sizeof (xbuf), result_x); X may be positive or negative but GCRYMPI_FMT_USG ignores the sign. Thus this is not what we actually want. Should we change it to 2-comp (GCRYMPI_FMT_STD) so that we have a proper value? Given that the curve is 255 bit this should alwas fit int the 256 bit buffer. Another option would be to use the EdDSA method for the sign but that is optimized to easily recover x and would be more work. Or we store the sign in the high bit. t all depends on what you want to write into the protocol specs. I would also like to revert the way we distinguish between Ed25519 with and without ECDSA: The way we do it right now is by assuming the Ed25519 is always used with EdDSA unless a flag has been set. This is a bit surprising and requiring the "(flags eddsa)" would be a less surprising interface. Salam-Shalom, Werner
* - corrected discount for continuous smdpFabian Oehlmann2013-11-05
|
* internal time loggingMatthias Wachs2013-11-05
|
* - docBart Polot2013-11-05
|
* -improving API designChristian Grothoff2013-11-05
|
* - headerBart Polot2013-11-05
|
* - fixes, docBart Polot2013-11-05
|
* - document, alpha renamingBart Polot2013-11-05
|
* - refactoring, extra checksBart Polot2013-11-05
|
* - cleanupBart Polot2013-11-05
|
* -handle PENDINGChristian Grothoff2013-11-05
|
* - change key exchange messages to own encapsulationBart Polot2013-11-05
|
* -do not set PENDING on shortenChristian Grothoff2013-11-05
|
* fix tests and do not assert since this will break make checkMatthias Wachs2013-11-05
|
* skeleton for secretsharingFlorian Dold2013-11-05
|
* - implemented missing set functionalityFlorian Dold2013-11-05
| | | | | - secretsharing api changes
* block expirationMatthias Wachs2013-11-04
|
* minor fixes + test for shadows record filtering and usageMatthias Wachs2013-11-04
|
* implementation of shadow record functionality:Matthias Wachs2013-11-04
| | | | | | | | | | | on decrypt iterate over included records - if a shadow record is found, check if: -- a non expired, non-shadow record for this record type exists: if yes: filter shadow record -- shadow record is expired if not: - remove shadow flag and include record
* - new message for mesh KXBart Polot2013-11-04
|
* new test to lookup shadow recordMatthias Wachs2013-11-04
|
* - fix: all records were created as shadow record by defaultMatthias Wachs2013-11-04
| | | | | | | - new: -- printing record flags -- improved error message on deletion
* fix for lookupMatthias Wachs2013-11-04
|
* doxygenMatthias Wachs2013-11-04
|
* separated threshold from other crypto parametersFlorian Dold2013-11-03
|
* typoFlorian Dold2013-11-03
|
* typedef for decryption result callbackFlorian Dold2013-11-03
|
* clarificationsFlorian Dold2013-11-03
|
* fixed include guardFlorian Dold2013-11-03
|
* - secretsharing api proposalFlorian Dold2013-11-03
|
* benchmark with updatesMatthias Wachs2013-10-31
|
* update info for benchmarkMatthias Wachs2013-10-31
|
* adding additional INFOMatthias Wachs2013-10-31
|
* -doxygenChristian Grothoff2013-10-31
|